2011
DOI: 10.1007/978-3-642-20149-3_10
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Query Processing on Secret Share Based Data Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
26
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 14 publications
(26 citation statements)
references
References 11 publications
0
26
0
Order By: Relevance
“…However, it provides no attack description, and argues that large primes are prohibitively expensive to recover. Our attack recovers 8192-bit primes in less time than [5] needed to recover 32-bit primes. In fact, we can generally recover large primes in less time than the client takes to generate them (Sect.…”
Section: Our Contributionmentioning
confidence: 99%
See 4 more Smart Citations
“…However, it provides no attack description, and argues that large primes are prohibitively expensive to recover. Our attack recovers 8192-bit primes in less time than [5] needed to recover 32-bit primes. In fact, we can generally recover large primes in less time than the client takes to generate them (Sect.…”
Section: Our Contributionmentioning
confidence: 99%
“…Our contribution is to demonstrate that all three HAT schemes [3][4][5] fail to fulfill Claim 2. We give a practical attack that can reconstruct all secrets in the database when k servers collude, even when p and X are kept private.…”
Section: Our Contributionmentioning
confidence: 99%
See 3 more Smart Citations