2007 IEEE Symposium on Security and Privacy (SP '07) 2007
DOI: 10.1109/sp.2007.29
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Dimensional Range Query over Encrypted Data

Abstract: We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and various other applications. Our scheme allows a network gateway to encrypt summaries of network flows before submitting them to an untrusted repository. When network intrusions are suspected, an authority can release a key to an auditor, allowing the auditor to decrypt flows whose attributes (e.g., source and destination addresses, por… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
267
0
2

Year Published

2009
2009
2019
2019

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 399 publications
(277 citation statements)
references
References 36 publications
0
267
0
2
Order By: Relevance
“…Allowing range queries on encrypted data in the public-key setting was studied in [11,28]. While their schemes provably provide strong security, they are not efficient in our setting, requiring to scan the whole database on every query.…”
Section: Introductionmentioning
confidence: 99%
“…Allowing range queries on encrypted data in the public-key setting was studied in [11,28]. While their schemes provably provide strong security, they are not efficient in our setting, requiring to scan the whole database on every query.…”
Section: Introductionmentioning
confidence: 99%
“…Shi and Waters [17] constructed a conjunction predicate encryption scheme. In [18], Shi, et al proposed a scheme for range queries. Boneh and Waters [19] developed a scheme that handles conjunctions and range queries while satisfying a stronger notion of attribute hiding.…”
Section: Related Workmentioning
confidence: 99%
“…The identity based TBE scheme requires an online TA, from whom the receiver can obtain its private key corresponding to trust rating value r in the communication round t. The binary tree-based technique for range queries over the encrypted data [5] is used to generate the private keys with the desired property. As illustrated in [1], the root of the binary tree with depth d is labeled (representing the string of length 0), a left-child at node s will be labeled as s0, and a right-child node will be labeled as s1 as shown in Fig …”
Section: A Brief Introduction To Original Tbe Schemementioning
confidence: 99%