Topic
Format-preserving encryption
About: Format-preserving encryption is a research topic. Over the lifetime, 112 publications have been published within this topic receiving 2050 citations.
Papers published on a yearly basis
Papers
More filters
Patent•
16 Jul 2019
TL;DR: In this paper, a blockchain system based on zero-knowledge proof with format-preservation encryption and a control method thereof is presented, in which data to be kept private due to privacy protection and the like among data among data registered in a blockchain network as a transaction are encrypted through the format preservation encryption.
Abstract: Disclosed in the present invention are a blockchain system based on zero-knowledge proof with format-preservation encryption and a control method thereof. In the present invention, data to be kept private due to privacy protection and the like among data to be registered in a blockchain network as a transaction are encrypted through the format-preservation encryption, the data to be kept private that are encrypted by the format-preservation encryption and publicly available data are registered in the blockchain network as a transaction. Therefore, a problem that data may be searched only by knowing a hash value since a key value of the existing block is composed of hash values can be solved by encrypting some content using the format-preservation encryption, so that monitoring data can be protected by using the zero-knowledge proof.
1 citations
01 Jan 2012
TL;DR: In this article, the authors discuss bijection in FPE and RREM, and propose a bijection-based approach to bijection using FPE-based bijection. But they do not specify the bijection type.
Abstract: 保存格式的加密(FPE ) 保证那密文有象纯文本的一样的格式,广泛地在在一个数据库保护敏感数据被使用了。瞄准高效地在许多实际领域上解决 FPE 问题,我们建议 RREM (随机的基于参考的加密模式) ,它通过距离计算构造在原来的领域和整数集合之间的 bijection。如果适当距离功能被预先规定,建议模式能比以前的方法以一个更有效的方法在线性等距离领域上解决 FPE 问题。而且,我们在域的各种各样的类型上做一个分类,在一些实际的域显示出 RREM 的应用程序,并且指定相当高效地解决在数据库的使用得经常的域上的 FPE 问题的 RREM 能力。
1 citations
Posted Content•
TL;DR: The best currently known attack on the Feistel construction FF3 has data and memory complexity of \({O}(N^{11/6})) where the input belongs to a domain of size N \times N\ as discussed by the authors.
Abstract: Format-Preserving Encryption (FPE) schemes accept plaintexts from any finite set of values (such as social security numbers or birth dates) and produce ciphertexts that belong to the same set. They are extremely useful in practice since they make it possible to encrypt existing databases or communication packets without changing their format. Due to industry demand, NIST had standardized in 2016 two such encryption schemes called FF1 and FF3. They immediately attracted considerable cryptanalytic attention with decreasing attack complexities. The best currently known attack on the Feistel construction FF3 has data and memory complexity of \({O}(N^{11/6})\) and time complexity of \({O}(N^{17/6})\), where the input belongs to a domain of size \(N \times N\).
1 citations
03 May 2018
TL;DR: This paper introduces an efficient algorithm to mask the sensitive data using format preserving encryption and shows how data masking and data encryption are used to achieve this.
Abstract: For every organization the most important thing is sensitive data. Data masking and data encryption are used to achieve this. In this paper we introduce an efficient algorithm to mask the sensitive data using format preserving encryption.
Patent•
IBM1
TL;DR: In this paper, the present systems and methods may provide data watermarking without relying on error-tolerant fields, thereby providing for the incorporation of watermarks in data that was not considered suitable for watermark.
Abstract: Embodiments of the present systems and methods may provide data watermarking without reliance on error-tolerant fields, thereby providing for the incorporation of watermarks in data that was not considered suitable for watermarking. For example, in an embodiment, a computer-implemented method for watermarking data may comprise inserting watermark data into a field that requires format-preserving encryption.