Zobrazeno 1 - 10
of 10 188
pro vyhledávání: '"private information retrieval"'
Autor:
Jianxu WANG, Rui LI, Yin LI
Publikováno v:
网络与信息安全学报, Vol 10, Iss 4, Pp 159-174 (2024)
Efficient algorithms for online string pattern matching have been deemed crucial for cloud database retrieval. However, the potential leaking of search content has been recognized as a threat to users' privacy. Existing string pattern matching algori
Externí odkaz:
https://doaj.org/article/ff188ba69def45a3b21943150a7b80eb
Publikováno v:
ICT Express, Vol 10, Iss 4, Pp 891-894 (2024)
In this paper, we introduce new codes for the private information retrieval (PIR). The conventional Tian-Sun-Chen (TSC) scheme achieves PIR capacity under the perfect privacy conditions with the minimum message length. Based on the TSC scheme, weakly
Externí odkaz:
https://doaj.org/article/40d22333d6c14ef8afbcdb0af7ad02f6
Publikováno v:
In Computers and Electrical Engineering November 2024 119 Part B
Autor:
Zhou, Fucai a, Sun, Jintong a, b, ⁎, Wang, Qiang a, Zhang, Yun c, Hou, Ruiwei a, Wang, Chongyang a
Publikováno v:
In Computer Standards & Interfaces April 2025 93
Publikováno v:
Cybersecurity, Vol 6, Iss 1, Pp 1-10 (2023)
Abstract The computational complexity of privacy information retrieval protocols is often linearly related to database size. When the database size is large, the efficiency of privacy information retrieval protocols is relatively low. This paper desi
Externí odkaz:
https://doaj.org/article/9c66486065ac4ee08a82bc8cc031596a
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 2, Pp 101903- (2024)
Private information retrieval (PIR) enables a client to search data from a single (or multiple) untrusted server, without revealing which entry was queried. PIR can be divided into two categories: information-theoretic PIR (IT-PIR) and computational
Externí odkaz:
https://doaj.org/article/eaed1cd0fa394a778143fe08015593de
Autor:
Minchul Kim, Jungwoo Lee
Publikováno v:
ICT Express, Vol 9, Iss 3, Pp 415-419 (2023)
We consider information-theoretic privacy in federated submodel learning, where a global server has multiple submodels. Compared to the privacy considered in the conventional federated submodel learning where secure aggregation is adopted for ensurin
Externí odkaz:
https://doaj.org/article/b7afc5882a0741babf98b9ab1d7550eb
Autor:
Xingchen Wang, Peng Li
Publikováno v:
Information, Vol 15, Iss 3, p 129 (2024)
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client’s private in
Externí odkaz:
https://doaj.org/article/609f6dd0965342eeae666cb300e217c7
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.