搜索结果: 1-10 共查到“军队指挥学 Order-revealing encryption”相关记录10条 . 查询时间(0.078 秒)
Parameter-Hiding Order Revealing Encryption
secret-key cryptography Order Revealing Encryption
2018/7/24
Order-revealing encryption (ORE) is a popular primitive for outsourcing encrypted databases, as it allows for efficiently performing range queries over encrypted data. Unfortunately, a series of works...
File-injection Attack and Forward Security for Order-revealing Encryption
Order-revealing Encryption Order-preserving Encryption File-injection Attack
2017/11/13
Order-preserving encryption (OPE) and order-revealing encryption (ORE) are among the core ingredients for encrypted database (EDB) systems as secure cloud storage. In this work, we study the leakage o...
Impossibility of Order-Revealing Encryption in Idealized Models
Black-box separations Order-revealing encryption Random oracle
2017/10/16
An Order-Revealing Encryption (ORE) scheme gives a public procedure by which two ciphertext can be compared to reveal the order of their underlying plaintexts. The ideal security notion for ORE is tha...
What Else is Revealed by Order-Revealing Encryption?
order-revealing encryption order-preserving encryption database encryption
2016/12/10
The security of order-revealing encryption (ORE) has been unclear since its invention. Dataset characteristics for which ORE is especially insecure have been identified, such as small message spaces a...
Order-preserving encryption and its generalization order-revealing encryption (OPE/ORE) are used in a variety of settings in practice in order to allow sorting, performing range queries, and filtering...
We study practical order-revealing encryption (ORE) with a well-defined leakage profile (the information revealed about the plaintexts from their ciphertexts), a direction recently initiated by Chenet...
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds
order-revealing encryption order-preserving encryption range queries
2016/6/15
In the last few years, there has been much interest in developing methods to search over encrypted data. In the case of range queries, a simple solution is to encrypt the contents of the database usin...
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation
functional encryption multilinear maps
2016/1/6
Deciding “greater-than” relations among data items just given their encryptions is at the heart of
search algorithms on encrypted data, most notably, non-interactive binary search on encrypted data.
...
Order-Revealing Encryption and the Hardness of Private Learning
differential privacy learning theory order-revealing encryption
2015/12/31
An order-revealing encryption scheme gives a public procedure by which two ciphertexts
can be compared to reveal the ordering of their underlying plaintexts. We show how to use
order-revealing encry...
Practical Order-Revealing Encryption with Limited Leakage
order-revealing encryption order-preserving encryption
2015/12/21
In an order-preserving encryption scheme, the encryption algorithm produces ciphertexts that
preserve the order of their plaintexts. Order-preserving encryption schemes have been studied
intensely i...