2013 IEEE Symposium on Security and Privacy 2013
DOI: 10.1109/sp.2013.38
|View full text |Cite
|
Sign up to set email alerts
|

An Ideal-Security Protocol for Order-Preserving Encoding

Abstract: Order-preserving encryption-an encryption scheme where the sort order of ciphertexts matches the sort order of the corresponding plaintexts-allows databases and other applications to process queries involving order over encrypted data efficiently. The ideal security guarantee for order-preserving encryption put forth in the literature is for the ciphertexts to reveal no information about the plaintexts besides order. Even though more than a dozen schemes were proposed, all these schemes leak more information t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
236
0
1

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 302 publications
(237 citation statements)
references
References 27 publications
0
236
0
1
Order By: Relevance
“…These notions are of independent interests and beyond our scope. mOPE and stOPE [38,39]: These notions, introduced by Popa, Li, and Zeldovich, are interactive protocols which allow a user to store plaintexts to a database in their encrypted forms and to compare the sizes of plaintexts in the database. These protocols can be run without revealing any information about plaintexts except their order.…”
Section: Other Related Workmentioning
confidence: 99%
“…These notions are of independent interests and beyond our scope. mOPE and stOPE [38,39]: These notions, introduced by Popa, Li, and Zeldovich, are interactive protocols which allow a user to store plaintexts to a database in their encrypted forms and to compare the sizes of plaintexts in the database. These protocols can be run without revealing any information about plaintexts except their order.…”
Section: Other Related Workmentioning
confidence: 99%
“…In [16] an OPE scheme called mutable order-preserving encoding (mOPE) was proposed that fulfills IND-OCPA with respect to encodings. The mOPE scheme functions by making a balanced search tree comprising all the encrypted data on a server, affording the server the power to order the tree based on the plaintexts without knowing any information about the plaintexts themselves.…”
Section: Introductionmentioning
confidence: 99%
“…This means that the scheme can leak information about the distribution of plaintext values. This paper introduces a novel scheme called Randomized Order Preserving Encryption (ROPE) which follows the mOPE scheme proposed in [16]. In ROPE scheme, DET is replaced with RND (random encryption) for the ciphertexts which prevents the leakage of information about the distribution of plaintext values.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, Bellare et al [17] defined a new primitive, Message-Locked Encryption (MLE), which brought rigor to security de duplication, and captured various security aspects of MLE. Also, they constructed several schemes and provided some detailed analysis over them [18].To strengthen the notions of security by considering plaintext distributions depending on the public parameter, two approaches (fully random scheme and deterministic scheme) that are secure even for lock-dependent message in realistic. It answered the question: Can message-locked encryption be secure for lock dependent message [19].…”
mentioning
confidence: 99%
“…Recently, Bellare et al [17] defined a new primitive, Message-Locked Encryption (MLE), which brought rigor to security de duplication, and captured various security aspects of MLE. Also, they constructed several schemes and provided some detailed analysis over them [18].…”
mentioning
confidence: 99%