Back to Results
First PageMeta Content
Paillier cryptosystem / Deterministic encryption / PostgreSQL / Query optimizer / Column / Select / Bitmap index / Query plan / Initialization vector / Cryptography / Data management / Homomorphic encryption


Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL
Add to Reading List

Document Date: 2015-03-27 16:16:57


Open Document

File Size: 631,98 KB

Share Result on Facebook

City

Trento / /

Company

AES / LocalDecrypt / M ONOMI’s ILP / SSB / M ONOMI’s / Ge / LocalProjection / Zdonik / NTL / CBC / RemoteSQL SELECT GROUP / Intel / JOIN / /

Country

Italy / /

Currency

USD / /

Facility

M ONOMI ODBC library / Execution-Greedy bar / /

IndustryTerm

encrypted query processing / final query processing / naïve algorithm / query processing / client/server / distinct groups / client-side query processing / untrusted database server / decryption operators / minimum cost solution / application developer / secure processors / database server / backend database server / plaintext query processing / possible solution / encrypted data processing / lineitem groups / materialized view selection tools / adversarial server / keyword search query / computing / post-processing time / /

OperatingSystem

Linux / /

Organization

MIT / VLDB Endowment / /

Person

Riva del Garda / Samuel Madden / M ONOMI / Stephen Tu / /

Position

designer and planner / optimizing designer and planner / +Planner / designer / and planner / optimizing planner / designer and a planner / query workload Client application Monomi designer / physical database designer / designer / administrator / representative / query planner / planner / Client application Monomi designer SQL query Results Client ODBC driver / optimizing designer / /

Product

Paillier / Postgres / /

ProgrammingLanguage

R / SQL / L / OCAL / C++ / /

Technology

OPE encryption / LAN / RAM / TPM chips / Xeon E5520 processors / Linux / Paillier encryption / block cipher / homomorphic encryption / 6.2 Algorithm / client using Algorithm / DBMS / Blowfish algorithm / RAID / encryption / pruning heuristics The algorithm / cryptography / 41 42 43 Algorithm / public key / deterministic encryption / naïve algorithm / 6.5 With constraints The designer algorithm / caching / Xeon E5530 processors / order-preserving encryption / client/server / /

SocialTag