Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,715,835 papers from all fields of science
Search
Sign In
Create Free Account
Deterministic encryption
A deterministic encryption scheme (as opposed to a probabilistic encryption scheme) is a cryptosystem which always produces the same ciphertext for a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Block cipher
Ciphertext
Convergent encryption
Cryptosystem
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform
Jianchao Tang
,
Shaojing Fu
,
Ming Xu
Lecture Notes of the Institute for Computer…
2019
Corpus ID: 195444164
Outsourcing encrypted data to cloud platforms is widely adopted by users, but there are some problems existing in it: one is that…
Expand
2018
2018
Pushing the Limits of Encrypted Databases with Secure Hardware
Panagiotis Antonopoulos
,
A. Arasu
,
+5 authors
J. Szymaszek
arXiv.org
2018
Corpus ID: 52182438
Encrypted databases have been studied for more than 10 years and are quickly emerging as a critical technology for the cloud. The…
Expand
2017
2017
Big Data Privacy Using Fully Homomorphic Non-Deterministic Encryption
Tejashree B. Patil
,
G. K. Patnaik
,
A. T. Bhole
IEEE International Advance Computing Conference
2017
Corpus ID: 32279840
Big data is a large amount of digital information. Now days, data security is a challenging issue that touches several areas…
Expand
Review
2017
Review
2017
Big Data Analysis And Deterministic Encryption Challenges
A. Shafi
,
S. Shah
2017
Corpus ID: 67093310
Over the past decade, big data analysis has seen an exponential growth and will certainly continue to witness spectacular…
Expand
2017
2017
Cryptanalytic study of property-preserving encryption
F. Durak
2017
Corpus ID: 64526037
OF THE DISSERTATION Cryptanalytic Study of Property-Preserving Encryption by Fatma Betül Durak Dissertation Director: David Cash…
Expand
2016
2016
Notes on Property-Preserving Encryption
2016
Corpus ID: 37141462
The first type of specialized encryption scheme that can be used in secure outsourced storage we will look at is property…
Expand
2013
2013
Searchable Deterministic Encryption against the Keyword Guessing Attack by Outside Attacker
L. Zhiyuan
,
L. Zhenghua
2013
Corpus ID: 60810007
Searchable Deterministic Encryption (SDE) was proposed by Bellare et al. It aimed to improve the search performance of the…
Expand
2012
2012
A Unified Approach to Deterministic Encryption : New Constructions and a Connection to Computational Entropy ( Abstract )
A. Beimel
,
Y. Ishai
,
E. Kushilevitz
,
I. Orlov
2012
Corpus ID: 52023033
An information-theoretic private information retrieval (PIR) protocol allows a client to retrieve the i-th bit of a database…
Expand
1998
1998
Safety deterministic encryption key generation system and method
ガイ・エル・フィールダー
,
ポール・エヌ・アリト
1998
Corpus ID: 57798879
(57) [summary] to disclose the encryption key generator having a high resistance to cryptanalysis or brute force attack. Further…
Expand
1988
1988
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Gérard Cohen
,
Marc Giusti
,
T. Mora
Lecture Notes in Computer Science
1988
Corpus ID: 1816878
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE