Comparing Encrypted Strings

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Database outsourcing, also known as database as a service, has become a popular way to store and process large amounts of data. Unfortunately, remote data storage can compromise confidentiality. An obvious solution is to encrypt data, prior to storage, but encrypted data is more difficult to query. We describe and demonstrate an efficient scheme for comparing ciphertexts, corresponding to arbitrary plaintexts, in such a way that the result is the same as if the plaintexts had been compared. This allows queries to be processed remotely and securely. Comparison is not limited to equality. For example, encrypted employee names can be sorted remotely without decryption. Any encryption algorithm can be used. Demonstration queries are shown in SQL.

Original languageAmerican English
Title of host publicationCyber Security - 2nd International Symposium, CSS 2015, Revised Selected Papers
EditorsKristin Haltinner, Dilshani Sarathchandra, Jim Alves-Foss, Kevin Chang, Daniel Conte de Leon, Jia Song
PublisherSpringer Verlag
Pages57-66
Number of pages10
ISBN (Print)9783319283128
DOIs
StatePublished - 2016
Event2nd International Symposium on Cyber Security, CSS 2015 - Coeur d’Alene, United States
Duration: 7 Apr 20158 Apr 2015

Publication series

NameCommunications in Computer and Information Science
Volume589
ISSN (Print)1865-0929

Conference

Conference2nd International Symposium on Cyber Security, CSS 2015
Country/TerritoryUnited States
CityCoeur d’Alene
Period7/04/158/04/15

Keywords

  • Comparison
  • Databases
  • Encryption
  • Queries
  • Security

EGS Disciplines

  • Computer Sciences

Fingerprint

Dive into the research topics of 'Comparing Encrypted Strings'. Together they form a unique fingerprint.

Cite this