We present an efficient method for answering one-dimensional range and closest-point queries in a verifiable and privacy-preserving manner. We consider a model where a data owner outsources a dataset of key-value pairs to a server, who answers range and closest-point queries issued by a client and provides proofs of the answers. The client verifies the correctness of the answers while learning nothing about the dataset besides the answers to the current and previous queries. Our work yields for the first time a zero-knowledge privacy assurance to authenticated range and closest-point queries. Previous work leaked the size of the dataset and used an inefficient proof protocol. Our construction is based on hierarchical identity-based encrypt...
Counting the fraction of a population having an input within a specified interval i.e. a range query...
Summarization: We consider a data owner that outsources its dataset to an untrusted server. The owne...
We consider a data owner that outsources its dataset to an untrusted server. The owner wishes to ena...
Abstract. We present an efficient method for answering one-dimensional range and closest-point queri...
Zero-knowledge elementary databases (ZK-EDBs) are cryptographic schemes that allow a prover to commi...
Efficient Protocols for Set Membership and Range Proofs The goal of this master thesis was to give a...
Abstract. A consistent query protocol (CQP) allows a database owner to publish a very short string c...
Part 1: Data Anonymization and ComputationInternational audienceWe consider the problem of a client ...
Zero-knowledge proofs of knowledge are now used in numerous applications and permit to prove the kno...
International audienceZero-knowledge elementary databases (ZK-EDBs) are cryptographic schemes that a...
In this article, we demonstrate that, ignoring computational constraints, it is possible to release ...
In a range proof, the prover convinces the verifier in zero-knowledge that he has encrypted or commi...
We consider a data owner that outsources its dataset to an untrusted server. The owner wishes to ena...
We study the problem of privacy-preserving proofs on streamed authenticated data. In this setting, ...
In distance-bounding authentication protocols, a verifier confirms that a prover is (1) legitimate a...
Counting the fraction of a population having an input within a specified interval i.e. a range query...
Summarization: We consider a data owner that outsources its dataset to an untrusted server. The owne...
We consider a data owner that outsources its dataset to an untrusted server. The owner wishes to ena...
Abstract. We present an efficient method for answering one-dimensional range and closest-point queri...
Zero-knowledge elementary databases (ZK-EDBs) are cryptographic schemes that allow a prover to commi...
Efficient Protocols for Set Membership and Range Proofs The goal of this master thesis was to give a...
Abstract. A consistent query protocol (CQP) allows a database owner to publish a very short string c...
Part 1: Data Anonymization and ComputationInternational audienceWe consider the problem of a client ...
Zero-knowledge proofs of knowledge are now used in numerous applications and permit to prove the kno...
International audienceZero-knowledge elementary databases (ZK-EDBs) are cryptographic schemes that a...
In this article, we demonstrate that, ignoring computational constraints, it is possible to release ...
In a range proof, the prover convinces the verifier in zero-knowledge that he has encrypted or commi...
We consider a data owner that outsources its dataset to an untrusted server. The owner wishes to ena...
We study the problem of privacy-preserving proofs on streamed authenticated data. In this setting, ...
In distance-bounding authentication protocols, a verifier confirms that a prover is (1) legitimate a...
Counting the fraction of a population having an input within a specified interval i.e. a range query...
Summarization: We consider a data owner that outsources its dataset to an untrusted server. The owne...
We consider a data owner that outsources its dataset to an untrusted server. The owner wishes to ena...