메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Towards efficient over-encryption in outsourced databases using secret sharing

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; DATABASE SYSTEMS; TECHNICAL PRESENTATIONS;

EID: 58049164962     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NTMS.2008.ECP.100     Document Type: Conference Paper
Times cited : (8)

References (12)
  • 2
    • 84957652167 scopus 로고
    • General short computational secret sharing schemes
    • Springer Berlin and Heidelberg
    • Philippe Beguin and Antonella Cresti. General short computational secret sharing schemes. In Advances in Cryptology-EUROCRYPT'95, pages 194-208. Springer Berlin and Heidelberg, 1995.
    • (1995) Advances in Cryptology-EUROCRYPT'95 , pp. 194-208
    • Beguin, P.1    Cresti, A.2
  • 3
    • 0032166974 scopus 로고    scopus 로고
    • Secret sharing with public reconstruction
    • IEEE
    • Amos Beimel and Benny Chor. Secret sharing with public reconstruction. In IEEE, pages 1887-1896. IEEE, 1998.
    • (1998) IEEE , pp. 1887-1896
    • Beimel, A.1    Chor, B.2
  • 5
    • 16644381926 scopus 로고    scopus 로고
    • Modelling and assessing inference exposure in encrypted databases
    • New York, NY, USA, ACM
    • Alberto Ceselli et al. Modelling and assessing inference exposure in encrypted databases. In TISSEC, pages 119-152, New York, NY, USA, 2005. ACM.
    • (2005) TISSEC , pp. 119-152
    • Ceselli, A.1
  • 7
    • 58049150362 scopus 로고    scopus 로고
    • Tree-based group key agreement. Technical Report 2002/009
    • Yongdae Kim, Adrian Perrig, and Gene Tsudik. Tree-based group key agreement. Technical Report 2002/009, 2002.
    • (2002)
    • Kim, Y.1    Perrig, A.2    Tsudik, G.3
  • 8
    • 85009120801 scopus 로고    scopus 로고
    • Controlling access to published data using cryptography
    • VLDB Endowment
    • Gerome Miklau and Dan Suciu. Controlling access to published data using cryptography. In VLDB, pages 898-909. VLDB Endowment, 2003.
    • (2003) VLDB , pp. 898-909
    • Miklau, G.1    Suciu, D.2
  • 9
    • 84947770625 scopus 로고
    • Efficient dynamic-resharing "verifiable secret sharing" against mobile adversary
    • Springer Berlin and Heidelberg
    • N.Alon, Z.Galil, and M.Yung. Efficient dynamic-resharing "verifiable secret sharing" against mobile adversary. In Algorithms-ESA'95, pages 523-537. Springer Berlin and Heidelberg, 1995.
    • (1995) Algorithms-ESA'95 , pp. 523-537
    • Alon, N.1    Galil, Z.2    Yung, M.3
  • 10
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • 3:239-248
    • S.Akl and P.Taylor. Cryptographic solution to a problem of access control in a hierarchy. In ACM TOCS, pages 1(3):239-248, 1983.
    • (1983) ACM TOCS , pp. 1
    • Akl, S.1    Taylor, P.2
  • 11
    • 0018545449 scopus 로고
    • How to share a secret
    • New York, NY, USA, ACM
    • Adi Shamir. How to share a secret. In Communications of the ACM, pages 612-613, New York, NY, USA, 1979. ACM.
    • (1979) Communications of the ACM , pp. 612-613
    • Shamir, A.1
  • 12
    • 38049052454 scopus 로고    scopus 로고
    • Preventing collusion attacks on the one-way function tree (oft) scheme
    • Xuxin Xu, Lingyu Wang, Amr M. Youssef, and Bo Zhu. Preventing collusion attacks on the one-way function tree (oft) scheme. In ACNS, pages 177-193, 2007.
    • (2007) ACNS , pp. 177-193
    • Xu, X.1    Wang, L.2    Youssef, A.M.3    Zhu, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.