Back to Results
First PageMeta Content
Search algorithms / Network theory / Shortest path problem / Breadth-first search / Graph / Homomorphic encryption / Graph connectivity / Graph theory / Mathematics / Theoretical computer science


GRECS: Graph Encryption for Approximate Shortest Distance Queries Xianrui Meng∗1 , Seny Kamara†2 , Kobbi Nissim‡3 , and George Kollios§1 1 Department of Computer Science, Boston University
Add to Reading List

Document Date: 2015-03-22 08:44:39


Open Document

File Size: 857,93 KB

Share Result on Facebook

City

Sketched / /

Company

Microsoft / /

Currency

USD / /

/

Facility

Boston University / /

IndustryTerm

search trees / probabilistic algorithm / evaluation algorithm / large-scale database applications / inner product / approximation algorithm / biological networks / protein-protein interaction networks / large Web graphs / secure multi-party computation protocols / adversarial server / graph processing / polynomial-time algorithm / deterministic algorithm / distQuery protocol / Web graph / social networks / computing / web graphs / social network / controlled disclosure systems / search structures / cloud computing / communication networks / pre-computing / graph algorithms / polynomialtime algorithms / semi-honest server / approximation algorithms / /

Organization

Department of Computer Science / Boston University / /

Person

George Kollios / Trinity / /

Position

Private / /

ProgrammingLanguage

C / /

Technology

Encryption / Cohen et al. oracle The Setup algorithm / distQuery protocol / graph algorithms / somewhat-homomorphic encryption / three polynomialtime algorithms / graph encryption / RAM / two-party protocol / t-1 / public key / polynomial-time two-party protocol / searchable symmetric encryption / approximation algorithm / symmetric-key encryption / evaluation algorithm / polynomial-time algorithm / Setup algorithm / deterministic algorithm / approximation algorithms / private key / 9 Algorithm / secret key / secure multi-party computation protocols / simulation / 3 Graph Encryption / same Query algorithm / probabilistic algorithm / 2.1 Cryptographic Tools Encryption / /

SocialTag