Mostrar el registro sencillo del ítem
Pattern Matching in Encrypted Stream from Inner Product Encryption
hal.structure.identifier | Orange Labs [Cesson-Sévigné] | |
hal.structure.identifier | Lithe and fast algorithmic number theory [LFANT] | |
dc.contributor.author | BOUSCATIÉ, Élie | |
hal.structure.identifier | Lithe and fast algorithmic number theory [LFANT] | |
hal.structure.identifier | Analyse cryptographique et arithmétique [CANARI] | |
dc.contributor.author | CASTAGNOS, Guilhem | |
hal.structure.identifier | Orange Labs [Cesson-Sévigné] | |
dc.contributor.author | SANDERS, Olivier | |
dc.date.accessioned | 2024-04-04T02:34:29Z | |
dc.date.available | 2024-04-04T02:34:29Z | |
dc.date.issued | 2023-05-02 | |
dc.date.conference | 2023-05-07 | |
dc.identifier.uri | https://oskar-bordeaux.fr/handle/20.500.12278/190556 | |
dc.description.abstractEn | Functional encryption features secret keys, each associated with a key function f , which allow to directly recover f (x) from an encryption of x, without learning anything more about x. This property is particularly useful when delegating data processing to a third party as it allows the latter to perform its task while ensuring minimum data leakage. However, this generic term conceals a great diversity in the cryptographic constructions that strongly differ according to the functions f they support. | |
dc.description.sponsorship | Calcul réparti sécurisé : Cryptographie, Combinatoire, Calcul Formel - ANR-21-CE39-0006 | |
dc.description.sponsorship | Secure computations - ANR-22-PECY-0003 | |
dc.description.sponsorship | Traitement des flux chiffré s pour la gestion du trafic - ANR-19-CE39-0011 | |
dc.description.sponsorship | La sécurité et la privacy dans les réseaux 5G - ANR-18-CE39-0019 | |
dc.language.iso | en | |
dc.publisher | Springer Nature Switzerland | |
dc.publisher.location | Cham | |
dc.rights.uri | http://creativecommons.org/licenses/by/ | |
dc.source.title | Lecture Notes in Computer Science | |
dc.subject.en | Inner Product Encryption | |
dc.subject.en | Pattern Matching | |
dc.subject.en | Functional Encryption | |
dc.subject.en | Hidden Vector Encryption | |
dc.title.en | Pattern Matching in Encrypted Stream from Inner Product Encryption | |
dc.type | Communication dans un congrès | |
dc.identifier.doi | 10.1007/978-3-031-31368-4_27 | |
dc.subject.hal | Informatique [cs]/Cryptographie et sécurité [cs.CR] | |
bordeaux.page | 774-801 | |
bordeaux.volume | 13940 | |
bordeaux.hal.laboratories | Institut de Mathématiques de Bordeaux (IMB) - UMR 5251 | * |
bordeaux.institution | Université de Bordeaux | |
bordeaux.institution | Bordeaux INP | |
bordeaux.institution | CNRS | |
bordeaux.conference.title | PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography | |
bordeaux.country | US | |
bordeaux.title.proceeding | Lecture Notes in Computer Science | |
bordeaux.conference.city | Atlanta (Georgia) | |
bordeaux.peerReviewed | oui | |
hal.identifier | hal-04087741 | |
hal.version | 1 | |
hal.invited | non | |
hal.proceedings | oui | |
hal.conference.end | 2023-05-10 | |
hal.popular | non | |
hal.audience | Internationale | |
hal.origin.link | https://hal.archives-ouvertes.fr//hal-04087741v1 | |
bordeaux.COinS | ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.btitle=Lecture%20Notes%20in%20Computer%20Science&rft.date=2023-05-02&rft.volume=13940&rft.spage=774-801&rft.epage=774-801&rft.au=BOUSCATI%C3%89,%20%C3%89lie&CASTAGNOS,%20Guilhem&SANDERS,%20Olivier&rft.genre=unknown |
Archivos en el ítem
Archivos | Tamaño | Formato | Ver |
---|---|---|---|
No hay archivos asociados a este ítem. |