Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.3.503

A More Storage-Efficient Order-Revealing Encryption Scheme  

Kim, Kee Sung (DAEGU CATHOLIC UNIVERSITY)
Abstract
Order-revealing encryption which enables a range query over encrypted data is attracting attention as one of the important security technologies in industry such as IoT, smart manufacturing, and cloud computing. In 2015, an ideally-secure order-revealing encryption whose ciphertexts reveal no additional information beyond the order of the underlying plaintexts has been proposed. However, their construction is too inefficient for practical use and some security analysis of multilinear maps, which their construction relies on, have been proposed. Recently, more practical schemes have been proposed, focusing on achieving practically usable efficiency rather than the ideal security. In this paper, we propose a more storage-efficient order-revealing encryption scheme than the Lewi et al.'s scheme most recently published by presenting an idea that can generate shorter ciphertexts without any security loss.
Keywords
Order-Revealing Encryption; Database Encryption; Samrt Manufacturing Security; Cloud Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. Agrawal, Rakesh, J. Kiernan, R Srikant, and Y. Xu, "Order-Preserving Encryption for Numeric Data," proceedings of the 2004 ACM SIGMOD international conference on Management of data pp. 563-574, June 2004
2 A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill, "Order-preserving symmetric encryption," EUROCRYPT' 09, LNCS 5479, pp. 224-241, April 2009
3 R. Popa, F. Li, and N. Zeldovich, "An ideal-security protocol for order-preserving encoding," S&P'13, pp. 463-477, May 2013
4 F. Kerschbaum and A. Schroepfer, "Optimal average-complexity ideal-security order-preserving encryption," ACM CCS'14, pp. 275-286, Nov. 2014
5 N. Chenette, K. Lewi, Stephen A. Weis, and D. J. Wu, "Practical Order-Revealing Encryption with Limited Leakage," FSE'16, LNCS 9783, pp. 474-493, Mar. 2016
6 K. Lewi and D. J. Wu, "Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds," ACM CCS'16, pp. 1167-1178, Oct. 2016
7 J. H. Cheon, K. Han, C. Lee, H. Ryu, and D. Stehle, "Cyptanalysis of the CLT13 MultiLinear Map", Journal of Cryptology, Vol. 32, Issue 2, pp. 547-565, April 2019   DOI
8 D. Boneh, K. Lewi, M. Raykova, A. Sahai, M. Zhandry, and J. Zimmerman, "Semantically Secure Order-Revealing Encryption: Multiinput Functional Encryption Without Obfuscation," EUROCRYPT'15, LNCS 9057, pp. 563-594, April 2015
9 E. Miles, A. Sahai, and M. Zhandry, "Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13," CRYPTO'16, LNCS 9815, pp. 629-658, Aug. 2016