Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions

TheIACR via YouTube

Overview

Explore order-preserving encryption (OPE) in this 20-minute talk from Crypto 2011. Delve into improved security analysis and alternative solutions presented by Alexandra Boldyreva, Adam O'Neill, and Nathan Chenette. Learn about OPE applications in range queries on encrypted data, cryptographic studies, and security guarantees of ideal objects. Discover new security notions, including window distance one-wayness and ROPF one-wayness. Examine proof strategies and outlines for ROPF security considerations. Investigate modular OPE and committed OPE as alternative solutions. Gain insights into the latest advancements in order-preserving encryption and its implications for data security.

Syllabus

Intro
Order-Preserving Encryption (OPE)
OPE application: Range Queries on Encrypted Data
Cryptographic Study of OPE
Security Guarantees of Ideal Object?
Our Contributions
New Security Notions
Window Distance One-wayness
ROPF One-wayness Results: Overview
Proof strategy
Proof outline
ROPF: "Insecure" under large- window one-wayness
ROPF distance window one-wayness
Further security considerations for ROPF
Modular OPE
Committed OPE
Conclusion

Taught by

TheIACR

Reviews

Start your review of Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.