Parameter-hiding order revealing encryption

David Cash, Feng Hao Liu, Adam O’Neill, Mark Zhandry, Cong Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Order-revealing encryption (ORE) is a primitive for outsourcing encrypted databases which allows for efficiently performing range queries over encrypted data. Unfortunately, a series of works, starting with Naveed et al. (CCS 2015), have shown that when the adversary has a good estimate of the distribution of the data, ORE provides little protection. In this work, we consider the case that the database entries are drawn identically and independently from a distribution of known shape, but for which the mean and variance are not (and thus the attacks of Naveed et al. do not apply). We define a new notion of security for ORE, called parameter-hiding ORE, which maintains the secrecy of these parameters. We give a construction of ORE satisfying our new definition from bilinear maps.

Original languageEnglish (US)
Title of host publicationAdvances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
EditorsThomas Peyrin, Steven Galbraith
PublisherSpringer Verlag
Pages181-210
Number of pages30
ISBN (Print)9783030033255
DOIs
StatePublished - 2018
Event24th Annual International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2018 - Brisbane, Australia
Duration: Dec 2 2018Dec 6 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11272 LNCS

Other

Other24th Annual International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2018
Country/TerritoryAustralia
CityBrisbane
Period12/2/1812/6/18

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Keywords

  • Encryption
  • Order-revealing encryption

Fingerprint

Dive into the research topics of 'Parameter-hiding order revealing encryption'. Together they form a unique fingerprint.

Cite this