Proceedings of the 2017 ACM International Conference on Management of Data 2017
DOI: 10.1145/3035918.3035948
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Comparable Encryption in SIGMOD'16

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…Karras et al [25] presented range predicate solution using Matrix multiplication based technique. However Horst et al [23] presented the cryptanalysis of the scheme where they were able to break their security claims. Secure Database Systems: Hacigümüş et al [19] proposed the first system for executing SQL queries over encrypted data.…”
Section: Related Workmentioning
confidence: 99%
“…Karras et al [25] presented range predicate solution using Matrix multiplication based technique. However Horst et al [23] presented the cryptanalysis of the scheme where they were able to break their security claims. Secure Database Systems: Hacigümüş et al [19] proposed the first system for executing SQL queries over encrypted data.…”
Section: Related Workmentioning
confidence: 99%
“…[28] is based on symmetric-key cryptography. After that, many schemes have been proposed to improve the performance or security [13], [14], [31], or to realize order preserving encryption and its variants by relaxing IND-CPA security [2], [7], [8], [17], [19]. In addition to algorithmic constructions of symmetric-key searchable encryption, its integration into database management systems was also studied in Refs.…”
Section: Introductionmentioning
confidence: 99%
“…However, DET and OPE can be used in the particular case of encrypting unique attributes, and attributes that cannot be ordered. 1 The paper of Karras et al [42] belongs to the family of works related to OPE schemes, but lacks formal provable security guarantees; the recent work of Horst et al [37] provides attacks against the schemes proposed by Karras, denoting the importance of rigorous security analysis of newly proposed schemes. …”
mentioning
confidence: 99%