18 Questions 11 Answers 0 Followers
Questions related from Amal Hashim
I was read in paper in searchable encryption that encrypt bloom filter index in the following way: 1- generate secret key to encrypt bloom filter and query is: the secret key sk (M1, M2, s ),...
04 March 2020 1,580 5 View
When i compute the time complexity of cipher text policy attribute based encryption CP-ABE . I found it O(1) by tracing each step in code which mostly are assignments operations. Is it possible...
27 June 2019 5,735 4 View
I want to calculate size of object in memory in java, so I used Caliper library and used the following method ObjectGraphMeasurer.measure that result the following: Footprint{Objects=270813,...">
13 May 2018 9,063 1 View
i write code contain vector of legth 1000 that vector split into two vectors of same length follow specific algorithm , this two vectors multiply into inverse of two matrices that should be the...
14 February 2018 7,287 5 View
in the following code in euclidean hash some of the result of the rand.nextGaussian() implementation is negative when set dimension 100 and w is 2. which affect in the hash method. public...
13 July 2017 1,027 4 View
This paper introduce searching and retrieving from encrypted data in cloud and encrypted tree index using following technique.
14 June 2017 2,434 2 View
he paper propose scheme for search in encrypted data using the tree of bloom filters as data structure to represent the index of the files then encrypted the leaves of the tree which consist of...
07 June 2017 3,799 2 View
iam working in searching and retrieving from encrypted data in cloud computing and i want to make simulation for my work in cloud . if i used amazon provider which service i should use EC2 or...
07 June 2017 6,186 2 View
i want to implement index as tree with bloom filter using locality sensitive hashing.
21 July 2016 1,317 3 View
iam working in searching encrypted data in cloud computing and i want to combine attribute based encryption with searchable encryption , i search for java library implementing ciphertext policy...
03 July 2016 2,319 8 View
i want to create index in the form of neural network consist of query terms as input neurons and keywords as hidden neurons and documents id as output neurons.
17 May 2016 9,998 3 View
What is the important of using it in this algorithm? In H1list w/ refer to word and h refer to hash of w and c refer to random coin but what about a?
22 December 2014 8,065 2 View
In public key encryption with keyword search I read this sentence in Billinear Diffie Hellman problem.
22 December 2014 6,139 4 View
I cannot understand notions like €, this probability and how to compute.
21 December 2014 6,471 2 View
in attached theorm qT mean A algorithm make at most qT trapdoor query. qH2 mean A make at most qH2 hash function query. e is the base of natural logarithm. €' is possibility of success of...
14 December 2014 9,082 0 View
in H1 list w refer to word and h refer to hash of w and c refer to random coin but what about "a"?
14 December 2014 6,623 2 View
I have read in a public key encryption with keyword search in construction trapdoor "permutation source indistinguishable". Can anyone tell me what this means?
13 December 2014 1,820 2 View
i read in paper public key encryption with keyword search that PEKS algorithm used tuple what mean by using c coin .
11 December 2014 534 2 View