Parameter-Hiding Order Revealing Encryption
Author(s): Cash, David; Liu, Feng-Hao; O’Neill, Adam; Zhandry, Mark; Zhang, Cong
DownloadTo refer to this page use:
http://arks.princeton.edu/ark:/88435/pr1xz7j
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cash, David | - |
dc.contributor.author | Liu, Feng-Hao | - |
dc.contributor.author | O’Neill, Adam | - |
dc.contributor.author | Zhandry, Mark | - |
dc.contributor.author | Zhang, Cong | - |
dc.date.accessioned | 2021-10-08T19:48:17Z | - |
dc.date.available | 2021-10-08T19:48:17Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.citation | Cash, David, Feng-Hao Liu, Adam O’Neill, Mark Zhandry, and Cong Zhang. "Parameter-Hiding Order Revealing Encryption." In International Conference on the Theory and Application of Cryptology and Information Security (2018): pp. 181-210. doi:10.1007/978-3-030-03326-2_7 | en_US |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://www.cs.princeton.edu/~mzhandry/docs/papers/ParamORE.pdf | - |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/pr1xz7j | - |
dc.description.abstract | Order-revealing encryption (ORE) is a primitive for outsourcing encrypted databases which allows for efficiently performing range queries over encrypted data. Unfortunately, a series of works, starting with Naveed et al. (CCS 2015), have shown that when the adversary has a good estimate of the distribution of the data, ORE provides little protection. In this work, we consider the case that the database entries are drawn identically and independently from a distribution of known shape, but for which the mean and variance are not (and thus the attacks of Naveed et al. do not apply). We define a new notion of security for ORE, called parameter-hiding ORE, which maintains the secrecy of these parameters. We give a construction of ORE satisfying our new definition from bilinear maps. | en_US |
dc.format.extent | 181 - 210 | en_US |
dc.language.iso | en_US | en_US |
dc.relation.ispartof | International Conference on the Theory and Application of Cryptology and Information Security | en_US |
dc.rights | Author's manuscript | en_US |
dc.title | Parameter-Hiding Order Revealing Encryption | en_US |
dc.type | Conference Article | en_US |
dc.identifier.doi | 10.1007/978-3-030-03326-2_7 | - |
dc.identifier.eissn | 1611-3349 | - |
pu.type.symplectic | http://www.symplectic.co.uk/publications/atom-terms/1.0/conference-proceeding | en_US |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ParameterHidingOrderRevealingEncryption.pdf | 667.07 kB | Adobe PDF | View/Download |
Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.