Iam working in searching encrypted data and made index of files consist of b+tree of bloom filters in its nodes . And I want to encrypt the tree and bloom filter to make search in it.
This artice might be helpful
https://crypto.stanford.edu/~eujin/papers/secureindex/secureindex.pdf
create inverted index which consist of words mapping to files contain this words. then i want to encrypt this inverted index by using some encryption algorithm.
07 August 2019 3,797 7 View
When i compute the time complexity of cipher text policy attribute based encryption CP-ABE . I found it O(1) by tracing each step in code which mostly are assignments operations. Is it possible...
05 June 2019 4,326 6 View
iam already read about RC2 encryption algorithm but for mor explanation , i want an example that explain the algorithm.
06 July 2018 367 0 View
iam working in searching encrypted data, then retrieving from this data. i want to compute precision and recall so i want to know the formula to compute true positive , false positive , true...
03 April 2018 7,456 8 View
i write code contain vector of legth 1000 that vector split into two vectors of same length follow specific algorithm , this two vectors multiply into inverse of two matrices that should be the...
01 February 2018 9,107 5 View
I have binary vector of 0s and 1s that i want to encrypt it then make search in it. First i convert vector into hashmap Which key represent index of each dimension in this vector and value...
09 October 2017 4,242 2 View
iam working in searchable encryption. first i make index for set of files, the index is B+ tree , the leaf of this tree is bloom filter which represent the words in each file. each bloom filter...
09 October 2017 6,065 2 View
in the following code in euclidean hash some of the result of the rand.nextGaussian() implementation is negative when set dimension 100 and w is 2. which affect in the hash method. public...
06 July 2017 2,749 5 View
i want to implement Pseudo Random Function for these two functions in java: f(sk,.)={0,1}^* multiply sk ---> {0,1}^k, where sk is secret key (a random key). g(.,.)= {0,1}^k multiply {0,1}...
06 July 2017 4,571 3 View
he paper propose scheme for search in encrypted data using the tree of bloom filters as data structure to represent the index of the files then encrypted the leaves of the tree which consist of...
05 June 2017 1,654 2 View
I would like to understand potential safety concerns while handling SEB in the lab. Especially while working in animal house facility. Would like to know precautions for handling. Sigma MSDS...
07 August 2024 6,034 3 View
During low-temperature testing, new diffraction peaks that appear could be indicative of several phenomena. In one of our tests, we observed notable new peaks around 40° and 45° in a specific...
06 August 2024 726 3 View
I am new to Micromechanics and having similar problem with understanding the implementation of the formula's. I would appreciate if anyone can guide me on how to go about getting a scalar value...
30 July 2024 969 0 View
Some Staphylococcus aureus strains Inhibit the growth of Mycobacteria in Mueller Hinton Agar medium containing 10% OADC. Do some Staphylococcus aureus strains have in vitro antimycobacterial activity?
29 July 2024 10,023 2 View
Please, what is the memory consumption of the Matlab function quad tree decomposition procedure [S = qtdecomp(I)] with respect to the input set I?
27 July 2024 5,455 2 View
all math can be traversed by code? all math can be translate to code?
26 July 2024 9,530 0 View
Hello, I am a research scholar currently working on a project involving image segmentation, and I am interested in using differential evolution for this purpose . I would greatly appreciate it if...
25 July 2024 9,926 1 View
Hello!!! I want to implement the Swerling characteristics functions (CF) directly in MATLAB without using its Fourier integral pairs...the Swerling CFs are actually Laplace Transform of the signal...
23 July 2024 4,925 1 View
Hello, colleagues! There is commenting open for new upcoming edition of USP 1033. Validation target acceptance criteria is now different from what it used to be and it doesn't include Cpm....
23 July 2024 7,292 3 View
I have immunized BalB/C mice with a protein using the intradermal (ID) method with Complete Freund's Adjuvant (CFA) and Incomplete Freund's Adjuvant (IFA), following a 14-day interval and three...
22 July 2024 9,160 2 View