An Ideal-Security Protocol for Order-Preserving Encoding

作者: Raluca A Popa , Frank H Li , Nickolai Zeldovich

DOI: 10.1109/SP.2013.38

关键词:

摘要: … Even though more than a dozen schemes were proposed, all these schemes leak … , meaning that over time, the ciphertexts for a small number of plaintext values change, and we prove …

参考文章(34)
Dae Hyun Yum, Duk Soo Kim, Jin Seok Kim, Pil Joong Lee, Sung Je Hong, Order-Preserving encryption for non-uniformly distributed plaintexts workshop on information security applications. pp. 84- 97 ,(2011) , 10.1007/978-3-642-27890-7_7
Oded Goldreich, Foundations of Cryptography Cambridge University Press. ,(2001) , 10.1017/CBO9780511546891
Omkant Pandey, Yannis Rouselakis, Property Preserving Symmetric Encryption Advances in Cryptology – EUROCRYPT 2012. pp. 375- 391 ,(2012) , 10.1007/978-3-642-29011-4_23
David B. Lomet, James Murray, Gennady Antoshenkov, Order Preserving Compression international conference on data engineering. pp. 655- 663 ,(1996)
Ralph C. Merkle, A Certified Digital Signature international cryptology conference. pp. 218- 238 ,(1989) , 10.1007/0-387-34805-0_21
Dan Boneh, Brent Waters, Conjunctive, Subset, and Range Queries on Encrypted Data Theory of Cryptography. pp. 535- 554 ,(2007) , 10.1007/978-3-540-70936-7_29
Gultekin Ozsoyoglu, Sun S. Chung, Anti-tamper databases: querying encrypted databases DBSec. pp. 133- 146 ,(2006)
Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O’Neill, Order-Preserving Symmetric Encryption international cryptology conference. pp. 224- 241 ,(2009) , 10.1007/978-3-642-01001-9_13
Vladimir Kolesnikov, Abdullatif Shikfa, On the limits of privacy provided by order-preserving encryption Bell Labs Technical Journal. ,vol. 17, pp. 135- 146 ,(2012) , 10.1002/BLTJ.21564