scispace - formally typeset
Search or ask a question
Topic

Format-preserving encryption

About: Format-preserving encryption is a research topic. Over the lifetime, 112 publications have been published within this topic receiving 2050 citations.


Papers
More filters
Patent
16 Jul 2019
TL;DR: In this paper, a blockchain system based on zero-knowledge proof with format-preservation encryption and a control method thereof is presented, in which data to be kept private due to privacy protection and the like among data among data registered in a blockchain network as a transaction are encrypted through the format preservation encryption.
Abstract: Disclosed in the present invention are a blockchain system based on zero-knowledge proof with format-preservation encryption and a control method thereof. In the present invention, data to be kept private due to privacy protection and the like among data to be registered in a blockchain network as a transaction are encrypted through the format-preservation encryption, the data to be kept private that are encrypted by the format-preservation encryption and publicly available data are registered in the blockchain network as a transaction. Therefore, a problem that data may be searched only by knowing a hash value since a key value of the existing block is composed of hash values can be solved by encrypting some content using the format-preservation encryption, so that monitoring data can be protected by using the zero-knowledge proof.

1 citations

Li, Jingwei, Liu, Zheli, Xu, Jia, Chunfu 
01 Jan 2012
TL;DR: In this article, the authors discuss bijection in FPE and RREM, and propose a bijection-based approach to bijection using FPE-based bijection. But they do not specify the bijection type.
Abstract: 保存格式的加密(FPE ) 保证那密文有象纯文本的一样的格式,广泛地在在一个数据库保护敏感数据被使用了。瞄准高效地在许多实际领域上解决 FPE 问题,我们建议 RREM (随机的基于参考的加密模式) ,它通过距离计算构造在原来的领域和整数集合之间的 bijection。如果适当距离功能被预先规定,建议模式能比以前的方法以一个更有效的方法在线性等距离领域上解决 FPE 问题。而且,我们在域的各种各样的类型上做一个分类,在一些实际的域显示出 RREM 的应用程序,并且指定相当高效地解决在数据库的使用得经常的域上的 FPE 问题的 RREM 能力。

1 citations

Posted Content
TL;DR: The best currently known attack on the Feistel construction FF3 has data and memory complexity of \({O}(N^{11/6})) where the input belongs to a domain of size N \times N\ as discussed by the authors.
Abstract: Format-Preserving Encryption (FPE) schemes accept plaintexts from any finite set of values (such as social security numbers or birth dates) and produce ciphertexts that belong to the same set. They are extremely useful in practice since they make it possible to encrypt existing databases or communication packets without changing their format. Due to industry demand, NIST had standardized in 2016 two such encryption schemes called FF1 and FF3. They immediately attracted considerable cryptanalytic attention with decreasing attack complexities. The best currently known attack on the Feistel construction FF3 has data and memory complexity of \({O}(N^{11/6})\) and time complexity of \({O}(N^{17/6})\), where the input belongs to a domain of size \(N \times N\).

1 citations

03 May 2018
TL;DR: This paper introduces an efficient algorithm to mask the sensitive data using format preserving encryption and shows how data masking and data encryption are used to achieve this.
Abstract: For every organization the most important thing is sensitive data. Data masking and data encryption are used to achieve this. In this paper we introduce an efficient algorithm to mask the sensitive data using format preserving encryption.
Patent
Goldsteen Abigail1, Greenberg Lev1, Farkash Ariel1, Rozenberg Boris, Soceanu Omri 
02 Jan 2020
TL;DR: In this paper, the present systems and methods may provide data watermarking without relying on error-tolerant fields, thereby providing for the incorporation of watermarks in data that was not considered suitable for watermark.
Abstract: Embodiments of the present systems and methods may provide data watermarking without reliance on error-tolerant fields, thereby providing for the incorporation of watermarks in data that was not considered suitable for watermarking. For example, in an embodiment, a computer-implemented method for watermarking data may comprise inserting watermark data into a field that requires format-preserving encryption.

Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
86% related
Cryptography
37.3K papers, 854.5K citations
85% related
Public-key cryptography
27.2K papers, 547.7K citations
83% related
Hash function
31.5K papers, 538.5K citations
83% related
Password
35K papers, 389.6K citations
81% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20217
202013
201917
201813
201710
201613