Login / Signup
Security analysis for order preserving encryption schemes.
Liangliang Xiao
I-Ling Yen
Published in:
CISS (2012)
Keyphrases
</>
order preserving
encryption scheme
security analysis
hash functions
standard model
public key
security model
ciphertext
diffie hellman
secret key
authentication protocol
user authentication
encryption algorithm
data sharing
image encryption
lossless compression
error correction
databases
authentication scheme