4.6 Article

Leakage-Suppressed Range Query Scheme for Structured Data in IoT

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data

Chang Liu et al.

Summary: GENOA is a novel graph encryption scheme for shortest distance queries that significantly enhances accuracy and efficiency compared to prior work. It utilizes efficient symmetric-key primitives and reveals order information among queried distance values in the 2HCL index.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

PGAS: Privacy-preserving graph encryption for accurate constrained shortest distance queries

Can Zhang et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

New Order-Revealing Encryption with Shorter Ciphertexts

Kee Sung Kim

INFORMATION (2020)

Article Computer Science, Information Systems

A Comparative Evaluation of Order-Revealing Encryption Schemes and Secure Range-Query Protocols

Dmytro Bogatov et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2019)

Article Automation & Control Systems

Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers

Keke Gai et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Hardware & Architecture

Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage

Yi Dou et al.

COMPUTER JOURNAL (2018)

Article Computer Science, Hardware & Architecture

Searchable Encryption over Feature-Rich Data

Qian Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Computer Science, Theory & Methods

Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage

Minxin Du et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection

Meng Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Proceedings Paper Computer Science, Information Systems

Cryptanalysis of Comparable Encryption in SIGMOD'16

Caleb Horst et al.

SIGMOD'17: PROCEEDINGS OF THE 2017 ACM INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (2017)

Article Computer Science, Hardware & Architecture

Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud

Chang Liu et al.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2017)

Proceedings Paper Computer Science, Information Systems

Leakage-Abuse Attacks against Order-Revealing Encryption

Paul Grubbs et al.

2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)

Article Computer Science, Hardware & Architecture

Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing

Rui Li et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2016)

Article Computer Science, Information Systems

The Internet of Things in Healthcare Potential Applications and Challenges

Phillip A. Laplante et al.

IT PROFESSIONAL (2016)

Proceedings Paper Computer Science, Information Systems

Property Preserving Symmetric Encryption Revisited

Sanjit Chatterjee et al.

ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II (2015)

Article Computer Science, Information Systems

Building hybrid access control by configuring RBAC and MAC features

Sangsig Kim et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2014)

Proceedings Paper Computer Science, Theory & Methods

A Fast Privacy-Preserving Multi-keyword Search Scheme on Cloud Data

Ce Yang et al.

2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICE COMPUTING (CSC) (2012)

Article Computer Science, Information Systems

Searchable symmetric encryption: Improved definitions and efficient constructions

Reza Curtmola et al.

JOURNAL OF COMPUTER SECURITY (2011)