Improved reconstruction attacks on encrypted data using range query leakage
MS Lacharité, B Minaud… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We analyse the security of database encryption schemes supporting range queries against
persistent adversaries. The bulk of our work applies to a generic setting, where the …
persistent adversaries. The bulk of our work applies to a generic setting, where the …
Leakage-abuse attacks against order-revealing encryption
Order-preserving encryption and its generalization order-revealing encryption (OPE/ORE)
allow sorting, performing range queries, and filtering data-all while only having access to …
allow sorting, performing range queries, and filtering data-all while only having access to …
Order-revealing encryption: New constructions, applications, and lower bounds
In the last few years, there has been significant interest in develo** methods to search
over encrypted data. In the case of range queries, a simple solution is to encrypt the contents …
over encrypted data. In the case of range queries, a simple solution is to encrypt the contents …
Function-hiding inner product encryption is practical
In a functional encryption scheme, secret keys are associated with functions and ciphertexts
are associated with messages. Given a secret key for a function f, and a ciphertext for a …
are associated with messages. Given a secret key for a function f, and a ciphertext for a …
Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection
Constrained shortest distance (CSD) querying is one of the fundamental graph query
primitives, which finds the shortest distance from an origin to a destination in a graph with a …
primitives, which finds the shortest distance from an origin to a destination in a graph with a …
Big data analytics over encrypted datasets with seabed
Today, enterprises collect large amounts of data and leverage the cloud to perform analytics
over this data. Since the data is often sensitive, enterprises would prefer to keep it …
over this data. Since the data is often sensitive, enterprises would prefer to keep it …
Decision tree evaluation on sensitive datasets for secure e-healthcare systems
By collecting and analyzing patients'e-healthcare data in Medical Internet-of-Things (MIOT),
e-Healthcare providers can offer alternative and helpful evaluation services of the risk of …
e-Healthcare providers can offer alternative and helpful evaluation services of the risk of …
HEDA: multi-attribute unbounded aggregation over homomorphically encrypted database
Recent years have witnessed the rapid development of the encrypted database, due to the
increasing number of data privacy breaches and the corresponding laws and regulations …
increasing number of data privacy breaches and the corresponding laws and regulations …
What else is revealed by order-revealing encryption?
The security of order-revealing encryption (ORE) has been unclear since its invention.
Dataset characteristics for which ORE is especially insecure have been identified, such as …
Dataset characteristics for which ORE is especially insecure have been identified, such as …
HardIDX: Practical and secure index with SGX
Software-based approaches for search over encrypted data are still either challenged by
lack of proper, low-leakage encryption or slow performance. Existing hardware-based …
lack of proper, low-leakage encryption or slow performance. Existing hardware-based …