Generic attacks on secure outsourced databases
Recently, various protocols have been proposed for securely outsourcing database storage
to a third party server, ranging from systems with" full-fledged" security based on strong …
to a third party server, ranging from systems with" full-fledged" security based on strong …
Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud
X Chai, Y Wang, Z Gan, X Chen, Y Zhang - Information Sciences, 2022 - Elsevier
Owing to the rapid development of cloud services and personal privacy requirements,
content-based encrypted image retrieval in the cloud has been increasing. Outsourced …
content-based encrypted image retrieval in the cloud has been increasing. Outsourced …
An ideal-security protocol for order-preserving encoding
Order-preserving encryption-an encryption scheme where the sort order of ciphertexts
matches the sort order of the corresponding plaintexts-allows databases and other …
matches the sort order of the corresponding plaintexts-allows databases and other …
Multi-input functional encryption
We introduce the problem of Multi-Input Functional Encryption, where a secret key sk f can
correspond to an n-ary function f that takes multiple ciphertexts as input. We formulate both …
correspond to an n-ary function f that takes multiple ciphertexts as input. We formulate both …
Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption
Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an
encrypted database stored in a server while limiting the information leaked to the server …
encrypted database stored in a server while limiting the information leaked to the server …
Order-revealing encryption: New constructions, applications, and lower bounds
In the last few years, there has been significant interest in develo** methods to search
over encrypted data. In the case of range queries, a simple solution is to encrypt the contents …
over encrypted data. In the case of range queries, a simple solution is to encrypt the contents …
Practical order-revealing encryption with limited leakage
In an order-preserving encryption scheme, the encryption algorithm produces ciphertexts
that preserve the order of their plaintexts. Order-preserving encryption schemes have been …
that preserve the order of their plaintexts. Order-preserving encryption schemes have been …
Function-hiding inner product encryption is practical
In a functional encryption scheme, secret keys are associated with functions and ciphertexts
are associated with messages. Given a secret key for a function f, and a ciphertext for a …
are associated with messages. Given a secret key for a function f, and a ciphertext for a …
Frequency-hiding order-preserving encryption
F Kerschbaum - Proceedings of the 22nd ACM SIGSAC Conference on …, 2015 - dl.acm.org
Order-preserving encryption allows encrypting data, while still enabling efficient range
queries on the encrypted data. This makes its performance and functionality very suitable for …
queries on the encrypted data. This makes its performance and functionality very suitable for …
Sok: Cryptographically protected database search
Protected database search systems cryptographically isolate the roles of reading from,
writing to, and administering the database. This separation limits unnecessary administrator …
writing to, and administering the database. This separation limits unnecessary administrator …