×
Sep 15, 2016 · The proposed PPOPM achieves secure outsourced pattern matching with well protected text privacy and pattern privacy against the collusion between the cloud and ...
An efficient secure outsourced polynomial multiplication protocol OPMUL is proposed which is further exploited in designing the final efficient outsourced ...
Without exploiting public key FHE, the proposed PPOPM achieves secure outsourced pattern matching with well protected text privacy and pattern privacy against ...
Without exploiting public key FHE, the proposed PPOPM achieves secure outsourced pattern matching with well protected text privacy and pattern privacy against ...
Jun 23, 2022 · Jun Zhou, Zhenfu Cao , Xiaolei Dong: PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching. ESORICS (1) 2016: 135-153.
Based on OVFT, we propose an efficient secure verifiable outsourced polynomial multiplication protocol OPVML which is further exploited in designing our final ...
Outsourced pattern matching. Article 02 May 2017. PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching. Chapter © 2016. The Feasibility of ...
... PPOPM: more efficient privacy preserving outsourced pattern matching. In: ESORICS, pp. 135---153 (2016). Crossref · Google Scholar. Cited By. View all. Ngoc ...
... more efficient privacy preserving outsourced pattern matching PPOPM is proposed in this paper. As a building block, a privacy preserving outsourced discrete ...
PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching. Zhou J., Cao Z., Dong X. Q3. Springer Nature. Lecture Notes in Computer Science , 2016 ...