2013
DOI: 10.1007/978-3-642-39256-6_13
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Re-encryption Strategy for Joins in Encrypted Databases

Abstract: Abstract. In order to perform a join in a deterministically, adjustably encrypted database one has to re-encrypt at least one column. The problem is to select that column that will result in the minimum number of re-encryptions even under an unknown schedule of joins. Naive strategies may perform too many or even infinitely many re-encryptions. We provide two strategies that allow for a much better performance. In particular the asymptotic behavior is O(n 3/2 ) resp. O(n log n) re-encryptions for n columns. We… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
3
1

Relationship

3
4

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…The computational effort increases compared to the operations applied in the single user mode as the pairing operation is more expensive [22,25]. In addition, optimization strategies can minimize the number of attribute values that have to be re-encrypted in the single user mode [17]. These are not feasible in the multi user mode.…”
Section: Phasementioning
confidence: 99%
“…The computational effort increases compared to the operations applied in the single user mode as the pairing operation is more expensive [22,25]. In addition, optimization strategies can minimize the number of attribute values that have to be re-encrypted in the single user mode [17]. These are not feasible in the multi user mode.…”
Section: Phasementioning
confidence: 99%
“…MONOMI [45] is based on CryptDB with a special focus on efficient analytical query processing. [31] adapts the deterministic proxy re-encryption to provide the data confidentiality. The approaches using deterministic encryption directly leak the duplicates and, as a result, the equality information are leaked to the adversarial servers.…”
Section: Related Work On Secure Joinmentioning
confidence: 99%
“…H π(j) = Enc pk (α π(j) ), Enc pk (β π(j) ), Enc pk (γ π(j) ); 30 set H i = Enc pk (α π(j) ) · Enc pk (α i )||Enc pk (β π(j) ) · Enc pk (β i )||Enc pk (γ π(j) ) · Enc pk (γ i ); 31 Generate a random permutation π : [l] → [l]. Permute new list E(I π (i) ) and H π (i) , then send them back to S 1 ;…”
mentioning
confidence: 99%
“…Changes are made persistent to save costs for future queries. Our database driver loads the current state out of the database and follows the algorithm by Kerschbaum et al [29] for choosing which column to adjust. This algorithm converges to a stable state and it achieves the best possible worst case bound of necessary re-encryption.…”
Section: Deterministic Encryptionmentioning
confidence: 99%