2015
DOI: 10.1007/978-3-319-23829-6_26
|View full text |Cite
|
Sign up to set email alerts
|

Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
3

Relationship

1
8

Authors

Journals

citations
Cited by 27 publications
(42 citation statements)
references
References 27 publications
0
42
0
Order By: Relevance
“…He extended the original scheme to support multi-dimensional range queries by replacing B+ trees with kd-trees in the implementation. Wang et al [8] presented a scheme for evaluating multi-dimensional range queries by using asymmetric scalar-product preserving encryption and R-trees. However, these two methods lead to single-dimensional privacy leakage.…”
Section: A Secure Range Querymentioning
confidence: 99%
“…He extended the original scheme to support multi-dimensional range queries by replacing B+ trees with kd-trees in the implementation. Wang et al [8] presented a scheme for evaluating multi-dimensional range queries by using asymmetric scalar-product preserving encryption and R-trees. However, these two methods lead to single-dimensional privacy leakage.…”
Section: A Secure Range Querymentioning
confidence: 99%
“…In more detail, this kind of encryption has the following characteristic: given two plaintexts x and y with property x ≥ y, the same property Enc(x) ≥ Enc(y) holds for their corresponding ciphertexts. A first concrete implementation of order-preserving encryption was introduced by Scheme Sublinear Index Leakage Search Time Boneh, Waters [6] no n/a Shi et al [28] no n/a Shen et al [27] no n/a Lu [23] yes Order Wang et al [30] yes Bucketization Wang et al [31] yes Distance Demertzis et al [10] yes -This paper yes - Boldyreva et al in [4] and optimized in [21]. However, privacy properties of such encryption schemes might be questionable for highly sensitive data.…”
Section: Related Workmentioning
confidence: 99%
“…A trade-off between privacy and performance for range queries is proposed in [15] by using bucketization of indexed ciphertexts. Other tree index approaches have been published by Wang et al in [30], however, again bucketization of indexed ciphertexts is leaked. In [31] an encryption is used that leaks the relative distance of all indexed ciphertexts to build an R-tree as index for ciphertexts.…”
Section: Related Workmentioning
confidence: 99%
“…[14]- [17] propose a privacy-preserving multi-keyword text search scheme with similarity-based ranking. However, in [14]- [16], a tree-based index structure is used to improve the search efficiency, and they cannot handle the data updates efficiently: the data owner needs to update the whole search index when inserting or deleting a document. In [17], an additional trusted server is needed to support the index and trapdoor generation.…”
Section: Related Workmentioning
confidence: 99%