Paper 2018/521
Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound
Gil Segev and Ido Shahaf
Abstract
Order-preserving encryption emerged as a key ingredient underlying the security of practical database management systems. Boldyreva et al. (EUROCRYPT '09) initiated the study of its security by introducing two natural notions of security. They proved that their first notion, a ``best-possible'' relaxation of semantic security allowing ciphertexts to reveal the ordering of their corresponding plaintexts, is not realizable. Later on Boldyreva et al. (CRYPTO '11) proved that any scheme satisfying their second notion, indistinguishability from a random order-preserving function, leaks about half of the bits of a random plaintext.
This unsettling state of affairs was recently changed by Chenette et al. (FSE '16), who relaxed the above ``best-possible'' notion and constructed a scheme satisfying it based on any pseudorandom function. In addition to revealing the ordering of any two encrypted plaintexts, ciphertexts in their scheme reveal only the position of the most significant bit on which the plaintexts differ. A significant drawback of their scheme, however, is its substantial ciphertext expansion: Encrypting plaintexts of length
Note: Small corrections
Metadata
- Available format(s)
-
PDF
- Publication info
- Published by the IACR in TCC 2018
- Contact author(s)
- ido shahaf @ cs huji ac il
- History
- 2018-09-25: last of 2 revisions
- 2018-06-04: received
- See all versions
- Short URL
- https://ia.cr/2018/521
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2018/521, author = {Gil Segev and Ido Shahaf}, title = {Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound}, howpublished = {Cryptology {ePrint} Archive, Paper 2018/521}, year = {2018}, url = {https://eprint.iacr.org/2018/521} }