Method for matching probabilistic encrypted data
Determining if a first encrypted data of a first data value is equal to a second encrypted data of a second data value. Comprising: a first cyclic group; a second cyclic group including a first element. Applying an operation to the first cyclic group to map its elements to an element in the second c...
Saved in:
Main Authors: | PANG, Hwee Hwa, DING, Xuhua |
---|---|
格式: | text |
語言: | English |
出版: |
Institutional Knowledge at Singapore Management University
2015
|
主題: | |
在線閱讀: | https://ink.library.smu.edu.sg/sis_research/3710 https://ink.library.smu.edu.sg/context/sis_research/article/4712/viewcontent/WO2015088448.pdf |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|
機構: | Singapore Management University |
語言: | English |
相似書籍
-
Probabilistic public key encryption for controlled equijoin in relational databases
由: WANG, Yujue, et al.
出版: (2017) -
Verifiable Computation on Outsourced Encrypted Data
由: LAI, Junzuo, et al.
出版: (2014) -
Efficient verifiable computation of linear and quadratic functions over encrypted data
由: TRAN, Ngoc Hieu, et al.
出版: (2016) -
Privacy-Preserving Ad-Hoc Equi-Join on Outsourced Data
由: PANG, Hwee Hwa, et al.
出版: (2014) -
Private Query on Encrypted Data in Multi-User Setting
由: BAO, Feng, et al.
出版: (2008)