Privacy-preserving multi-user outsourced computation for boolean circuits

X Liu, G Yang, W Susilo, K He… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the prevalence of outsourced computation, such as Machine Learning as a Service,
protecting the privacy of sensitive data throughout the whole computation is a critical yet …

A multivariate public key encryption scheme with equality test

X Shen, L Wang, H Zhu, Y Liu - IEEE Access, 2020 - ieeexplore.ieee.org
The public key encryption with equality test (PKEET) allows the cloud server to judge
whether two different ciphertexts are generated by the same message without decryption …

[图书][B] Secure Searchable Encryption and Data Management

BB Gupta - 2021 - taylorfrancis.com
With the advent of the IT revolution, the volume of data produced has increased
exponentially and is still showing an upward trend. This data may be abundant and …

Research on the use of algorithms for matrix transformations for encrypting text information

Y Khanas, M Borecki - Security and Privacy, 2020 - Wiley Online Library
Several algorithms are presented in the article for the transformation of numerical matrices
by nonstandard means. These algorithms are shown in the data encryption task, namely, a …

A Survey on Public-Key Based Searchable Encryption for Secure Big Data Management on Cloud

R Mehla, R Garg - Available at SSRN 4396669 - papers.ssrn.com
Big-data analytics is becoming essential to most corporations and community operations in
contemporary data-centric society, and cloud computing is the key enabling technology for …