메뉴 건너뛰기




Volumn , Issue , 2013, Pages 463-477

An ideal-security protocol for order-preserving encoding

Author keywords

encoding; order preserving encryption

Indexed keywords

CIPHERTEXTS; ENCRYPTED DATA; ENCRYPTION SCHEMES; MICRO-BENCHMARKS; MYSQL DATABASE; ORDERS OF MAGNITUDE; PLAINTEXT; SORT ORDERS;

EID: 84881262361     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2013.38     Document Type: Conference Paper
Times cited : (328)

References (40)
  • 1
    • 67649635197 scopus 로고    scopus 로고
    • Database management as a service: Challenges and opportunities
    • D. Agrawal, A. El Abbadi, F. Emekci, and A. Metwally. Database management as a service: Challenges and opportunities. In ICDE, 2009.
    • (2009) ICDE
    • Agrawal, D.1    El Abbadi, A.2    Emekci, F.3    Metwally, A.4
  • 3
    • 84881246021 scopus 로고    scopus 로고
    • System and method of sort-order preserving tokenization
    • US Patent Application 13/450,809
    • G. W. Ang, J. H. Woelfel, and T. P. Woloszyn. System and method of sort-order preserving tokenization. US Patent Application 13/450,809, 2012.
    • (2012)
    • Ang, G.W.1    Woelfel, J.H.2    Woloszyn, T.P.3
  • 5
    • 84881250786 scopus 로고    scopus 로고
    • Dictionary-based order-preserving string compression for main memory column stores
    • C. Binnig, S. Hildenbrand, and F. Färber. Dictionary-based order-preserving string compression for main memory column stores. In ACM SIGMOD, 2009.
    • (2009) ACM SIGMOD
    • Binnig, C.1    Hildenbrand, S.2    Färber, F.3
  • 7
    • 84881219587 scopus 로고    scopus 로고
    • Order-preserving encryption revisited: Improved security analysis and alternative solutions
    • A. Boldyreva, N. Chenette, and A. O'Neill. Order-preserving encryption revisited: improved security analysis and alternative solutions. In CRYPTO, 2011.
    • (2011) CRYPTO
    • Boldyreva, A.1    Chenette, N.2    O'Neill, A.3
  • 8
    • 57949088292 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In Theory of Cryptography, 2007.
    • (2007) Theory of Cryptography
    • Boneh, D.1    Waters, B.2
  • 9
    • 84881250760 scopus 로고    scopus 로고
    • CipherCloud. Tokenization for cloud data. http://www.ciphercloud.com/ tokenization-cloud-data.aspx.
    • Tokenization for Cloud Data
  • 11
    • 34249721556 scopus 로고    scopus 로고
    • Concurrent programming without locks
    • K. Fraser and T. Harris. Concurrent programming without locks. ACM TOCS, 25(2), 2007.
    • (2007) ACM TOCS , vol.25 , Issue.2
    • Fraser, K.1    Harris, T.2
  • 13
    • 34548786107 scopus 로고    scopus 로고
    • Fast, secure encryption for indexing in a column-oriented DBMS
    • T. Ge and S. B. Zdonik. Fast, secure encryption for indexing in a column-oriented DBMS. In ICDE, 2007.
    • (2007) ICDE
    • Ge, T.1    Zdonik, S.B.2
  • 14
    • 77954592905 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry. Fully homomorphic encryption using ideal lattices. In ACM STOC, 2009.
    • (2009) ACM STOC
    • Gentry, C.1
  • 16
    • 33750295660 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press
    • O. Goldreich. Foundations of Cryptography: Volume I Basic Tools. Cambridge University Press, 2001.
    • (2001) Basic Tools , vol.1
    • Goldreich, O.1
  • 17
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press
    • O. Goldreich. Foundations of Cryptography: Volume II Basic Applications. Cambridge University Press, 2004.
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 19
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • H. Hacigümüş, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted data in the database-service-provider model. In ACM SIGMOD, 2002.
    • (2002) ACM SIGMOD
    • Hacigümüş, H.1    Iyer, B.2    Li, C.3    Mehrotra, S.4
  • 20
    • 77956795060 scopus 로고    scopus 로고
