[go: up one dir, main page]

Ghosh et al., 2016 - Google Patents

Efficient verifiable range and closest point queries in zero-knowledge

Ghosh et al., 2016

View PDF
Document ID
4394753558408935550
Author
Ghosh E
Ohrimenko O
Tamassia R
Publication year
Publication venue
Proceedings on Privacy Enhancing Technologies

External Links

Snippet

We present an efficient method for answering one-dimensional range and closest-point queries in a verifiable and privacy-preserving manner. We consider a model where a data owner outsources a dataset of keyvalue pairs to a server, who answers range and …
Continue reading at petsymposium.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Zhang et al. An efficient blockchain-based hierarchical data sharing for healthcare internet of things
Yang et al. Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage
Miao et al. Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage
Li et al. Certificateless public integrity checking of group shared data on cloud storage
Lin et al. A new transitively closed undirected graph authentication scheme for blockchain-based identity management systems
Yu et al. Strong key-exposure resilient auditing for secure cloud storage
Zheng et al. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
Zhu et al. Dynamic audit services for outsourced storages in clouds
Backes et al. Verifiable delegation of computation on outsourced data
Wang et al. Efficiently revocable and searchable attribute-based encryption scheme for mobile cloud storage
Luong et al. Privacy-preserving identity management system on blockchain using Zk-SNARK
Yan et al. Efficient identity-based public integrity auditing of shared data in cloud storage with user privacy preserving
Morales-Sandoval et al. Attribute-based encryption approach for storage, sharing and retrieval of encrypted data in the cloud
Yang et al. A compressive integrity auditing protocol for secure cloud storage
Zhang et al. Conditional anonymous certificateless public auditing scheme supporting data dynamics for cloud storage systems
Jiang et al. Private keyword-search for database systems against insider attacks
Fan et al. Verifiable attribute-based multi-keyword search over encrypted cloud data in multi-owner setting
Nithya et al. Identity‐Based Public Auditing Scheme for Cloud Storage with Strong Key‐Exposure Resilience
Ghopur et al. Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation
Liu et al. Verifiable attribute-based keyword search encryption with attribute revocation for electronic health record system
CN116996870A (en) Traceable and revocable decentralized CP-ABE privacy protection method and system
Tran et al. Efficient verifiable computation of linear and quadratic functions over encrypted data
CN117896066B (en) A searchable encryption method for verifiable multi-user authorization across domains based on dual-chain architecture
Jing et al. Communication-efficient verifiable data streaming protocol in the multi-user setting
Ghosh et al. Efficient verifiable range and closest point queries in zero-knowledge