PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2014 | 2 | 891--899
Tytuł artykułu

Order-preserving encryption schemes based on arithmetic coding and matrices

Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this article we describe two alternative order-preserving encryption schemes. First scheme is based on arithmetic coding and the second scheme uses sequence of matrices for data encrypting. In the beginning of this paper we briefly describe previous related work published in recent time. Then we propose alternative variants of OPE and consider them in details. We examine drawbacks of these schemes and suggest possible ways of their improvement. Finally we present statistical results of implemented prototypes and discuss further work.(original abstract)
Rocznik
Tom
2
Strony
891--899
Opis fizyczny
Twórcy
  • Novosibirsk State University
  • Novosibirsk State University
  • Novosibirsk State University
Bibliografia
  • Agrawal R., Kiernan J., Stikant R., and Xu Y., Order-preserving encryption for numeric data, ACM SIGMOD International Conference on Management of Data, pp. 563-574, 2004.
  • Amanatidis G., Boldyreva A., and O'Neill A., Provably-secure schemes for basic query support in outsourced databases, Working Conference on Data and Applications Security, pp. 14-30, 2007.
  • Bebek G. Anti-tamper database research: Inference control techniques, Technical Report EECS 433 Final Report, Case Western Reserve University, 2002.
  • Boldyreva A., Chenette N., and O'Neill A., Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions, Crypto11, 2011.
  • Boldyreva A., Chenette N., Lee Y., and O'Neill A., Order-preserving symmetric encryption, Eurocrypt, pp. 224-241, 2009.
  • Boneh D. and Waters B., Conjunctive, subset, and range queries on encrypted data, TCC, 535-554, 2007.
  • Gultekin Ozsoyoglu, David A. Singer, and Sun S. Chung. Anti-Tamper Databases: Querying Encrypted Databases. In 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, 2003, http://dx.doi.org/10.1109/ICDEW.2006.30
  • Hacigumus H., Iyer B. R., Li C., and Mehrotra S., Executing SQL over encrypted data in the database-service-provider model, ACM SIGMOD Conference on Management of Data, 2002.
  • Halloush M. and Sharif M., Global heuristic search on encrypted data (GHSED), International Journal of Computer Science Issues (IJCSI), 1:13-17, 2009.
  • Popa R. A., Li F. H., Zeldovich N., An Ideal-Security Protocol for Order-Preserving Encoding. IEEE Symposium on Security and Privacy 2013, http://dx.doi.org/10.1109/CISS.2012.6310814
  • Schneier B., Wiley J.: Applied Cryptography Second Edition 1996 ISBN 0-471-11709-9.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171335485

Zgłoszenie zostało wysłane

Zgłoszenie zostało wysłane

Musisz być zalogowany aby pisać komentarze.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.