Hidden Vector Encryption Fully Secure Against Unrestricted Queries.
Angelo De CaroVincenzo IovinoGiuseppe PersianoPublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- key management
- encryption scheme
- data encryption
- key exchange
- query processing
- database
- query language
- digital signature
- security properties
- security analysis
- query evaluation
- integrity verification
- database queries
- response time
- data sources
- encryption decryption
- feature vectors
- user queries
- web search engines
- private key
- cryptographic algorithms
- range queries
- cryptographic protocols
- authentication scheme
- image encryption
- secure communication
- data confidentiality