7,609 Hits in 4.1 sec

EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption

Zheli Liu, Jin Li, Siyi Lv, Yanyu Huang, Liang Guo, Yali Yuan, Changyu Dong
2020 IEEE Transactions on Dependable and Secure Computing  
In this work, we aim to design a new ORE scheme which reduces the leakages and preserves the practicality in terms of ciphertext length and encryption time.  ...  Compared with the typical CLWW scheme (FSE 2016) and Lewi-Wu (CCS 2016) in large domain, they have fewer leakages. The experiment shows that the proposed EncodeORE is very practical.  ...  Order-Revealing Encryption In order to achieve higher security and improve practicality, Boneh et al. [18] proposed a more flexible concept called order-revealing encryption (ORE).  ... 
doi:10.1109/tdsc.2020.3029845 fatcat:cpjudnqh2raprdxs7pe6p7g7ie

Function-Revealing Encryption [chapter]

Marc Joye, Alain Passelègue
2018 Lecture Notes in Computer Science  
Our main result is an efficient order-revealing encryption scheme with limited leakage based on the standard DLin assumption. corresponds to a specific function f .  ...  The particular case of two-input functional encryption has very exciting applications, including comparing the relative order of two plaintexts from their encrypted form (order-revealing encryption).  ...  A practical construction for order-revealing encryption is proposed in [14] . It merely requires a pseudorandom function F with output space {0, 1, 2}.  ... 
doi:10.1007/978-3-319-98113-0_28 fatcat:yjoshcxtxzay7dcp762fmghny4

Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption

Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade
2017 Proceedings of the 14th International Joint Conference on e-Business and Telecommunications  
First, we recall the leakage hierarchy introduced in 2015 by Cash et al.  ...  These schemes are provably secure with respect to an explicit leakage profile; however, determining how much information can be inferred in practice from this leakage remains difficult.  ...  ACKNOWLEDGEMENTS This research was conducted with the support of the FEDER program of 2014-2020 and the region council of Auvergne-Rhône-Alpes.  ... 
doi:10.5220/0006461202000211 dblp:conf/secrypt/GiraudAB017 fatcat:4liysa3l3ncfvb2hvehd3gouou

Practical Order-Revealing Encryption with Limited Leakage [chapter]

Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu
2016 Lecture Notes in Computer Science  
In an order-preserving encryption scheme, the encryption algorithm produces ciphertexts that preserve the order of their plaintexts.  ...  We present the first efficient order-revealing encryption scheme which achieves a simulation-based security notion with respect to a leakage function that precisely quantifies what is leaked by the scheme  ...  Opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of Facebook.  ... 
doi:10.1007/978-3-662-52993-5_24 fatcat:wnjz4umcovbn3ljeo7luzbwrja

Side-channel plaintext-recovery attacks on leakage-resilient encryption

Thomas Unterluggauer, Mario Werner, Stefan Mangard
2017 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017  
Similarly, constant plaintexts can be revealed from re-keyed block ciphers using templates in a second-order DPA.  ...  Namely, the frequent re-keying in leakage-resilient streaming modes causes constant plaintexts to be attackable through first-order DPA.  ...  The research leading to these results has received funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement No 681402)  ... 
doi:10.23919/date.2017.7927197 dblp:conf/date/UnterluggauerWM17 fatcat:nvhnwd5qjnd2ppjgmr44g4lxi4

Order-Revealing Encryption: File-Injection Attack and Forward Security [chapter]

Xingchen Wang, Yunlei Zhao
2018 Lecture Notes in Computer Science  
Order-preserving encryption (OPE) and order-revealing encryption (ORE) are among the core ingredients for encrypted databases (EDBs).  ...  Keywords: Order-revealing encryption· Order-preserving encryption · File-injection attack · Forward security. several inference attacks against the deterministic encryption (DTE) and OPE in CryptDB.  ...  The ideal leakage profile just reveals the order and the frequency of the plaintexts. More precisely, only the leakage of order is necessary for our FIAs.  ... 
doi:10.1007/978-3-319-98989-1_6 fatcat:eceyegy6tfg2viwfu56cxl4jyy

Leakage-Abuse Attacks against Order-Revealing Encryption

Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart
2017 2017 IEEE Symposium on Security and Privacy (SP)  
Order-preserving encryption and its generalization order-revealing encryption (OPE/ORE) allow sorting, performing range queries, and filtering data -all while only having access to ciphertexts.  ...  most widely used in practice.  ...  The authors wish to thank David Cash, whose insightful observation about non-crossing bipartite matchings led to the non-crossing attack in Section IV.  ... 
doi:10.1109/sp.2017.44 dblp:conf/sp/GrubbsSB0R17 fatcat:jsw424ianfajpa7mdctgnd7gl4

Equi-Joins Over Encrypted Data for Series of Queries [article]

Masoumeh Shafieinejad
2021 arXiv   pre-print
In particular, our encryption scheme reduces the leakage to equality of rows that match a selection criterion and only reveals the transitive closure of the sum of the leakages of each query in a series  ...  Encryption provides a method to protect data outsourced to a DBMS provider, e.g., in the cloud.  ...  Hence, future work can investigate which restrictions to remove in order to further reduce the leakage of join encryption schemes. 0 : 0 Encrypted database upload. 1 : SELECT ★ FROM Employees JOIN Teams  ... 
arXiv:2103.05792v1 fatcat:fn5uet3mojayng3dytpibtygka

