A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage

被引:1
|
作者
Cash, David [1 ]
Zhang, Cong [2 ]
机构
[1] Univ Chicago, Dept Comp Sci, Chicago, IL 60637 USA
[2] Rutgers State Univ, Dept Comp Sci, New Brunswick, NJ USA
来源
关键词
Symmetric encryption; Searchable encryption; Lower bound;
D O I
10.1007/978-3-030-03810-6_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a security definition of Chenette, Lewi, Weis, and Wu for order-revealing encryption (ORE) and order-preserving encryption (OPE) (FSE 2016). Their definition says that the comparison of two ciphertexts should only leak the index of the most significant bit on which they differ. While their work could achieve order-revealing encryption with short ciphertexts that expand the plaintext by a factor approximate to 1.58, it could only find order-preserving encryption with longer ciphertexts that expanded the plaintext by a security-parameter factor. We give evidence that this gap between ORE and OPE is inherent, by proving that any OPE meeting the information-theoretic version of their security definition (for instance, in the random oracle model) must have ciphertext length close to that of their constructions. We extend our result to identify an abstract security property of any OPE that will result in the same lower bound.
引用
收藏
页码:159 / 176
页数:18
相关论文
共 50 条
  • [1] Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound
    Segev, Gil
    Shahaf, Ido
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 177 - 191
  • [2] Order-Preserving Symmetric Encryption
    Boldyreva, Alexandra
    Chenette, Nathan
    Lee, Younho
    O'Neill, Adam
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 224 - 241
  • [3] Modular Order-Preserving Encryption, Revisited
    Mavroforakis, Charalampos
    Chenette, Nathan
    O'Neill, Adam
    Kollios, George
    Canetti, Ran
    SIGMOD'15: PROCEEDINGS OF THE 2015 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2015, : 763 - 777
  • [4] Security of Stateful Order-Preserving Encryption
    Kim, Kee Sung
    Kim, Minkyu
    Lee, Dongsoo
    Park, Je Hong
    Kim, Woo-Hwan
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 39 - 56
  • [5] An Order-Preserving Encryption Scheme Based on Weighted Random Interval Division for Ciphertext Comparison in Wearable Systems
    Gui, Ruowei
    Yang, Liu
    Gui, Xiaolin
    SENSORS, 2022, 22 (20)
  • [6] Short Ciphertext-Size Privacy-Preserving Aggregation Against Malicious Aggregators
    Zhang, Jianhong
    Shi, Chuming
    Wei, Jie
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT V, ICIC 2024, 2024, 14866 : 501 - 512
  • [7] A Novel Dynamic Order-Preserving Encryption Scheme
    Reddy, K. Srinvasa
    Ramachandram, Sirandas
    2014 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & SOFT COMPUTING (ICNSC), 2014, : 92 - 96
  • [8] Frequency-Hiding Order-Preserving Encryption
    Kerschbaum, Florian
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 656 - 667
  • [9] Probability-p Order-Preserving Encryption
    Yang, Ce
    Zhang, Weiming
    Ding, Jiachen
    Yu, Nenghai
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 16 - 28
  • [10] On The Limits of Privacy Provided by Order-Preserving Encryption
    Kolesnikov, Vladimir
    Shikfa, Abdullatif
    BELL LABS TECHNICAL JOURNAL, 2012, 17 (03) : 135 - 146