@inbook{4638ad44e25e497da3e8aa472bfed5fa,
title = "Comparing Encrypted Strings",
abstract = " Database outsourcing, also known as database as a service, has become a popular way to store and process large amounts of data. Unfortunately, remote data storage can compromise confidentiality. An obvious solution is to encrypt data, prior to storage, but encrypted data is more difficult to query. We describe and demonstrate an efficient scheme for comparing ciphertexts, corresponding to arbitrary plaintexts, in such a way that the result is the same as if the plaintexts had been compared. This allows queries to be processed remotely and securely. Comparison is not limited to equality. For example, encrypted employee names can be sorted remotely without decryption. Any encryption algorithm can be used. Demonstration queries are shown in SQL.",
keywords = "Comparison, Databases, Encryption, Queries, Security",
author = "Jim Buffenbarger",
note = "Publisher Copyright: {\textcopyright} Springer International Publishing Switzerland 2016.; 2nd International Symposium on Cyber Security, CSS 2015 ; Conference date: 07-04-2015 Through 08-04-2015",
year = "2016",
doi = "10.1007/978-3-319-28313-5_5",
language = "American English",
isbn = "9783319283128",
series = "Communications in Computer and Information Science",
publisher = "Springer Verlag",
pages = "57--66",
editor = "Kristin Haltinner and Dilshani Sarathchandra and Jim Alves-Foss and Kevin Chang and {de Leon}, {Daniel Conte} and Jia Song",
booktitle = "Cyber Security - 2nd International Symposium, CSS 2015, Revised Selected Papers",
address = "Germany",
}