Location-Dependent EM Leakage of the ATxmega Microcontroller [chapter]

Thomas Korak
2015 Lecture Notes in Computer Science  
Results show that the exploitable leakage for correlation attacks of a software implementation is higher compared to the leakage of the AES crypto engine, a hardware accelerator implemented on the microcontroller  ...  In this work we evaluate the resistance of AES implementations on an Atmel AVR XMEGA microcontroller against SCA attacks using the electromagnetic (EM) emanation measured at different locations on the  ...  This work has been supported by the European Commission through the FP7 program under project number 610436 (project MATTHEW).  ... 
doi:10.1007/978-3-319-17040-4_2 fatcat:lnc2uxwjfrf6no26oaade6iklu

Multi-Client Order-Revealing Encryption

Jieun Eom, Dong Hoon Lee, Kwangsu Lee
2018 IEEE Access  
Next, we present two specific multi-client order-revealing encryption schemes with different leakage functions in bilinear maps and prove their security in the random oracle model.  ...  In this paper, we propose the concept of multi-client order-revealing encryption that supports comparisons not only on ciphertexts generated by one client but also on ciphertexts generated by multiple  ...  Multi-Client Order-Revealing Encryption In this section, we define the syntax and the security model of multi-client order-revealing encryption by extending those of order-revealing encryption.  ... 
doi:10.1109/access.2018.2864991 fatcat:3ck6gavqirbtfet4tqcgqxecmi

Leakage-Abuse Attacks Against Searchable Encryption

David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
To address this, we present a characterization of the leakage profiles of in-the-wild searchable encryption products and SE schemes in the literature, and present attack models based on an adversarial  ...  In the literature, schemes for accomplishing this efficiently are called Searchable Encryption (SE). They achieve high efficiency with provable security by means of a quantifiable leakage profile.  ...  This work was done in part while Cash was visiting the Simons Institute for the Theory of Computing, supported by the Simons Foundation and by the DIMACS/Simons Collaboration in Cryptography through NSF  ... 
doi:10.1145/2810103.2813700 dblp:conf/ccs/CashGPR15 fatcat:rykwtfrpz5cmhex6wyjy5zjx7e

EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database using Enclaves [article]

Benny Fuhry SAP Security Research
2020 arXiv   pre-print
Furthermore, the resulting code - and data - in the enclave is very small reducing the potential for security-relevant implementation errors and side-channel leakages.  ...  ., as present in data warehouses. The computational overhead compared to plaintext processing is within a millisecond even for databases with millions of entries and the leakage is limited.  ...  If order leakage is not acceptable, a column contains few unique values, and RS is small, ED3 has a practical overhead.  ... 
arXiv:2002.05097v1 fatcat:dzpnpnrbgfdche6sqjse3sggqu

New Order-Revealing Encryption with Shorter Ciphertexts

Kee Sung Kim
2020 Information  
Order-revealing encryption (OREnc) enables performing a range of queries on encrypted data through a publicly computable function that outputs the ordering information of the underlying plaintexts.  ...  In 2016, Lewi et al. proposed an OREnc scheme that is more secure than the existing practical (stateless and non-interactive) schemes by constructing an ideally-secure OREnc scheme for small domains and  ...  Funding: This work was supported by research grants from Daegu Catholic University in 2020.  ... 
doi:10.3390/info11100457 fatcat:7ysozg6bdvfatpe4b3otuxq2cq

Why Your Encrypted Database Is Not Secure

Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov
2017 Proceedings of the 16th Workshop on Hot Topics in Operating Systems - HotOS '17  
In particular, the "snapshot attacker" model used to support the security claims for many encrypted databases does not reflect the information about past queries available in any snapshot attack on an  ...  CCS CONCEPTS • Security and privacy → Management and querying of encrypted data;  ...  ACKNOWLEDGEMENTS Grubbs and Ristenpart both have large financial stakes in Skyhigh Networks. The authors thank the reviewers and attendees of HotOS for their insightful suggestions.  ... 
doi:10.1145/3102980.3103007 dblp:conf/hotos/GrubbsRS17 fatcat:e266jcb5bnhexi6b55iek36yqe

A Privacy-Preserving System for Targeted Coupon Service

Jing Yao, Yifeng Zheng, Yu Guo, Chengjun Cai, Anxin Zhou, Cong Wang, Xiaolin Gui
2019 IEEE Access  
YIFENG ZHENG received the B.E. degree in information engineering from the South China  ...  practical needs.  ...  ORDER-REVEALING ENCRYPTION An order-revealing encryption (ORE) scheme is defined over a well-ordered domain D, which consists of three algorithms: (1) the setup algorithm OREsetup; (2) the encryption algorithm  ... 
doi:10.1109/access.2019.2937669 fatcat:2mhsxktwsrhmtfbjzp2jb25afe
« Previous Showing results 1 — 15 out of 7,609 results