![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
No Such Thing as a Small Leak: Leakage-Abuse Attacks Against Symmetric Searchable Encryption
Symmetric Searchable Encryption ( \(\mathrm {SSE}\) ) schemes enable clients to securely outsource their data while maintaining t...
-
Chapter and Conference Paper
Verifiable and Private Oblivious Polynomial Evaluation
It is a challenging problem to delegate the computation of a polynomial on encrypted data to a server in an oblivious and verifiable way. In this paper, we formally define Verifiable and Private Oblivious Polyno...
-
Chapter and Conference Paper
Secure and Efficient Matrix Multiplication with MapReduce
MapReduce is one of the most popular distributed programming paradigms that allows processing big data sets in parallel on a cluster. MapReduce users often outsource data and computations to a public cloud, wh...