scispace - formally typeset
Proceedings ArticleDOI

How to Construct a New Encryption Scheme Supporting Range Queries on Encrypted Database

TLDR
In this paper, the authors proposed an encryption mechanism that can support range queries without exposing the order of plaintext, which is expected to handle data more efficiently than other methods including auxiliary B+-tree.
Abstract
When the traditional encryption algorithms are applied to the database, efficiency degradation occurs because the orders of ciphertext and plaintext are not the same. Therefore, the encryption mechanisms suitable for database environment are required. We propose an encryption mechanism that can support range queries without exposing the order of plaintext. This method is more powerful than the previous order-preserving methods and is expected to handle data more efficiently than other methods including auxiliary B+-tree.

read more

Citations
More filters

Secure Data Storage Outsourcing with Conjunctive Keyword Search

TL;DR: This thesis in the field of cryptography considers secure data storage outsourcing with keyword search capabilities that is possible to efficiently enrol and revoke users for both the searching and the decryption part of the system.
Proceedings Article

HTEE: An HMAC based Tamper Evident Encryption

TL;DR: The purpose of the scheme is to provide a straightforward and efficient encryption that supports data integrity, to investigate the use of HMAC for reversible encryption and key transformation, and to improve upon an existing method.
References
More filters
Proceedings ArticleDOI

Executing SQL over encrypted data in the database-service-provider model

TL;DR: The paper explores an algebraic framework to split the query to minimize the computation at the client site, and explores techniques to execute SQL queries over encrypted data.
Proceedings ArticleDOI

Order preserving encryption for numeric data

TL;DR: This work presents an order-preserving encryption scheme for numeric data that allows any comparison operation to be directly applied on encrypted data, and is robust against estimation of the true value in such environments.
Proceedings ArticleDOI

Balancing confidentiality and efficiency in untrusted relational DBMSs

TL;DR: This paper presents a simple yet robust single-server solution for remote querying of encrypted databases on untrusted servers based on the use of indexing information attached to the encrypted database which can be used by the server to select the data to be returned in response to a query without the need of disclosing the database content.
Journal ArticleDOI

A new privacy homomorphism and applications

TL;DR: An application to multilevel statistical computation is presented, namely classified retrieval of exact statistics from unclassified computation on disclosure-protected (perturbed) data.
Proceedings ArticleDOI

Implementation of a Storage Mechanism for Untrusted DBMSs

TL;DR: The impact on query translation and optimization, and the main components of the software architecture of the prototype of a complete architecture for the management of encrypted databases are illustrated.