메뉴 건너뛰기




Volumn , Issue , 2014, Pages 275-286

Optimal average-complexity ideal-security order-preserving encryption

Author keywords

Adjustable encryption; Efficiency; Ideal security; In memory column database; Indistinguishability; Order preserving encryption

Indexed keywords

BINARY TREES; DATABASE SYSTEMS; EFFICIENCY;

EID: 84910634035     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2660267.2660277     Document Type: Conference Paper
Times cited : (124)

References (44)
  • 1
    • 84910678872 scopus 로고    scopus 로고
    • http://www.ciphercloud.com/.
  • 2
    • 84910628976 scopus 로고    scopus 로고
    • http://www.vaultive.com/.
  • 3
    • 84910648808 scopus 로고    scopus 로고
    • https://www.cs.cmu.edu/~enron/enron-mail-20110402.tgz.
  • 19
    • 77956795060 scopus 로고    scopus 로고
    • Mv-opes: Multivalued-order preserving encryption scheme: A novel scheme for encrypting integer value to many different values
    • H. Kadhem, T. Amagasa, and H. Kitagawa. Mv-opes: multivalued-order preserving encryption scheme: a novel scheme for encrypting integer value to many different values. IEICE Transactions on Information and Systems, E93.D:2520-2533, 2010.
    • (2010) IEICE Transactions on Information and Systems E93.D , pp. 2520-2533
    • Kadhem, H.1    Amagasa, T.2    Kitagawa, H.3
  • 21
    • 77649186056 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Advances in Cryptology, EUROCRYPT, 2008.
    • (2008) Advances in Cryptology, EUROCRYPT
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 26
    • 84881391444 scopus 로고    scopus 로고
    • Nonlinear order preserving index for encrypted database query in service cloud environments
    • D. Liu and S. Wang. Nonlinear order preserving index for encrypted database query in service cloud environments. Concurrency and Computation: Practice and Experience, 25(13):1967-1984, 2013.
    • (2013) Concurrency and Computation: Practice and Experience , vol.25 , Issue.13 , pp. 1967-1984
    • Liu, D.1    Wang, S.2
  • 31
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over gf(p) and its cryptographic significance
    • S. C. Pohlig and M. E. Hellman. An improved algorithm for computing logarithms over gf(p) and its cryptographic significance. IEEE Transactions on Information Theory, 24(1):106-110, 1978.
    • (1978) IEEE Transactions on Information Theory , vol.24 , Issue.1 , pp. 106-110
    • Pohlig, S.C.1    Hellman, M.E.2
  • 34
    • 1542456902 scopus 로고    scopus 로고
    • The height of a random binary search tree
    • B. Reed. The height of a random binary search tree. Journal of the ACM, 50(3):306-332, 2003.
    • (2003) Journal of the ACM , vol.50 , Issue.3 , pp. 306-332
    • Reed, B.1
  • 37
    • 84904461962 scopus 로고    scopus 로고
    • Security analysis for order preserving encryption schemes
    • Department of Computer Science, University of Texas Dallas
    • L. Xiao, O. Bastani, and I.-L. Yen. Security analysis for order preserving encryption schemes. Technical Report UTDCS-01-12, Department of Computer Science, University of Texas Dallas, 2012.
    • (2012) Technical Report UTDCS-01-12
    • Xiao, L.1    Bastani, O.2    Yen, I.-L.3
  • 38
    • 84881224278 scopus 로고    scopus 로고
    • A note for the ideal order-preserving encryption object and generalized order-preserving encryption
    • L. Xiao and I.-L. Yen. A note for the ideal order-preserving encryption object and generalized order-preserving encryption. Technical Report 350, IACR Cryptology ePrint Archive, 2012.
    • (2012) Technical Report 350 IACR Cryptology EPrint Archive
    • Xiao, L.1    Yen, I.-L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.