|
|
|
Xingchen Wang and Peng Li
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat...
ver más
|
|
|
|
|
|
|
Hua Sun and Chao Tian
The capacity of private information retrieval (PIR) from databases coded using maximum distance separable (MDS) codes was previously characterized by Banawan and Ulukus, where it was assumed that the messages are encoded and stored separably in the datab...
ver más
|
|
|
|
|
|
|
Yi-Peng Wei, Batuhan Arasli, Karim Banawan and Sennur Ulukus
We consider the private information retrieval (PIR) problem from decentralized uncoded caching databases. There are two phases in our problem setting, a caching phase, and a retrieval phase. In the caching phase, a data center containing all the K files,...
ver más
|
|
|
|
|
|
|
Jinsheng Zhang, Qiumao Ma, Wensheng Zhang and Daji Qiao
This paper proposes TSKT-oblivious RAM (ORAM), an efficient multi-server ORAM construction, to protect a client?s access pattern to outsourced data. TSKT-ORAM organizes each of the server storages as a k-ary tree and adopts XOR-based private information ...
ver más
|
|
|
|
|
|
|
David Woodruff and Sergey Yekhanin
Pág. 1046 - 1056
|
|
|
|