Publication | Closed Access
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
37
Citations
12
References
2012
Year
Cryptographic PrimitiveRopf EncryptionRopf Encryption LeaksEngineeringEncrypted StorageInformation SecurityCryptographic ProtectionCryptographic TechnologyData PrivacyComputer ScienceOrder-preserving Encryption RevisitedData ManagementEcient Range QueriesData SecurityCryptographyEncryption
We further the study of order-preserving symmetric encryption (OPE), a primitive for allowing ecient range queries on encrypted data, recently initiated (from a cryptographic perspective) by Boldyreva et al. (Eurocrypt ’09). First, we address the open problem of characterizing what encryption via a random order-preserving function (ROPF) leaks about underlying data (ROPF being the \ideal object in the security denition, POPF, satised by their scheme.) In particular, we show that, for a database of randomly distributed plaintexts and appropriate choice of parameters, ROPF encryption leaks neither the precise value of any plaintext nor the precise distance between any two of them. The analysis here introduces useful new techniques. On the other hand, we show that ROPF encryption leaks approximate value of any plaintext as well as approximate distance between any two plaintexts, each to an accuracy of about square root of the domain size. We then study schemes that are not order-preserving, but which nevertheless allow ecient range queries and achieve security notions stronger than POPF. In a setting where the entire database is known in advance of key-generation (considered in several prior works), we show that recent constructions of \monotone minimal perfect hash functions allow to eciently
| Year | Citations | |
|---|---|---|
Page 1
Page 1