Order-Preserving Encryption for Numeric Data

@inproceedings{Agrawal2004OrderPreservingEF,
  title={Order-Preserving Encryption for Numeric Data},
  author={Rakesh Agrawal and Jerry Kiernan and Ramakrishnan Srikant and Yirong Xu},
  booktitle={SIGMOD Conference},
  year={2004}
}
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an order-preserving encryption scheme for numeric data that allows any comparison operation to be directly applied on encrypted data. Query results produced are sound (no false hits) and complete (no false drops). Our scheme handles updates gracefully and new values can be added without requiring changes in the encryption… CONTINUE READING
Highly Influential
This paper has highly influenced 147 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 1,319 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 702 extracted citations

The New Codebreakers

Lecture Notes in Computer Science • 2016
View 20 Excerpts
Highly Influenced

Enabling search over encrypted multimedia databases

Media Forensics and Security • 2009
View 14 Excerpts
Highly Influenced

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS

2007 IEEE 23rd International Conference on Data Engineering • 2007
View 18 Excerpts
Highly Influenced

Invalidation Clues for Database Scalability Services

2007 IEEE 23rd International Conference on Data Engineering • 2007
View 6 Excerpts
Highly Influenced

1,320 Citations

050100150'06'09'12'15'18
Citations per Year
Semantic Scholar estimates that this publication has 1,320 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-5 of 5 references

Error sends bank files to eBay

T. Hamilton
The Toronto Star, September 15 • 2003
View 3 Excerpts
Highly Influenced

Stinson.Cryptography: Theory and Practice

D R.
CRC Press, 2nd edition, • 2002
View 4 Excerpts
Highly Influenced

Applied Cryptography John Wiley

View 5 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…