Back to Results
First PageMeta Content
Cipher / RSA / Advantage / Ciphertext stealing / Three-pass protocol / Cryptography / Public-key cryptography / Electronic commerce


Multi-Dimensional Range Query over Encrypted Data ∗ Elaine Shi John Bethencourt T-H. Hubert Chan Dawn Song Carnegie Mellon University Abstract We design an encryption scheme called Multi-dimensional
Add to Reading List

Document Date: 2007-09-09 14:20:24


Open Document

File Size: 271,76 KB

Share Result on Facebook

City

Anonymous Identity / /

Company

IDC / /

Currency

pence / /

Facility

port p. / /

IndustryTerm

above algorithms / generation algorithm / setup algorithm / keyword search capabilities / remote server / polynomial-time algorithms / storage server / encrypted network / example applications / network intrusion detection systems / Internet Service Provider / traitor-tracing systems / cross-product / online technical report version / search capability / valid search capability / encrypted network audit / /

Organization

Army Research Office / National Science Foundation / MRQED D / U.S. Government / Carnegie Mellon University / MC MR / /

Person

Table / H. Hubert Chan Dawn Song Carnegie / Elaine Shi John Bethencourt / /

Position

authorized auditor / broker / auditor / /

ProvinceOrState

Saskatchewan / /

Technology

encryption / above algorithms / point encryption / public key / generation algorithm / firewall / polynomial-time algorithms / smartphone / setup algorithm / identity-based encryption / DeriveKey algorithm / ISP / QueryDecrypt algorithm / private key / biometric-based Anonymous IdentityBased Encryption / Encrypt algorithm / UDP / PDA / /

SocialTag