2015
DOI: 10.1007/s00500-015-1766-6
|View full text |Cite
|
Sign up to set email alerts
|

Efficient request-based comparable encryption scheme based on sliding window method

Abstract: In this paper, we present an efficient requestbased comparable encryption, which is based on sliding window techniques. Recently, Furukawa (Computer security-ESORICS 2013, Springer, 129-146, 2013) introduced a new primitive called request-based comparable encryption (comparable encryption for short) which overcomes the problem that OPEs cannot solve. OPEs have the problem that when all the numbers in a certain domain are encrypted by an OPE, an attacker can easily obtain all the orders of the encrypted numbers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…Sliding window technology can bring in the reduction in the amount of computation and management overhead. Algorithm 1 illustrates details of sliding window method [32].…”
Section: Sliding Window Method Sliding Window Methods Proposed Bymentioning
confidence: 99%
See 2 more Smart Citations
“…Sliding window technology can bring in the reduction in the amount of computation and management overhead. Algorithm 1 illustrates details of sliding window method [32].…”
Section: Sliding Window Method Sliding Window Methods Proposed Bymentioning
confidence: 99%
“…Compute and store fl 2 ( ) ; (8) if ̸ = 0 then (9) Compute and store fl ⋅ ; (10) else (11) is a zero window. (12) Return ; Algorithm 1: The sliding window method [32]. to right in each layer with ⋅ , ⋅ , and ⋅ V defined as follows, where set Ω represents the set of left subtrees, set Ω represents the set of right subtrees, set Ω root represents the root of tree, and set Θ represents the set of leaf nodes.…”
Section: Position-aware Merkle Tree Merkle Hash Treementioning
confidence: 99%
See 1 more Smart Citation
“…The selective search algorithm mainly uses a hierarchical clustering method to segment and get the candidate target areas. A more detailed description about the selective search algorithm is listed in references [23][24][25]. The candidate areas obtained using the selective search algorithm are sent to a convolution neural network for classification to determine their type.…”
Section: Target Segmentationmentioning
confidence: 99%
“…Hence, they propose an efficient mutual verifiable PDP scheme, which utilizes Diffie–Hellman shared key to construct the homomorphic authenticator. The aforementioned methods are more efficient and secure regarding some exiting ones, such as .…”
Section: Introductionmentioning
confidence: 99%