메뉴 건너뛰기




Volumn 33, Issue 4, 2017, Pages 953-964

Efficient encrypted data comparison through a hybrid method

Author keywords

Cloud computing; Garbled circuits; Homomorphic cryptosystem; Privacy preserving; Secure comparison

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; EFFICIENCY; NEAREST NEIGHBOR SEARCH; SMART CITY;

EID: 85032693272     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: 10.6688/JISE.2017.33.4.6     Document Type: Article
Times cited : (18)

References (31)
  • 2
    • 33745567199 scopus 로고    scopus 로고
    • Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
    • I. Damgard, M. Fitzi, E. Kiltz, J. B. Nielsen, and T. Toft, “Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation,” in Proceedings of Theory of Cryptography Conference, 2006, pp. 285-304.
    • (2006) Proceedings of Theory of Cryptography Conference , pp. 285-304
    • Damgard, I.1    Fitzi, M.2    Kiltz, E.3    Nielsen, J.B.4    Toft, T.5
  • 12
    • 64249101946 scopus 로고    scopus 로고
    • A proof of security of Yao’s protocol for two-party computation
    • Y. Lindell and B. Pinkas, “A proof of security of Yao’s protocol for two-party computation,” Journal of Cryptology, Vol. 22, 2009, pp. 161-188.
    • (2009) Journal of Cryptology , vol.22 , pp. 161-188
    • Lindell, Y.1    Pinkas, B.2
  • 14
    • 38049034355 scopus 로고    scopus 로고
    • Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
    • T. Nishide and K. Ohta, “Multiparty computation for interval, equality, and comparison without bit-decomposition protocol,” in Proceedings of International Workshop on Public Key Cryptography, 2007, pp. 343-360.
    • (2007) Proceedings of International Workshop on Public Key Cryptography , pp. 343-360
    • Nishide, T.1    Ohta, K.2
  • 18
    • 84926455204 scopus 로고    scopus 로고
    • Social network and tag sources based augmenting collaborative recommender system
    • T. Ma, J. Zhou, M. Tang, and Y. Tian, “Social network and tag sources based augmenting collaborative recommender system,” IEICE Transactions on Information and Systems, Vol. 98, 2015, pp. 902-910.
    • (2015) IEICE Transactions on Information and Systems , vol.98 , pp. 902-910
    • Ma, T.1    Zhou, J.2    Tang, M.3    Tian, Y.4
  • 19
    • 84982135416 scopus 로고    scopus 로고
    • Enabling personalized search over encrypted outsourced data with efficiency improvement
    • Z. Fu, K. Ren, J. Shu, and X Sun, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel and Distributed Systems, Vol. 27, 2016, pp. 2546-2559.
    • (2016) IEEE Transactions on Parallel and Distributed Systems , vol.27 , pp. 2546-2559
    • Fu, Z.1    Ren, K.2    Shu, J.3    Sun, X.4
  • 20
    • 84922280033 scopus 로고    scopus 로고
    • Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
    • Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, Vol. 98, 2015, pp. 190-200.
    • (2015) IEICE Transactions on Communications , vol.98 , pp. 190-200
    • Fu, Z.1    Sun, X.2    Liu, Q.3    Zhou, L.4    Shu, J.5
  • 21
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
    • Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, Vol. 27, 2016, pp. 340-352.
    • (2016) IEEE Transactions on Parallel and Distributed Systems , vol.27 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 22
    • 84951770536 scopus 로고    scopus 로고
    • Secure and controllable k-NN query over encrypted cloud data with key confidentiality
    • Y. W. Zhu, Z. Q. Huang, and T. Takagi, “Secure and controllable k-NN query over encrypted cloud data with key confidentiality,” Journal of Parallel and Distributed Computing, Vol. 89, 2016, pp. 1-12.
    • (2016) Journal of Parallel and Distributed Computing , vol.89 , pp. 1-12
    • Zhu, Y.W.1    Huang, Z.Q.2    Takagi, T.3
  • 25
    • 84963856290 scopus 로고    scopus 로고
    • Efficient implementation of NIST compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
    • Z. Liu, H. Seo, J. Großschal, and H. Kim, “Efficient implementation of NIST compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes,” IEEE Transactions on Information Forensics and Security, Vol. 11, 2016, pp. 1385-1397.
    • (2016) IEEE Transactions on Information Forensics and Security , vol.11 , pp. 1385-1397
    • Liu, Z.1    Seo, H.2    Großschal, J.3    Kim, H.4
  • 26
    • 84894317469 scopus 로고    scopus 로고
    • The real-time city? Big data and smart urbanism
    • R. Kitchin, “The real-time city? big data and smart urbanism,” GeoJournal, Vol. 79, 2014, pp. 1-14.
    • (2014) GeoJournal , vol.79 , pp. 1-14
    • Kitchin, R.1
  • 29
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • Y. J. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable data auditing in public cloud storage,” Journal of Internet Technology, Vol. 16, 2015, pp. 317-323.
    • (2015) Journal of Internet Technology , vol.16 , pp. 317-323
    • Ren, Y.J.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.5
  • 30
    • 84922323888 scopus 로고    scopus 로고
    • A novel routing protocol providing good transmission reliability in underwater sensor networks
    • J. Shen, H. W. Tan, J. Wang, J. W. Wang, and S. Lee, “A novel routing protocol providing good transmission reliability in underwater sensor networks,” Journal of Internet Technology, Vol. 16, 2015, pp. 171-178.
    • (2015) Journal of Internet Technology , vol.16 , pp. 171-178
    • Shen, J.1    Tan, H.W.2    Wang, J.3    Wang, J.W.4    Lee, S.5
  • 31
    • 84906330795 scopus 로고    scopus 로고
    • Construction of tree network with limited delivery latency in homogeneous wireless sensor networks
    • S. D. Xie and Y. X. Wang, “Construction of tree network with limited delivery latency in homogeneous wireless sensor networks,” Wireless Personal Communications, Vol. 78, 2014, pp. 231-246.
    • (2014) Wireless Personal Communications , vol.78 , pp. 231-246
    • Xie, S.D.1    Wang, Y.X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.