• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 89
Next 10 →

Predicate Privacy in Encryption Systems

by Emily Shen, Elaine Shi, Brent Waters , 2008
"... Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generate secret key tokens corresponding to predicates. An encryption of data x can be evaluated using a secret token correspond ..."
Abstract - Cited by 66 (8 self) - Add to MetaCart
corresponding to a predicate f; the user learns whether the data satisfies the predicate, i.e., whether f(x) = 1. Prior work on public-key predicate encryption has focused on the notion of data or plaintext privacy, the property that ciphertexts reveal no information about the encrypted data to an attacker

PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search

by Benwen Zhu, Kui Ren, Waters Introduced The
"... notion of predicate privacy, i.e., the property that t(x) reveals no information about the encoded predicate p, and proposed a scheme that achieves predicate privacy in the symmetric-key settings. In this paper, we propose two schemes. In the first scheme, we extend PEKS to support predicate privacy ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
notion of predicate privacy, i.e., the property that t(x) reveals no information about the encoded predicate p, and proposed a scheme that achieves predicate privacy in the symmetric-key settings. In this paper, we propose two schemes. In the first scheme, we extend PEKS to support predicate

Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy

by Fu-kuo Tseng, Rong-jaye Chen, Bao-shuh Paul Lin
"... Abstract. We present a symmetric-key predicate-only functional encryption system, SP-FE, which supports functionality for regular languages described by deterministic finite automata. In SP-FE, a data owner can encrypt a string of symbols as encrypted symbols for matching. Later, the data owner can ..."
Abstract - Add to MetaCart
operations or returns the corresponding encrypted data. We have proven SP-FE preserves both keyword privacy and predicate privacy through security analysis and security games. However, to achieve predicate privacy, we put bounds on the length of a string and the number of states of a DFA. Due

Privacy Preserving Revocable Predicate Encryption Revisited

by Kwangsu Lee, Intae Kim, Seong Oun Hwang
"... Predicate encryption (PE) that provides both the access control of ciphertexts and the privacy of ciphertexts is a new paradigm of public-key encryption. An important application of predicate encryption is a searchable encryption system in a cloud storage, where it enables a client to securely outso ..."
Abstract - Add to MetaCart
Predicate encryption (PE) that provides both the access control of ciphertexts and the privacy of ciphertexts is a new paradigm of public-key encryption. An important application of predicate encryption is a searchable encryption system in a cloud storage, where it enables a client to securely

Differential privacy via wavelet transforms

by Xiaokui Xiao, Guozhang Wang, Johannes Gehrke - In ICDE , 2010
"... Abstract — Privacy preserving data publishing has attracted considerable research interest in recent years. Among the existing solutions, ɛ-differential privacy provides one of the strongest privacy guarantees. Existing data publishing methods that achieve ɛ-differential privacy, however, offer litt ..."
Abstract - Cited by 100 (8 self) - Add to MetaCart
Abstract — Privacy preserving data publishing has attracted considerable research interest in recent years. Among the existing solutions, ɛ-differential privacy provides one of the strongest privacy guarantees. Existing data publishing methods that achieve ɛ-differential privacy, however, offer

Optimizing linear counting queries under differential privacy

by Chao Li, Michael Hay, Vibhor Rastogi, Gerome Miklau, Andrew Mcgregor - In PODS ’10: Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems of data , 2010
"... Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answering a collection of related queries are not known. We propose the matrix mechanism, a new algorithm for answering a workl ..."
Abstract - Cited by 96 (12 self) - Add to MetaCart
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answering a collection of related queries are not known. We propose the matrix mechanism, a new algorithm for answering a

Interactive Privacy via the Median Mechanism

by Aaron Roth, Tim Roughgarden - In The 42nd ACM Symposium on the Theory of Computing , 2010
"... We define a new interactive differentially private mechanism — the median mechanism — for answering arbitrary predicate queries that arrive online. Given fixed accuracy and privacy constraints, this mechanism can answer exponentially more queries than the previously best known interactive privacy me ..."
Abstract - Cited by 72 (15 self) - Add to MetaCart
We define a new interactive differentially private mechanism — the median mechanism — for answering arbitrary predicate queries that arrive online. Given fixed accuracy and privacy constraints, this mechanism can answer exponentially more queries than the previously best known interactive privacy

Privacy-Preserving Predicate Proof of Attributes with CL-Anonymous Credential

by Nan Guo , Jia Wang , Tianhan Gao , Kangbin Yim
"... Abstract The anonymous credential system allows users to convince relying parties the possession of a credential released by an issuer. To adhere to the minimal information disclose principle, the anonymous credential facilitates predicate proofs of attributes without revealing the values. In this ..."
Abstract - Add to MetaCart
Abstract The anonymous credential system allows users to convince relying parties the possession of a credential released by an issuer. To adhere to the minimal information disclose principle, the anonymous credential facilitates predicate proofs of attributes without revealing the values

Anonymizing classification data for privacy preservation

by Benjamin C. M. Fung, Ke Wang, Philip S. Yu - IEEE Transactions on Knowledge and Data Engineering , 2007
"... Abstract — Classification is a fundamental problem in data analysis. Training a classifier requires accessing a large collection of data. Releasing person-specific data, such as customer data or patient records, may pose a threat to individual’s privacy. Even after removing explicit identifying info ..."
Abstract - Cited by 60 (12 self) - Add to MetaCart
Abstract — Classification is a fundamental problem in data analysis. Training a classifier requires accessing a large collection of data. Releasing person-specific data, such as customer data or patient records, may pose a threat to individual’s privacy. Even after removing explicit identifying

Private Decayed Predicate Sums on Streams

by S. Muthukrishnan, Jean Bolot, Aleksandar Nikolov, Nadia Fawaz, Nina Taft
"... In many monitoring applications, recent data is more important than distant data. How does this affect privacy of data analysis? We study a general class of data analyses — predicate sums — in this context. Formally, we study the problem of estimating predicate sums privately, for sliding windows an ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
In many monitoring applications, recent data is more important than distant data. How does this affect privacy of data analysis? We study a general class of data analyses — predicate sums — in this context. Formally, we study the problem of estimating predicate sums privately, for sliding windows
Next 10 →
Results 1 - 10 of 89
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University