Главная
Study mode:
on
1
Intro
2
Order-Preserving Encryption (OPE)
3
OPE application: Range Queries on Encrypted Data
4
Cryptographic Study of OPE
5
Security Guarantees of Ideal Object?
6
Our Contributions
7
New Security Notions
8
Window Distance One-wayness
9
ROPF One-wayness Results: Overview
10
Proof strategy
11
Proof outline
12
ROPF: "Insecure" under large- window one-wayness
13
ROPF distance window one-wayness
14
Further security considerations for ROPF
15
Modular OPE
16
Committed OPE
17
Conclusion
Description:
Explore order-preserving encryption (OPE) in this 20-minute talk from Crypto 2011. Delve into improved security analysis and alternative solutions presented by Alexandra Boldyreva, Adam O'Neill, and Nathan Chenette. Learn about OPE applications in range queries on encrypted data, cryptographic studies, and security guarantees of ideal objects. Discover new security notions, including window distance one-wayness and ROPF one-wayness. Examine proof strategies and outlines for ROPF security considerations. Investigate modular OPE and committed OPE as alternative solutions. Gain insights into the latest advancements in order-preserving encryption and its implications for data security.

Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions

TheIACR
Add to list