咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Order-Revealing Encryption:Fil... 收藏

Order-Revealing Encryption:File-Injection Attack and Forward Security

揭示顺序的加密: 文件注射攻击和前面的安全

作     者:Yuan Li Xing-Chen Wang Lin Huang Yun-Lei Zhao Yuan Li;Xing-Chen Wang;Lin Huang;Yun-Lei Zhao

作者机构:School of Computer ScienceFudan UniversityShanghai 201203China State Key Laboratory of Integrated Services NetworksXidian UniversityXi’an 710071China State Key Laboratory of CryptologyBeijing 100878China 

出 版 物:《Journal of Computer Science & Technology》 (计算机科学技术学报(英文版))

年 卷 期:2021年第36卷第4期

页      面:877-895页

核心收录:

学科分类:0839[工学-网络空间安全] 08[工学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:the National Key Research and Development Program of China under Grant No.2017YFB-0802000 the National Natural Science Foundation of China under Grant Nos.61472084 and U1536205 Shanghai Innovation Action Project under Grant No.16DZ1100200 Shanghai Science and Technology Development Funds under Grant No.16JC1400801 Shandong Provincial Key Research and Development Program of China under Grant Nos.2017CXG0701 and 2018CXGC0701 

主  题:order-revealing encryption order-preserving encryption file-injection attack forward security 

摘      要:Order-preserving encryption(OPE)and order-revealing encryption(ORE)are among the core ingredients for encrypted databases(EDBs).In this work,we study the leakage of OPE and ORE and their forward *** propose generic yet powerful file-inject ion attacks(FI As)on OPE/ORE,aimed at the situations of possessing order by and range *** FI As only exploit the ideal leakage of OPE/ORE(in particular,no need of data denseness or frequency).We also improve their efficiency with the frequency statistics using a hierarchical idea such that the high-frequency values will be recovered more *** conduct some experiments on real datasets to test the performance,and the results show that our FI As can cause an extreme hazard on most of the existing OPEs and OREs with high efficiency and 100%recovery *** then formulate forward security of ORE,and propose a practical compilation framework for achieving forward secure ORE to resist the perniciousness of *** compilation framework can transform most of the existing OPEs/OREs into forward secure OREs,with the goal of minimizing the extra burden incurred on computation and *** also present its security proof,and execute some experiments to analyze its *** proposed compilation is highly efficient and forward secure.

读者评论 与其他读者分享你的观点