Leakage-Resilient Cryptography with Key Derived from Sensitive Data.
Konrad DurnogaTomasz KazanaMichal ZajacMaciej ZdanowiczPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- sensitive data
- information security
- privacy preserving
- data storage
- privacy preservation
- smart card
- security concerns
- sensitive information
- confidential data
- data privacy
- malicious users
- data sharing
- protection mechanisms
- privacy protection
- third party
- data confidentiality
- personal data
- input data
- nearest neighbor
- xml documents
- databases
- data sets