Order-Preserving Symmetric Encryption
From MaRDI portal
Publication:3627437
DOI10.1007/978-3-642-01001-9_13zbMath1239.94037OpenAlexW1895952394MaRDI QIDQ3627437
Alexandra Boldyreva, Adam O'Neill, Nathan Chenette, Younho Lee
Publication date: 12 May 2009
Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_13
Related Items
Impossibility of order-revealing encryption in idealized models, A ciphertext-size lower bound for order-preserving encryption with limited leakage, Ciphertext expansion in limited-leakage order-preserving encryption: a tight computational lower bound, Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption, Verifiable Range Query Processing for Cloud Computing, Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries, Efficient multi-client order-revealing encryption and its applications, Encrypted key-value stores, Cloud-assisted secure biometric identification with sub-linear search efficiency, Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security, CDPS: a cryptographic data publishing system, A query privacy-enhanced and secure search scheme over encrypted data in cloud computing, Efficient request-based comparable encryption scheme based on sliding window method, Privacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectives, Privacy-preserving Krawtchouk moment feature extraction over encrypted image data, MDOPE: efficient multi-dimensional data order preserving encryption scheme, Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation, Approximate distance-comparison-preserving symmetric encryption, New algorithms and analyses for sum-preserving encryption, On the average cost of order-preserving encryption based on hypergeometric distribution, Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection, Enabling Compressed Encryption for Cloud Based Big Data Stores, Practical Order-Revealing Encryption with Limited Leakage, Processing secure, verifiable and efficient SQL over outsourced database, Constraining Pseudorandom Functions Privately, Semi-order preserving encryption, Order-Preserving Symmetric Encryption, An improved negative binomial approximation with high accuracy to the negative hypergeometric probability for order-preserving encryption, Integer polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sorting, A novel vertical fragmentation method for privacy protection based on entropy minimization in a relational database, Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model, Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity, Ad Hoc PSM Protocols: Secure Computation Without Coordination
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme
- Random generation of monotonic functions for Monte Carlo solution of qualitative differential equations
- An Efficient Method for Generating Discrete Random Variables with General Distributions
- A Provable-Security Treatment of the Key-Wrap Problem
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Conjunctive, Subset, and Range Queries on Encrypted Data
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
- Deterministic and Efficiently Searchable Encryption
- Order-Preserving Symmetric Encryption
- Computer generation of hypergeometric random variates†
- Algorithm 668
- EXACT AND APPROXIMATED RELATIONS BETWEEN NEGATIVE HYPERGEOMETRIC AND NEGATIVE BINOMIAL PROBABILITIES
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- Data and Applications Security XIX
- Fast Software Encryption