Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound.
Gil SegevIdo ShahafPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- lower bound
- ciphertext
- order preserving
- encryption scheme
- upper bound
- standard model
- secret key
- hash functions
- cca secure
- proxy re encryption
- public key
- minimal perfect hash functions
- security analysis
- objective function
- optimal solution
- encryption algorithm
- diffie hellman
- identity based encryption
- data sharing
- private key
- data sets
- data distribution
- lightweight
- motion estimation
- security model
- image processing
- databases