Order-Preserving Symmetric Encryption

From MaRDI portal
Publication:3627437

DOI10.1007/978-3-642-01001-9_13zbMath1239.94037OpenAlexW1895952394MaRDI QIDQ3627437

Alexandra Boldyreva, Adam O'Neill, Nathan Chenette, Younho Lee

Publication date: 12 May 2009

Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_13



Related Items

Impossibility of order-revealing encryption in idealized models, A ciphertext-size lower bound for order-preserving encryption with limited leakage, Ciphertext expansion in limited-leakage order-preserving encryption: a tight computational lower bound, Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption, Verifiable Range Query Processing for Cloud Computing, Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries, Efficient multi-client order-revealing encryption and its applications, Encrypted key-value stores, Cloud-assisted secure biometric identification with sub-linear search efficiency, Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security, CDPS: a cryptographic data publishing system, A query privacy-enhanced and secure search scheme over encrypted data in cloud computing, Efficient request-based comparable encryption scheme based on sliding window method, Privacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectives, Privacy-preserving Krawtchouk moment feature extraction over encrypted image data, MDOPE: efficient multi-dimensional data order preserving encryption scheme, Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation, Approximate distance-comparison-preserving symmetric encryption, New algorithms and analyses for sum-preserving encryption, On the average cost of order-preserving encryption based on hypergeometric distribution, Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection, Enabling Compressed Encryption for Cloud Based Big Data Stores, Practical Order-Revealing Encryption with Limited Leakage, Processing secure, verifiable and efficient SQL over outsourced database, Constraining Pseudorandom Functions Privately, Semi-order preserving encryption, Order-Preserving Symmetric Encryption, An improved negative binomial approximation with high accuracy to the negative hypergeometric probability for order-preserving encryption, Integer polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sorting, A novel vertical fragmentation method for privacy protection based on entropy minimization in a relational database, Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model, Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity, Ad Hoc PSM Protocols: Secure Computation Without Coordination


Uses Software


Cites Work