Leakage-abuse attacks against order-revealing encryption

P Grubbs, K Sekniqi, V Bindschaedler… - … IEEE symposium on …, 2017 - ieeexplore.ieee.org
Order-preserving encryption and its generalization order-revealing encryption (OPE/ORE)
allow sorting, performing range queries, and filtering data-all while only having access to …

Improved reconstruction attacks on encrypted data using range query leakage

MS Lacharité, B Minaud… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We analyse the security of database encryption schemes supporting range queries against
persistent adversaries. The bulk of our work applies to a generic setting, where the …

Order-revealing encryption: New constructions, applications, and lower bounds

K Lewi, DJ Wu - Proceedings of the 2016 ACM SIGSAC Conference on …, 2016 - dl.acm.org
In the last few years, there has been significant interest in developing methods to search
over encrypted data. In the case of range queries, a simple solution is to encrypt the contents …

From keys to databases—real-world applications of secure multi-party computation

DW Archer, D Bogdanov, Y Lindell, L Kamm… - The Computer …, 2018 - academic.oup.com
We discuss the widely increasing range of applications of a cryptographic technique called
multi-party computation. For many decades, this was perceived to be of purely theoretical …

Practical order-revealing encryption with limited leakage

N Chenette, K Lewi, SA Weis, DJ Wu - Fast Software Encryption: 23rd …, 2016 - Springer
In an order-preserving encryption scheme, the encryption algorithm produces ciphertexts
that preserve the order of their plaintexts. Order-preserving encryption schemes have been …

Enabling verifiable and dynamic ranked search over outsourced data

Q Liu, Y Tian, J Wu, T Peng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cloud computing as a promising computing paradigm is increasingly utilized as potential
hosts for users' massive dataset. Since the cloud service provider (CSP) is outside the users' …

Sok: Cryptographically protected database search

B Fuller, M Varia, A Yerukhimovich… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Protected database search systems cryptographically isolate the roles of reading from,
writing to, and administering the database. This separation limits unnecessary administrator …

The tao of inference in privacy-protected databases

V Bindschaedler, P Grubbs, D Cash… - Cryptology ePrint …, 2017 - eprint.iacr.org
To protect database confidentiality even in the face of full compromise while supporting
standard functionality, recent academic proposals and commercial products rely on a mix of …

Privacy-preserving range query over multi-source electronic health records in public clouds

J Liang, Z Qin, S Xiao, J Zhang, H Yin, K Li - Journal of Parallel and …, 2020 - Elsevier
Range query is an important data search technique in cloud-based electronic healthcare
(eHealth) systems. It enables authorized doctors to retrieve target electronic health records …

VRFMS: Verifiable ranked fuzzy multi-keyword search over encrypted data

X Li, Q Tong, J Zhao, Y Miao, S Ma… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Searchable encryption (SE) allows users to efficiently retrieve data over encrypted cloud
data, but most existing SE schemes only support exact keyword search, resulting in false …