26 Questions 9 Answers 0 Followers
Questions related from Amal Hashim
create inverted index which consist of words mapping to files contain this words. then i want to encrypt this inverted index by using some encryption algorithm.
08 August 2019 3,756 7 View
When i compute the time complexity of cipher text policy attribute based encryption CP-ABE . I found it O(1) by tracing each step in code which mostly are assignments operations. Is it possible...
06 June 2019 4,271 6 View
iam already read about RC2 encryption algorithm but for mor explanation , i want an example that explain the algorithm.
07 July 2018 323 0 View
iam working in searching encrypted data, then retrieving from this data. i want to compute precision and recall so i want to know the formula to compute true positive , false positive , true...
04 April 2018 7,413 8 View
i write code contain vector of legth 1000 that vector split into two vectors of same length follow specific algorithm , this two vectors multiply into inverse of two matrices that should be the...
02 February 2018 9,052 5 View
iam working in searchable encryption. first i make index for set of files, the index is B+ tree , the leaf of this tree is bloom filter which represent the words in each file. each bloom filter...
10 October 2017 6,025 2 View
I have binary vector of 0s and 1s that i want to encrypt it then make search in it. First i convert vector into hashmap Which key represent index of each dimension in this vector and value...
10 October 2017 4,195 2 View
i want to implement Pseudo Random Function for these two functions in java: f(sk,.)={0,1}^* multiply sk ---> {0,1}^k, where sk is secret key (a random key). g(.,.)= {0,1}^k multiply {0,1}...
07 July 2017 4,525 3 View
in the following code in euclidean hash some of the result of the rand.nextGaussian() implementation is negative when set dimension 100 and w is 2. which affect in the hash method. public...
07 July 2017 2,696 5 View
he paper propose scheme for search in encrypted data using the tree of bloom filters as data structure to represent the index of the files then encrypted the leaves of the tree which consist of...
06 June 2017 1,606 2 View
Iam working in searching encrypted data and made index of files consist of b+tree of bloom filters in its nodes . And I want to encrypt the tree and bloom filter to make search in it.
02 February 2017 3,951 1 View
iam working in searching encrypted data in cloud computing and i want to combine attribute based encryption with searchable encryption , i search for java library implementing ciphertext policy...
07 July 2016 3,621 8 View
i want to create index in the form of neural network consist of query terms as input neurons and keywords as hidden neurons and documents id as output neurons.
05 May 2016 7,267 3 View
i know that Locality-Sensitive Hashing (LSH) is an algorithm for solving the approximate or exact Near Neighbor Search in high dimensional spaces.
05 May 2016 5,224 4 View
as i know inverted index consist of keywords and the document identifiers contain this keyword and the search on this index structure is sequential for single keyword search but if i want to...
05 May 2016 2,663 4 View
i want to work in cloud computing as a part of my research work. seeking an advise on the research area in searchable encryption in cloud computing.
04 April 2016 4,314 12 View
I am lost in : Hadoop, Solr, Cloudera, Carrot2, Hesse and Lucence. If you could help me narrow this set for my particular scenario it would be great. I am not sure which of the above will fit...
12 December 2015 8,775 1 View
when computing minhash function make some permutations in set then generate minhash signature.
01 January 2015 3,329 0 View
i understood that H1 transform word into trapdoor and H2 transform trapdoor into PEKS or what ?
12 December 2014 9,048 1 View
in paper public key encryption with keyword search i read that attack algorithm has epsilon advantage and make qH hash function and make qT trapdoor queries.
12 December 2014 8,850 1 View
I read in public key encryption with keyword search in construction trapdoor 'permutation source indistinguishable "can any one tell me what this mean?
12 December 2014 9,789 0 View
"Billinear Diffie Hellman is intractable if all polynomial time algorithms have a negligible advantage in solving BDH"?
12 December 2014 7,775 0 View
in public key encryption with keyword search PEKS in Test i note that :Test state that if H2(e(Tw,A))=B when see to lift side e(Tw,A) that Tw=H1(w)^priv and A=g^r so e(Tw,A)=(H1(w)^priv,g^r) when...
12 December 2014 7,118 0 View
When testing between trapdoor and PEKS what is A and B mean?
12 December 2014 3,067 1 View
in attached theorm qT mean A algorithm make at most qT trapdoor query. qH2 mean A make at most qH2 hash function query. e is the base of natural logarithm. €' is possibility of success of...
12 December 2014 1,716 0 View
In claim 3 how prove and what symbols in this claim mean?
12 December 2014 181 1 View