Comparing Encrypted Strings

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Database outsourcing, also known as database as a service, has become a popular way to store and process large amounts of data. Unfortunately, remote data storage can compromise confidentiality. An obvious solution is to encrypt data, prior to storage, but encrypted data is more difficult to query. We describe and demonstrate an efficient scheme for comparing ciphertexts, corresponding to arbitrary plaintexts, in such a way that the result is the same as if the plaintexts had been compared. This allows queries to be processed remotely and securely. Comparison is not limited to equality. For example, encrypted employee names can be sorted remotely without decryption. Any encryption algorithm can be used. Demonstration queries are shown in SQL.

Original languageAmerican English
Title of host publicationCyber Security: Second International Symposium, CSS 2015
DOIs
StatePublished - 1 Jan 2016

Keywords

  • comparison
  • databases
  • encryption
  • queries
  • security

EGS Disciplines

  • Computer Sciences

Fingerprint

Dive into the research topics of 'Comparing Encrypted Strings'. Together they form a unique fingerprint.

Cite this