Order-revealing encryption: New constructions, applications, and lower bounds

K Lewi, DJ Wu - Proceedings of the 2016 ACM SIGSAC Conference on …, 2016 - dl.acm.org
In the last few years, there has been significant interest in developing methods to search
over encrypted data. In the case of range queries, a simple solution is to encrypt the contents …

Critical perspectives on provable security: Fifteen years of" another look" papers

N Koblitz, A Menezes - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …

EncodeORE: reducing leakage and preserving practicality in order-revealing encryption

Z Liu, S Lv, J Li, Y Huang, L Guo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Order-preserving encryption (OPE) is a cryptographic primitive that preserves the order of
plaintexts. In the past few years, many OPE schemes were proposed to solve the problem of …

Order-preserving encryption secure beyond one-wayness

I Teranishi, M Yung, T Malkin - … 2014: 20th International Conference on the …, 2014 - Springer
Semantic-security of individual plaintext bits given the corresponding ciphertext is a
fundamental notion in modern cryptography. We initiate the study of this basic problem for …

Functional encryption and property preserving encryption: New definitions and positive results

S Agrawal, S Agrawal, S Badrinarayanan… - Cryptology ePrint …, 2013 - eprint.iacr.org
Functional Encryption (FE) is an exciting new paradigm that extends the notion of public key
encryption. In this work we explore the security of Inner Product Functional Encryption …

SCALE: An efficient framework for secure dynamic skyline query processing in the cloud

W Wang, H Li, Y Peng, SS Bhowmick, P Chen… - Database Systems for …, 2020 - Springer
It is now cost-effective to outsource large dataset and perform query over the cloud.
However, in this scenario, there exist serious security and privacy issues that sensitive …

SegGuard: segmentation-based anonymization of network data in clouds for privacy-preserving security auditing

M Oqaily, Y Jarraya, M Mohammady… - … on Dependable and …, 2019 - ieeexplore.ieee.org
Security auditing allows cloud tenants to verify the compliance of cloud infrastructure with
respect to desirable security properties, eg, whether a tenant's virtual network is properly …

[图书][B] Searchable Encryption: From Concepts to Systems

K Ren, C Wang - 2023 - Springer
This book comprehensively reviews searchable encryption, which represents a series of
research developments that directly enable search functionality over encrypted data. The …

An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud

P Chen, B Xu, H Li, W Wang, Y Peng… - Data Science and …, 2024 - Springer
This study introduces an innovative framework named scale for processing dynamic skyline
queries securely in cloud environments. Unlike previous approaches that require complex …

Fast order-preserving encryption from uniform distribution sampling

YH Hwang, S Kim, JW Seo - Proceedings of the 2015 ACM Workshop on …, 2015 - dl.acm.org
Order-preserving encryption (OPE) is a symmetric encryption that ciphertexts preserve
numerical ordering of the corresponding plaintexts. It allows various applications to search …