搜索结果: 1-15 共查到“知识库 revealing”相关记录44条 . 查询时间(0.203 秒)
Revealing the Structure and Composition of the Restored Vegetation Cover in Semi-Arid Mine Dumps Based on LiDAR and Hyperspectral Images
ecological restoration hierarchical classification vegetation structure LiDAR vegetation species
2023/12/1
Remotely sensed images with low resolution can be effectively used for the large-area monitoring of vegetation restoration, but are unsuitable for accurate small-area monitoring. This limits researche...
Revealing the effect of aluminum content on the electrochemical performance of magnesium anodes for aqueous batteries
aluminum content discharge potential Mg-Al alloy anodes utilization efficiency
2023/6/21
Al is one of the principal alloying elements for Mg anodes. In this study, a series of Mg-Al alloys has been evaluated as anode materials for optimizing the Al addition amount in Mg anodes with the in...
Revealing Distinctions in Genetic Diversity and Adaptive Evolution Between Two Varieties of Camellia sinensis by Whole-Genome Resequencing
Whole-Genome Resequencing Genetic Diversity Camellia sinensis
2023/4/20
Camellia sinensis var. sinensis (CSS) and C. sinensis var. assamica (CSA) are the two most economically important tea varieties. They have different characteristics and geographical distribution. Thei...
A Comparative Evaluation of Order-Preserving and Order-Revealing Schemes and Protocols
ORE OPE searchable encryption
2018/11/6
Database query evaluation over encrypted data has received a lot of attention recently. Order Preserving Encryption (OPE) and Order Revealing Encryption (ORE) are two important encryption schemes that...
Parameter-Hiding Order Revealing Encryption
secret-key cryptography Order Revealing Encryption
2018/7/24
Order-revealing encryption (ORE) is a popular primitive for outsourcing encrypted databases, as it allows for efficiently performing range queries over encrypted data. Unfortunately, a series of works...
File-injection Attack and Forward Security for Order-revealing Encryption
Order-revealing Encryption Order-preserving Encryption File-injection Attack
2017/11/13
Order-preserving encryption (OPE) and order-revealing encryption (ORE) are among the core ingredients for encrypted database (EDB) systems as secure cloud storage. In this work, we study the leakage o...
Impossibility of Order-Revealing Encryption in Idealized Models
Black-box separations Order-revealing encryption Random oracle
2017/10/16
An Order-Revealing Encryption (ORE) scheme gives a public procedure by which two ciphertext can be compared to reveal the order of their underlying plaintexts. The ideal security notion for ORE is tha...
What Else is Revealed by Order-Revealing Encryption?
order-revealing encryption order-preserving encryption database encryption
2016/12/10
The security of order-revealing encryption (ORE) has been unclear since its invention. Dataset characteristics for which ORE is especially insecure have been identified, such as small message spaces a...
Order-preserving encryption and its generalization order-revealing encryption (OPE/ORE) are used in a variety of settings in practice in order to allow sorting, performing range queries, and filtering...
Revealing Encryption for Partial Ordering
secret-key cryptography order-revealing encryption
2016/12/8
We generalize the cryptographic notion of Order Revealing Encryption (ORE) to arbitrary functions and we present a construction that allows to determine the (partial) ordering of two vectors i.e., giv...
We study practical order-revealing encryption (ORE) with a well-defined leakage profile (the information revealed about the plaintexts from their ciphertexts), a direction recently initiated by Chenet...
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds
order-revealing encryption order-preserving encryption range queries
2016/6/15
In the last few years, there has been much interest in developing methods to search over encrypted data. In the case of range queries, a simple solution is to encrypt the contents of the database usin...
Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses
Fault attacks branch misses performance counters
2016/1/6
Performance monitors are provided in modern day computers for observing various features of the underlying microarchitectures. However the combination of underlying micro-architectural features and pe...
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation
functional encryption multilinear maps
2016/1/6
Deciding “greater-than” relations among data items just given their encryptions is at the heart of
search algorithms on encrypted data, most notably, non-interactive binary search on encrypted data.
...
Order-Revealing Encryption and the Hardness of Private Learning
differential privacy learning theory order-revealing encryption
2015/12/31
An order-revealing encryption scheme gives a public procedure by which two ciphertexts
can be compared to reveal the ordering of their underlying plaintexts. We show how to use
order-revealing encry...