2023
DOI: 10.1007/s11227-023-05048-y
|View full text |Cite
|
Sign up to set email alerts
|

Secure data outsourcing based on seed-residual shares and order-shuffling encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(9 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…The second approach is to restrict the set of possible generated shares from each original value in the domain of the sensitive attribute to be protected on each data server. Schemes based on this approach [13,15,16,18,19,21,22] are referred to as restriction-based SSDO schemes.…”
Section: Shamir's Secret Sharing Schemementioning
confidence: 99%
See 4 more Smart Citations
“…The second approach is to restrict the set of possible generated shares from each original value in the domain of the sensitive attribute to be protected on each data server. Schemes based on this approach [13,15,16,18,19,21,22] are referred to as restriction-based SSDO schemes.…”
Section: Shamir's Secret Sharing Schemementioning
confidence: 99%
“…Inferences could be made from indices (in metadata-based SSDO schemes and encryption-based data outsourcing schemes with indexing), tuples of shares (usually in restriction-based SSDO schemes) or encrypted values (in encryption-based data outsourcing schemes and some SSDO schemes). In [13,16], the following five types of inferences from outsourced databases (using secret sharing or encryption) were introduced:…”
Section: Security Limitations Of Data Outsourcing Schemesmentioning
confidence: 99%
See 3 more Smart Citations