搜索结果: 1-8 共查到“军事学 Data Structures”相关记录8条 . 查询时间(0.641 秒)
Efficient Oblivious Data Structures for Database Services on the Cloud
Privacy-enhancing Technologies Oblivious Data Structure ORAM
2017/12/25
Database-as-a-service (DBaaS) allows the client to store and manage structured data on the cloud remotely. Despite its merits, DBaaS also brings significant privacy issues. Existing encryption techniq...
Auditable Data Structures
WHI AMM
2016/12/10
The classic notion of history-independence guarantees that if a data structure is ever observed, only its current contents are revealed, not the history of operations that built it. This powerful conc...
Efficient, Oblivious Data Structures for MPC
Multiparty computation data structures oblivious RAM
2016/1/25
We present oblivious implementations of several data structures for secure multiparty computation
(MPC) such as arrays, dictionaries, and priority queues. The resulting oblivious data structures
hav...
We design novel, asymptotically more efficient data structures and algorithms for programs whose
data access patterns exhibit some degree of predictability. To this end, we propose two novel techniqu...
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
Searchable Encryption Data Structures
2016/1/6
We design and implement dynamic symmetric searchable encryption schemes that efficiently and
privately search server-held encrypted databases with tens of billions of record-keyword pairs. Our
basic...
Database Outsourcing with Hierarchical Authenticated Data Structures
Databases outsourcing Hierarchical authenticated data structures Authenticated join processing
2015/12/31
In an outsourced database scheme, the data owner delegates the data management tasks to a remote service
provider. At a later time, the remote service is supposed to answer any query on the database....
Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking
Cryptography for Efficiency Authenticated Data Lattices Parallel Online Memory Checking
2011/3/11
In this work, we initially design a new authenticated data structure
for a dynamic table with n entries. We present the first dynamic authenticated
table that is update-optimal, using a lattice-base...
Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking
authenticated data structures lattice-based cryptography memory checking
2012/3/29
In this work, we initially design a new authenticated data structure for a \emph{dynamic table} with $n$ entries. We present the first dynamic authenticated table that is \emph{update-optimal}, using ...