A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage

被引:1
|
作者
Cash, David [1 ]
Zhang, Cong [2 ]
机构
[1] Univ Chicago, Dept Comp Sci, Chicago, IL 60637 USA
[2] Rutgers State Univ, Dept Comp Sci, New Brunswick, NJ USA
来源
关键词
Symmetric encryption; Searchable encryption; Lower bound;
D O I
10.1007/978-3-030-03810-6_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a security definition of Chenette, Lewi, Weis, and Wu for order-revealing encryption (ORE) and order-preserving encryption (OPE) (FSE 2016). Their definition says that the comparison of two ciphertexts should only leak the index of the most significant bit on which they differ. While their work could achieve order-revealing encryption with short ciphertexts that expand the plaintext by a factor approximate to 1.58, it could only find order-preserving encryption with longer ciphertexts that expanded the plaintext by a security-parameter factor. We give evidence that this gap between ORE and OPE is inherent, by proving that any OPE meeting the information-theoretic version of their security definition (for instance, in the random oracle model) must have ciphertext length close to that of their constructions. We extend our result to identify an abstract security property of any OPE that will result in the same lower bound.
引用
收藏
页码:159 / 176
页数:18
相关论文
共 50 条
  • [31] BOPE: Boundary Order-Preserving Encryption Scheme in Relational Database System
    Chen, Si
    Li, Lin
    Zhang, Wenyu
    Chang, Xiaolin
    Han, Zhen
    IEEE ACCESS, 2021, 9 : 30124 - 30134
  • [32] Ensuring Query Completeness In Outsourced Database using Order-Preserving Encryption
    Shen, Ning
    Yeh, Jyh-haw
    Chen, Chien-Ming
    Chen, Yeh-Cheng
    Zhang, Yunpeng
    2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 776 - 783
  • [33] Practical Frequency-Hiding Order-Preserving Encryption with Improved Update
    Yang, JiHye
    Kim, Kee Sung
    Security and Communication Networks, 2021, 2021
  • [34] Practical Order-Revealing Encryption with Limited Leakage
    Chenette, Nathan
    Lewi, Kevin
    Weis, Stephen A.
    Wu, David J.
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 474 - 493
  • [35] Efficient and Secure Top-k Queries With Top Order-Preserving Encryption
    Quan, Hanyu
    Wang, Boyang
    Zhang, Yuqing
    Wu, Gaofei
    IEEE ACCESS, 2018, 6 : 31525 - 31540
  • [36] Optimal Average-Complexity Ideal-Security Order-Preserving Encryption
    Kerschbaum, Florian
    Schroepfer, Axel
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 275 - 286
  • [37] MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy
    Liang, Jinwen
    Qin, Zheng
    Xiao, Sheng
    Zhang, Jixin
    Yin, Hui
    Li, Keqin
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 808 - 822
  • [38] Upper and lower bounds for the iterates of order-preserving homogeneous maps on cones
    Chodrow, Philip
    Franks, Cole
    Lins, Brian
    LINEAR ALGEBRA AND ITS APPLICATIONS, 2013, 439 (04) : 999 - 1005
  • [39] Comment on the Security of an Order-Preserving Encryption Scheme Using Pseudo-Random Function
    Kim, Minkyu
    Park, Je Hong
    Roh, Dongyoung
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (09) : 2108 - 2111
  • [40] Frequency-revealing attacks against Frequency-hiding Order-preserving Encryption
    Cao, Xinle
    Liu, Jian
    Shen, Yongsheng
    Ye, Xiaohua
    Ren, Kui
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (11): : 3124 - 3136