Comment on the Security of an Order-Preserving Encryption Scheme Using Pseudo-Random Function.
Minkyu KimJe Hong ParkDongyoung RohPublished in: IEICE Trans. Commun. (2016)
Keyphrases
- encryption scheme
- order preserving
- pseudorandom
- secret key
- hash functions
- security analysis
- cca secure
- diffie hellman
- standard model
- encryption algorithm
- public key
- smart card
- public key cryptosystem
- key management
- security model
- minimal perfect hash functions
- data sharing
- uniformly distributed
- ciphertext
- similarity search
- lossless compression
- rfid tags
- principal component analysis
- provably secure
- proxy re encryption
- feature space
- data structure
- database