Private Compound Wildcard Queries Using Fully Homomorphic Encryption
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, M. | - |
dc.contributor.author | Lee, H.T. | - |
dc.contributor.author | Ling, S. | - |
dc.contributor.author | Tan, B.H.M. | - |
dc.contributor.author | Wang, H. | - |
dc.date.accessioned | 2023-03-08T14:59:15Z | - |
dc.date.available | 2023-03-08T14:59:15Z | - |
dc.date.issued | 2019-09 | - |
dc.identifier.issn | 1545-5971 | - |
dc.identifier.issn | 1941-0018 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/63715 | - |
dc.description.abstract | Fully homomorphic encryption (FHE) brings a paradigm shift in cryptographic engineering by enabling us to resolve various unsolved problems. Among them, this work solves the problem to design a private database query (PDQ) protocol that supports compound queries with wildcard conditions on encrypted databases using FHE. More precisely, we consider a setting where clients outsource an encrypted database using FHE to a remote server, and later request results of compound queries including a wildcard search condition–given a set of attribute values {A1; A2; . . .; An} and a search pattern W, retrieve a set of all attribute values Ai ’s in which the pattern W occurs. To this end, we first develop an algorithm for testing whether an encrypted string contains an encrypted pattern without revealing any information of the pattern, taking auxiliary encryptions as additional inputs. Then, using this algorithm, we design PDQ protocols on encrypted databases, which support compound queries using wildcard search conditions. Finally, we demonstrate proof-of-concept implementation results of our protocols by exploiting single-instruction-multiple-data operations and multi-threading techniques. | - |
dc.format.extent | 14 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Private Compound Wildcard Queries Using Fully Homomorphic Encryption | - |
dc.type | Article | - |
dc.identifier.doi | 10.1109/TDSC.2017.2763593 | - |
dc.identifier.bibliographicCitation | IEEE Transactions on Dependable and Secure Computing, v.16, no.5, pp 743 - 756 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.wosid | 000484310500003 | - |
dc.identifier.scopusid | 2-s2.0-85032291042 | - |
dc.citation.endPage | 756 | - |
dc.citation.number | 5 | - |
dc.citation.startPage | 743 | - |
dc.citation.title | IEEE Transactions on Dependable and Secure Computing | - |
dc.citation.volume | 16 | - |
dc.type.docType | Article | - |
dc.publisher.location | 미국 | - |
dc.subject.keywordAuthor | encrypted databases | - |
dc.subject.keywordAuthor | homomorphic encryption | - |
dc.subject.keywordAuthor | Private database queries | - |
dc.subject.keywordAuthor | wildcard pattern matching | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
84, Heukseok-ro, Dongjak-gu, Seoul, Republic of Korea (06974)02-820-6194
COPYRIGHT 2019 Chung-Ang University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.