Leakage-abuse attacks against order-revealing encryption
Order-preserving encryption and its generalization order-revealing encryption (OPE/ORE)
allow sorting, performing range queries, and filtering data-all while only having access to …
allow sorting, performing range queries, and filtering data-all while only having access to …
Improved reconstruction attacks on encrypted data using range query leakage
MS Lacharité, B Minaud… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We analyse the security of database encryption schemes supporting range queries against
persistent adversaries. The bulk of our work applies to a generic setting, where the …
persistent adversaries. The bulk of our work applies to a generic setting, where the …
Order-revealing encryption: New constructions, applications, and lower bounds
In the last few years, there has been significant interest in developing methods to search
over encrypted data. In the case of range queries, a simple solution is to encrypt the contents …
over encrypted data. In the case of range queries, a simple solution is to encrypt the contents …
From keys to databases—real-world applications of secure multi-party computation
We discuss the widely increasing range of applications of a cryptographic technique called
multi-party computation. For many decades, this was perceived to be of purely theoretical …
multi-party computation. For many decades, this was perceived to be of purely theoretical …
Practical order-revealing encryption with limited leakage
In an order-preserving encryption scheme, the encryption algorithm produces ciphertexts
that preserve the order of their plaintexts. Order-preserving encryption schemes have been …
that preserve the order of their plaintexts. Order-preserving encryption schemes have been …
Enabling verifiable and dynamic ranked search over outsourced data
Cloud computing as a promising computing paradigm is increasingly utilized as potential
hosts for users' massive dataset. Since the cloud service provider (CSP) is outside the users' …
hosts for users' massive dataset. Since the cloud service provider (CSP) is outside the users' …
Sok: Cryptographically protected database search
Protected database search systems cryptographically isolate the roles of reading from,
writing to, and administering the database. This separation limits unnecessary administrator …
writing to, and administering the database. This separation limits unnecessary administrator …
The tao of inference in privacy-protected databases
To protect database confidentiality even in the face of full compromise while supporting
standard functionality, recent academic proposals and commercial products rely on a mix of …
standard functionality, recent academic proposals and commercial products rely on a mix of …
Privacy-preserving range query over multi-source electronic health records in public clouds
Range query is an important data search technique in cloud-based electronic healthcare
(eHealth) systems. It enables authorized doctors to retrieve target electronic health records …
(eHealth) systems. It enables authorized doctors to retrieve target electronic health records …
VRFMS: Verifiable ranked fuzzy multi-keyword search over encrypted data
Searchable encryption (SE) allows users to efficiently retrieve data over encrypted cloud
data, but most existing SE schemes only support exact keyword search, resulting in false …
data, but most existing SE schemes only support exact keyword search, resulting in false …