Improved reconstruction attacks on encrypted data using range query leakage

MS Lacharité, B Minaud… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We analyse the security of database encryption schemes supporting range queries against
persistent adversaries. The bulk of our work applies to a generic setting, where the …

Leakage-abuse attacks against order-revealing encryption

P Grubbs, K Sekniqi, V Bindschaedler… - … IEEE symposium on …, 2017 - ieeexplore.ieee.org
Order-preserving encryption and its generalization order-revealing encryption (OPE/ORE)
allow sorting, performing range queries, and filtering data-all while only having access to …

Order-revealing encryption: New constructions, applications, and lower bounds

K Lewi, DJ Wu - Proceedings of the 2016 ACM SIGSAC Conference on …, 2016 - dl.acm.org
In the last few years, there has been significant interest in develo** methods to search
over encrypted data. In the case of range queries, a simple solution is to encrypt the contents …

Function-hiding inner product encryption is practical

S Kim, K Lewi, A Mandal, H Montgomery, A Roy… - … Conference on Security …, 2018 - Springer
In a functional encryption scheme, secret keys are associated with functions and ciphertexts
are associated with messages. Given a secret key for a function f, and a ciphertext for a …

Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection

M Shen, B Ma, L Zhu, R Mijumbi… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Constrained shortest distance (CSD) querying is one of the fundamental graph query
primitives, which finds the shortest distance from an origin to a destination in a graph with a …

Big data analytics over encrypted datasets with seabed

A Papadimitriou, R Bhagwan, N Chandran… - … USENIX symposium on …, 2016 - usenix.org
Today, enterprises collect large amounts of data and leverage the cloud to perform analytics
over this data. Since the data is often sensitive, enterprises would prefer to keep it …

Decision tree evaluation on sensitive datasets for secure e-healthcare systems

M Zhang, Y Chen, W Susilo - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
By collecting and analyzing patients'e-healthcare data in Medical Internet-of-Things (MIOT),
e-Healthcare providers can offer alternative and helpful evaluation services of the risk of …

HEDA: multi-attribute unbounded aggregation over homomorphically encrypted database

X Ren, L Su, Z Gu, S Wang, F Li, Y **e, S Bian… - Proceedings of the …, 2022 - dl.acm.org
Recent years have witnessed the rapid development of the encrypted database, due to the
increasing number of data privacy breaches and the corresponding laws and regulations …

What else is revealed by order-revealing encryption?

FB Durak, TM DuBuisson, D Cash - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
The security of order-revealing encryption (ORE) has been unclear since its invention.
Dataset characteristics for which ORE is especially insecure have been identified, such as …

HardIDX: Practical and secure index with SGX

B Fuhry, R Bahmani, F Brasser, F Hahn… - Data and Applications …, 2017 - Springer
Software-based approaches for search over encrypted data are still either challenged by
lack of proper, low-leakage encryption or slow performance. Existing hardware-based …