Method for matching probabilistic encrypted data
Determining if a first encrypted data of a first data value is equal to a second encrypted data of a second data value. Comprising: a first cyclic group; a second cyclic group including a first element. Applying an operation to the first cyclic group to map its elements to an element in the second c...
Saved in:
Main Authors: | PANG, Hwee Hwa, DING, Xuhua |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2015
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3710 https://ink.library.smu.edu.sg/context/sis_research/article/4712/viewcontent/WO2015088448.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Probabilistic public key encryption for controlled equijoin in relational databases
by: WANG, Yujue, et al.
Published: (2017) -
Verifiable Computation on Outsourced Encrypted Data
by: LAI, Junzuo, et al.
Published: (2014) -
Efficient verifiable computation of linear and quadratic functions over encrypted data
by: TRAN, Ngoc Hieu, et al.
Published: (2016) -
Privacy-Preserving Ad-Hoc Equi-Join on Outsourced Data
by: PANG, Hwee Hwa, et al.
Published: (2014) -
Private Query on Encrypted Data in Multi-User Setting
by: BAO, Feng, et al.
Published: (2008)