This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
en:group:seminars:20050224 [2009/04/07 11:17] 127.0.0.1 external edit |
en:group:seminars:20050224 [2016/06/23 11:26] (current) |
||
---|---|---|---|
Line 15: | Line 15: | ||
==== abstract ==== | ==== abstract ==== | ||
The problem of securely searching data over an encrypted database is a relatively young cryptographic challenge. In this talk, we will look at some of the proposed approaches, and discuss their strenghts and weaknesses. In a second part, the use of codes for solving this problem will also be explored. | The problem of securely searching data over an encrypted database is a relatively young cryptographic challenge. In this talk, we will look at some of the proposed approaches, and discuss their strenghts and weaknesses. In a second part, the use of codes for solving this problem will also be explored. | ||
+ | |||
+ | {{:en:group:seminars:lorenz0205.pdf|Full presentation}} | ||