The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.1109/access.2019.2951695
|View full text |Cite
|
Sign up to set email alerts
|

Search Condition-Hiding Query Evaluation on Encrypted Databases

Abstract: Private database query (PDQ) is a protocol between a client and a database server, designed for processing queries to encrypted databases. Specifically, PDQ enables a client to submit a search query and to learn a resulting set satisfying its search condition, without revealing sensitive information about a query statement. The whole query can be protected from the server, but for efficiency reasons known PDQ solutions generally consider to hide the constants only in a query statement. In this paper, we provid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…These experiments show that the merging using the PENDA algorithm is faster than other techniques using FHE, FE or ORAM. A simple equality comparison on ciphertext encrypted with FHE [9] takes an order of seconds.…”
Section: Resultsmentioning
confidence: 99%
“…These experiments show that the merging using the PENDA algorithm is faster than other techniques using FHE, FE or ORAM. A simple equality comparison on ciphertext encrypted with FHE [9] takes an order of seconds.…”
Section: Resultsmentioning
confidence: 99%
“…Strong encryption methods, like AES-256, make sure that even if data is stolen, it can't be read by people who aren't supposed to [27]. To keep encryption keys safe and stop people from decrypting them without permission [28], secure key management should be used. The NIST says that a hardware security module (HSM) is the best way to store and handle encryption keys because it is safer than software-based key management [29].…”
Section: B Data Encryptionmentioning
confidence: 99%
“…Here, information leakage is caused by revealing many of the record IDs of the data owner to the user before the intersection operation. After this, Kim et al [35] introduced another private database query protocol in which 0.119 seconds were required to process each record. They generated random databases that consisted of 16 keyword attributes with entries with maximum sizes of 48 or 64 bits.…”
Section: Previous Workmentioning
confidence: 99%