2009
DOI: 10.1587/transinf.e92.d.2207
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases

Abstract: SUMMARYThe need for data encryption that protects sensitive data in a database has increased rapidly. However, encrypted data can no longer be efficiently queried because nearly all of the data should be decrypted. Several order-preserving encryption schemes that enable indexes to be built over encrypted data have been suggested to solve this problem. They allow any comparison operation to be directly applied to encrypted data. However, one of the main disadvantages of these schemes is that they expose sensiti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(13 citation statements)
references
References 14 publications
0
13
0
Order By: Relevance
“…Table 1 presents an overview of the discussed order-preserving encryption schemes. There is also a large number of other order-preserving encryption schemes [4,19,20,24,25,26,28,38] which provide no formal, but rather ad-hoc security analysis, including the original proposal by Agrawal et al [5]. Xiao et al [37] define a notion based on nearby values, but it remains unclear how to enforce this in a practical setting.…”
Section: Order-preserving Encryption Schemesmentioning
confidence: 99%
“…Table 1 presents an overview of the discussed order-preserving encryption schemes. There is also a large number of other order-preserving encryption schemes [4,19,20,24,25,26,28,38] which provide no formal, but rather ad-hoc security analysis, including the original proposal by Agrawal et al [5]. Xiao et al [37] define a notion based on nearby values, but it remains unclear how to enforce this in a practical setting.…”
Section: Order-preserving Encryption Schemesmentioning
confidence: 99%
“…A number of order-preserving encryption schemes have been proposed in the literature [6,8,9,32,5,17,19,20,23,25,26,28,38,39,42]. Yet, most of them use ad-hoc or speculative security models.…”
Section: Order-preserving Encryptionmentioning
confidence: 99%
“…In [7], Lee et al propose the COPE scheme (Chaotic Order Preserving Encryption). In this scheme, bucket order is randomized according to the key, so, in fact, it is not a pure OPE scheme.…”
Section: Related Workmentioning
confidence: 99%