-
Chapter and Conference Paper
Search-and-Compute on Encrypted Data
Private query processing on encrypted databases allows users to obtain data from encrypted databases in such a way that the user’s sensitive data will be protected from exposure. Given an encrypted database, t...
-
Chapter and Conference Paper
Private Over-Threshold Aggregation Protocols
In this paper, we revisit the private k + data aggregation problem, and formally define the problem’s security requirements as both data and user privacy goals. To achieve both goals, and to str...
-
Chapter and Conference Paper
Mutual Private Set Intersection with Linear Complexity
A private set intersection (PSI) protocol allows players to obtain the intersection of their inputs. While in its unilateral version only the client can obtain the intersection, the mutual PSI protocol enables...
-
Chapter and Conference Paper
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provide enterprise level integrated...
-
Chapter and Conference Paper
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption
The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. Fingerprinting provides a means which a copyright owner can tra...
-
Chapter and Conference Paper
A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem
We construct an interactive identification scheme based on the bilinear Diffie-Hellman problem and analyze its security. This scheme is practical in terms of key size, communication complexity, and availabilit...