Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Private Compound Wildcard Queries Using Fully Homomorphic Encryption

Full metadata record
DC Field Value Language
dc.contributor.authorKim, M.-
dc.contributor.authorLee, H.T.-
dc.contributor.authorLing, S.-
dc.contributor.authorTan, B.H.M.-
dc.contributor.authorWang, H.-
dc.date.accessioned2023-03-08T14:59:15Z-
dc.date.available2023-03-08T14:59:15Z-
dc.date.issued2019-09-
dc.identifier.issn1545-5971-
dc.identifier.issn1941-0018-
dc.identifier.urihttps://scholarworks.bwise.kr/cau/handle/2019.sw.cau/63715-
dc.description.abstractFully homomorphic encryption (FHE) brings a paradigm shift in cryptographic engineering by enabling us to resolve various unsolved problems. Among them, this work solves the problem to design a private database query (PDQ) protocol that supports compound queries with wildcard conditions on encrypted databases using FHE. More precisely, we consider a setting where clients outsource an encrypted database using FHE to a remote server, and later request results of compound queries including a wildcard search condition–given a set of attribute values {A1; A2; . . .; An} and a search pattern W, retrieve a set of all attribute values Ai ’s in which the pattern W occurs. To this end, we first develop an algorithm for testing whether an encrypted string contains an encrypted pattern without revealing any information of the pattern, taking auxiliary encryptions as additional inputs. Then, using this algorithm, we design PDQ protocols on encrypted databases, which support compound queries using wildcard search conditions. Finally, we demonstrate proof-of-concept implementation results of our protocols by exploiting single-instruction-multiple-data operations and multi-threading techniques.-
dc.format.extent14-
dc.language영어-
dc.language.isoENG-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titlePrivate Compound Wildcard Queries Using Fully Homomorphic Encryption-
dc.typeArticle-
dc.identifier.doi10.1109/TDSC.2017.2763593-
dc.identifier.bibliographicCitationIEEE Transactions on Dependable and Secure Computing, v.16, no.5, pp 743 - 756-
dc.description.isOpenAccessN-
dc.identifier.wosid000484310500003-
dc.identifier.scopusid2-s2.0-85032291042-
dc.citation.endPage756-
dc.citation.number5-
dc.citation.startPage743-
dc.citation.titleIEEE Transactions on Dependable and Secure Computing-
dc.citation.volume16-
dc.type.docTypeArticle-
dc.publisher.location미국-
dc.subject.keywordAuthorencrypted databases-
dc.subject.keywordAuthorhomomorphic encryption-
dc.subject.keywordAuthorPrivate database queries-
dc.subject.keywordAuthorwildcard pattern matching-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Software > School of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Hyungtae photo

Lee, Hyungtae
소프트웨어대학 (소프트웨어학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE