Optimal Average-Complexity Ideal-Security Order-Preserving Encryption

被引:76
作者
Kerschbaum, Florian [1 ]
Schroepfer, Axel [1 ]
机构
[1] SAP, Karlsruhe, Germany
来源
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2014年
关键词
Order-Preserving Encryption; Indistinguishability; Ideal Security; Efficiency; Adjustable Encryption; In-Memory Column Database;
D O I
10.1145/2660267.2660277
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Order-preserving encryption enables performing many classes of queries - including range queries - on encrypted databases. Popa et al. recently presented an ideal-secure order-preserving encryption (or encoding) scheme, but their cost of insertions (encryption) is very high. In this paper we present an also ideal-secure, but significantly more efficient order-preserving encryption scheme. Our scheme is inspired by Reed's referenced work on the average height of random binary search trees. We show that our scheme improves the average communication complexity from O(n log n) to O(n) under uniform distribution. Our scheme also integrates efficiently with adjustable encryption as used in CryptDB. In our experiments for database inserts we achieve a performance increase of up to 81% in LANs and 95% in WANs.
引用
收藏
页码:275 / 286
页数:12
相关论文
共 41 条
[21]   Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases [J].
Lee, Seungmin ;
Park, The-Jun ;
Lee, Donghyeok ;
Nam, Taekyong ;
Kim, Sehun .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (11) :2207-2217
[22]  
Liu C, 2013, 2013 INTERNATIONAL CONFERENCE ON ADVANCED EDUCATION TECHNOLOGY AND MANAGEMENT SCIENCE (AETMS), P168
[23]   Nonlinear order preserving index for encrypted database query in service cloud environments [J].
Liu, Dongxi ;
Wang, Shenlu .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2013, 25 (13) :1967-1984
[24]  
Lu Y., 2012, PROC 19 ANN NETW DIS
[25]  
Ozsoyoglu G., 2003, P 17 C DAT APPL SEC
[26]  
Paillier P., 1999, P 18 INT C ADV CRYPT
[27]  
Plattner H., 2009, P ACM INT C MAN DAT
[28]   IMPROVED ALGORITHM FOR COMPUTING LOGARITHMS OVER GF(P) AND ITS CRYPTOGRAPHIC SIGNIFICANCE [J].
POHLIG, SC ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1978, 24 (01) :106-110
[29]  
Popa R. A., 2013, 34 IEEE S SEC PRIV S
[30]   The height of a random binary search tree [J].
Reed, B .
JOURNAL OF THE ACM, 2003, 50 (03) :306-332