Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Ioannis Demertzis"'
Publikováno v:
SOSP
Existing oblivious storage systems provide strong security by hiding access patterns, but do not scale to sustain high throughput as they rely on a central point of coordination. To overcome this scalability bottleneck, we present Snoopy, an object s
Publikováno v:
Proceedings of the VLDB Endowment. 11:1729-1741
In this work we design new searchable encryption schemes whose goal is to minimize the number of cryptographic operations required to retrieve the result---a dimension mostly overlooked by previous works, yet very important in practice. Our main idea
Autor:
Charalampos Papamanthou, Stavros Papadopoulos, Ioannis Demertzis, Odysseas Papapetrou, Minos Garofalakis, Antonios Deligiannakis
Publikováno v:
ACM Transactions on Database Systems
We consider a data owner that outsources its dataset to an untrusted server . The owner wishes to enable the server to answer range queries on a single attribute, without compromising the privacy of the data and the queries. There are several schemes
Publikováno v:
NDSS
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319968834
CRYPTO (1)
CRYPTO (1)
We propose the first linear-space searchable encryption scheme with constant locality and sublogarithmic read efficiency, strictly improving the previously best known read efficiency bound (Asharov et al., STOC 2016) from \(\varTheta (\log N \log \lo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4968ec4e8d6621dca2df912eaf3390de
https://doi.org/10.1007/978-3-319-96884-1_13
https://doi.org/10.1007/978-3-319-96884-1_13
Publikováno v:
SIGMOD Conference
Searchable encryption (SE) allows a client to outsource a dataset to an untrusted server while enabling the server to answer keyword queries in a private manner. SE can be used as a building block to support more expressive private queries such as ra
Autor:
Stavros Papadopoulos, Ioannis Demertzis, Odysseas Papapetrou, Minos Garofalakis, Antonios Deligiannakis
Publikováno v:
SIGMOD Conference
Summarization: We consider a data owner that outsources its dataset to an untrusted server. The owner wishes to enable the server to answer range queries on a single attribute, without compromising the privacy of the data and the queries. There are s