Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions

From MaRDI portal
Publication:5199214

DOI10.1007/978-3-642-22792-9_33zbMath1290.94045OpenAlexW2163992091MaRDI QIDQ5199214

Nathan Chenette, Alexandra Boldyreva, Adam O'Neill

Publication date: 12 August 2011

Published in: Advances in Cryptology – CRYPTO 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-22792-9_33




Related Items (22)

Impossibility of order-revealing encryption in idealized modelsA ciphertext-size lower bound for order-preserving encryption with limited leakageCiphertext expansion in limited-leakage order-preserving encryption: a tight computational lower boundVerifiable Range Query Processing for Cloud ComputingRanked Searchable Symmetric Encryption Supporting Conjunctive QueriesEfficient multi-client order-revealing encryption and its applicationsResearch on quantum authentication methods for the secure access control among three elements of cloud computingDynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) securityEfficient request-based comparable encryption scheme based on sliding window methodPractical Attacks on Relational Databases Protected via Searchable EncryptionMDOPE: efficient multi-dimensional data order preserving encryption schemeSecure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementationApproximate distance-comparison-preserving symmetric encryptionAn Almost Non-interactive Order Preserving Encryption SchemeCPP: towards comprehensive privacy preserving for query processing in information networksEnabling Compressed Encryption for Cloud Based Big Data StoresPractical Order-Revealing Encryption with Limited LeakageProcessing secure, verifiable and efficient SQL over outsourced databaseOrder-Revealing Encryption and the Hardness of Private LearningSemi-order preserving encryptionLower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe modelAd Hoc PSM Protocols: Secure Computation Without Coordination






This page was built for publication: Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions