2022
DOI: 10.1109/tdsc.2020.3029845
|View full text |Cite
|
Sign up to set email alerts
|

EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption

Abstract: Order-preserving encryption (OPE) is a cryptographic primitive that preserves the order of plaintexts. In the past few years, many OPE schemes were proposed to solve the problem of executing range queries in encrypted databases. However, OPE leaks some certain information (for example, the order of ciphertext), so it is vulnerable to many attacks. Subsequently, order-revealing encryption (ORE) was proposed by Boneh et al. (Eurocrypt 2015) as a generalization of order-preserving encryption. It breaks through th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 47 publications
0
14
0
Order By: Relevance
“…erefore, designing a TRE that can support the specified arbitrary release time, anonymize the user identity, and prevent the time server from denial-of-service attacks will be a very practical and challenging task in the future. In addition, we will explore the combination of TRE with other cryptographic primitives, such as order-revealing encryption [39], so that more scenarios can have the function of controlling the decryption time.…”
Section: Discussionmentioning
confidence: 99%
“…erefore, designing a TRE that can support the specified arbitrary release time, anonymize the user identity, and prevent the time server from denial-of-service attacks will be a very practical and challenging task in the future. In addition, we will explore the combination of TRE with other cryptographic primitives, such as order-revealing encryption [39], so that more scenarios can have the function of controlling the decryption time.…”
Section: Discussionmentioning
confidence: 99%
“…In this study, three different simulation scenarios were set up and were compared with the betweenness-based algorithm (referred to as the VC model) [35]. e FIR-based model proposed in this study and the VC model were used for identifying the Input: node set G Output: structural hole constraint coefficient, L ni , of all nodes in G (1) for i ∈ G: //G is the node set of the opportunistic network (2) Calculate k (i) (3) for i ∈ G: (4) Calculate Q (i) (5) for i ∈ G: (6) for j ∈ r(i): //r(i) is the set of all neighboring nodes of node i (7) Calculate P ij (8) for q ∈ (r(i) ∩ r(j)): (9) Calculate P iq and P qj (10) Calculate RC i (11) for i ∈ G: (12) Calculate L i (13) for i ∈ G: (14) Calculate L ni (15) return Ln ALGORITHM 1: Algorithm for calculating the importance of structural holes.…”
Section: Methodsmentioning
confidence: 99%
“…Ferry nodes moving between different regions connect to different areas. At present, research studies on ferry nodes mainly include routing algorithms based on ferry nodes [3][4][5][6][7][8][9][10][11][12], ferry node motion path planning [13][14][15][16][17][18][19], and ferry node network signal coverage [20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%
“…e IoT devices that are attacked by the network may have the management rights of the database stolen. To ensure the privacy and security of the database, the authors of [5,6] proposed encryption algorithms to prevent the leakage of important information. However, in the face of a large number of complex network attacks, it is necessary to ensure network information security from a more comprehensive perspective.…”
Section: Introductionmentioning
confidence: 99%