    • MV-OPES: Multivalued-order preserving encryption scheme: A novel scheme for encrypting integer value to many different values
    • H. Kadhem, T. Amagasa, and H. Kitagawa. MV-OPES: Multivalued-order preserving encryption scheme: A novel scheme for encrypting integer value to many different values. IEICE Trans. on Info. and Systems, E93.D(9), 2010.
    • (2010) IEICE Trans. on Info. and Systems , vol.E93.D , Issue.9
    • Kadhem, H.1    Amagasa, T.2    Kitagawa, H.3
  • 22
    • 84871817029 scopus 로고    scopus 로고
    • On the limits of privacy provided by order-preserving encryption
    • V. Kolesnikov and A. Shikfa. On the limits of privacy provided by order-preserving encryption. Bell Labs Technical Journal, 17(3), 2012.
    • (2012) Bell Labs Technical Journal , vol.17 , Issue.3
    • Kolesnikov, V.1    Shikfa, A.2
  • 23
    • 77950278191 scopus 로고    scopus 로고
    • Chaotic order preserving encryption for efficient and secure queries on databases
    • S. Lee, T.-J. Park, D. Lee, T. Nam, and S. Kim. Chaotic order preserving encryption for efficient and secure queries on databases. IEICE Trans. on Info. and Systems, E92.D(11), 2009.
    • (2009) IEICE Trans. on Info. and Systems , vol.E92.D , Issue.11
    • Lee, S.1    Park, T.-J.2    Lee, D.3    Nam, T.4    Kim, S.5
  • 27
    • 84881391444 scopus 로고    scopus 로고
    • Nonlinear order preserving index for encrypted database query in service cloud environments
    • D. Liu and S. Wang. Nonlinear order preserving index for encrypted database query in service cloud environments. Concurrency and Computation: Practice and Experience, 2013.
    • (2013) Concurrency and Computation: Practice and Experience
    • Liu, D.1    Wang, S.2
  • 28
    • 84925827178 scopus 로고    scopus 로고
    • Privacy-preserving logarithmic-time search on encrypted data in cloud
    • Y. Lu. Privacy-preserving logarithmic-time search on encrypted data in cloud. In NDSS, 2012.
    • (2012) NDSS
    • Lu, Y.1
  • 29
    • 0001263548 scopus 로고
    • A certified digital signature
    • R. C. Merkle. A certified digital signature. In CRYPTO, 1989.
    • (1989) CRYPTO
    • Merkle, R.C.1
  • 31
    • 84995409596 scopus 로고    scopus 로고
    • Property preserving symmetric encryption
    • O. Pandey and Y. Rouselakis. Property preserving symmetric encryption. In EUROCRYPT, 2012.
    • (2012) EUROCRYPT
    • Pandey, O.1    Rouselakis, Y.2
  • 34
    • 84881254837 scopus 로고    scopus 로고
    • An ideal-security protocol for order-preserving encoding
    • Mar.
    • R. A. Popa, F. H. Li, and N. Zeldovich. An ideal-security protocol for order-preserving encoding. Cryptology ePrint Archive, Mar. 2013. http://eprint.iacr.org/.
    • (2013) Cryptology ePrint Archive
    • Popa, R.A.1    Li, F.H.2    Zeldovich, N.3
  • 37
    • 84881223190 scopus 로고    scopus 로고
    • Vormetric. Cloud encryption. http://www.vormetric.com/products/ encryption/cloud-encryption/.
    • Cloud Encryption
  • 38
    • 84881248842 scopus 로고    scopus 로고
    • Extending order preserving encryption for multi-user systems
    • Report 2012/192
    • L. Xiao, I.-L. Yen, and D. T. Huynh. Extending order preserving encryption for multi-user systems. Cryptology ePrint Archive, Report 2012/192, 2012.
    • (2012) Cryptology ePrint Archive
    • Xiao, L.1    Yen, I.-L.2    Huynh, D.T.3
  • 39
    • 84881224278 scopus 로고    scopus 로고
    • A note for the ideal order-preserving encryption object and generalized order-preserving encryption
    • Report 2012/350
    • L. Xiao, I.-L. Yen, and D. T. Huynh. A note for the ideal order-preserving encryption object and generalized order-preserving encryption. Cryptology ePrint Archive, Report 2012/350, 2012.
    • (2012) Cryptology ePrint Archive
    • Xiao, L.1    Yen, I.-L.2    Huynh, D.T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.