A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage

被引:1
|
作者
Cash, David [1 ]
Zhang, Cong [2 ]
机构
[1] Univ Chicago, Dept Comp Sci, Chicago, IL 60637 USA
[2] Rutgers State Univ, Dept Comp Sci, New Brunswick, NJ USA
来源
关键词
Symmetric encryption; Searchable encryption; Lower bound;
D O I
10.1007/978-3-030-03810-6_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a security definition of Chenette, Lewi, Weis, and Wu for order-revealing encryption (ORE) and order-preserving encryption (OPE) (FSE 2016). Their definition says that the comparison of two ciphertexts should only leak the index of the most significant bit on which they differ. While their work could achieve order-revealing encryption with short ciphertexts that expand the plaintext by a factor approximate to 1.58, it could only find order-preserving encryption with longer ciphertexts that expanded the plaintext by a security-parameter factor. We give evidence that this gap between ORE and OPE is inherent, by proving that any OPE meeting the information-theoretic version of their security definition (for instance, in the random oracle model) must have ciphertext length close to that of their constructions. We extend our result to identify an abstract security property of any OPE that will result in the same lower bound.
引用
收藏
页码:159 / 176
页数:18
相关论文
共 50 条
  • [21] Order-Preserving Encryption Secure Beyond One-Wayness
    Teranishi, Isamu
    Yung, Moti
    Malkin, Tal
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 42 - 61
  • [22] Order-Preserving Encryption Using Approximate Integer Common Divisors
    Dyer, James
    Dyer, Martin
    Xu, Jie
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 : 257 - 274
  • [23] Reversible DatabaseWatermarking Based on Order-preserving Encryption for Data Sharing
    Hu, Donghui
    Wang, Qing
    Yan, Song
    Liu, Xiaojun
    Li, Meng
    Zheng, Shuli
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 2023, 48 (02):
  • [24] Practical Application of Order-preserving Encryption in Wide Column Stores
    Waage, Tim
    Homann, Daniel
    Wiese, Lena
    SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 352 - 359
  • [25] A Secure Order-Preserving Encryption Scheme Based on Encrypted Index
    Chen, Haobin
    Liang, Ji
    Qin, Xiaolin
    WEB AND BIG DATA, PT III, APWEB-WAIM 2022, 2023, 13423 : 247 - 261
  • [26] Exploring the Security Vulnerability in Frequency-Hiding Order-Preserving Encryption
    Yang, Jihye
    Kim, Kee Sung
    Security and Communication Networks, 2024, 2024
  • [27] Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function
    Jho, Nam-Su
    Chang, Ku-Young
    Hong, Do-Won
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (07) : 1276 - 1283
  • [28] Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
    Boldyreva, Alexandra
    Chenette, Nathan
    O'Neill, Adam
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 578 - 595
  • [29] Frequency-Hiding Order-Preserving Encryption with Small Client Storage
    Li, Dongjie
    Lv, Siyi
    Huang, Yanyu
    Liu, Yijing
    Li, Tong
    Liu, Zheli
    Guo, Liang
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2021, 14 (13): : 3295 - 3307
  • [30] Practical Frequency-Hiding Order-Preserving Encryption with Improved Update
    Yang, JiHye
    Kim, Kee Sung
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021