Conjunctive, subset, and range queries on encrypted data

被引:0
|
作者
Boneh, Dan [1 ]
Waters, Brent [2 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
[2] SRI Int, Menlo Pk, CA 94025 USA
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We construct public-key systems that support comparison queries (x >= a) on encrypted data as well as more general queries such as subset queries (x is an element of S). Furthermore, these systems support arbitrary conjunctive queries (P-1 boolean AND ... boolean AND P-e) without leaking information on individual conjuncts. We present a general framework for constructing and analyzing public-key systems supporting queries on encrypted data.
引用
收藏
页码:535 / +
页数:4
相关论文
共 50 条
  • [21] Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing
    Samanthula, Bharath K.
    Jiang, Wei
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 51 - 58
  • [22] Using Bitmaps for Executing Range Queries in Encrypted Databases
    Maria Rodriguez-Henriquez, Lil
    Chakraborty, Debrup
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 432 - 438
  • [23] Secure conjunctive keyword search over encrypted data
    Golle, P
    Staddon, J
    Waters, B
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 31 - 45
  • [24] Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries
    Li, Tianci
    Wu, Jiaojiao
    Wang, Jianfeng
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (SEC 2022), 2022, 648 : 467 - 485
  • [25] Secure and Efficient Skyline Queries on Encrypted Data
    Liu, Jinfei
    Yang, Juncheng
    Xiong, Li
    Pei, Jian
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019, 31 (07) : 1397 - 1411
  • [26] Privacy-preserving queries on encrypted data
    Yang, Zhiqiang
    Zhong, Sheng
    Wright, Rebecca N.
    Computer Security - ESORICS 2006, Proceedings, 2006, 4189 : 479 - 495
  • [27] Processing Analytical Queries over Encrypted Data
    Tu, Stephen
    Kaashoek, M. Frans
    Madden, Samuel
    Zeldovich, Nickolai
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (05): : 289 - 300
  • [28] Generating Test Data to Distinguish Conjunctive Queries with Equalities
    Vemasani, Preetham
    Brodsky, Alexander
    Ammann, Paul
    2014 SEVENTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2014), 2014, : 216 - 221
  • [29] Efficient conjunctive keyword search on encrypted data storage system
    Lyun, Jin Wook
    Lee, Dong Hoon
    Lim, Jongin
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2006, 4043 : 184 - 196
  • [30] Encrypted Databases: New Volume Attacks against Range Queries
    Gui, Zichen
    Johnson, Oliver
    Warinschi, Bogdan
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 361 - 378