SQL on Structurally-Encrypted Databases

  title={SQL on Structurally-Encrypted Databases},
  author={Seny Kamara and Tarik Moataz},
We show how to encrypt a relational database in such a way that it can efficiently support a large class of SQL queries. Our construction is based solely on structured encryption and does not make use of any property-preserving encryption (PPE) schemes such as deterministic and order-preserving encryption. As such, our approach leaks considerably less than PPE-based solutions which have recently been shown to reveal a lot of information in certain settings (Naveed et al., CCS ’15 ). Our… CONTINUE READING
Highly Cited
This paper has 24 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 15 extracted citations

Encrypted Multi-Maps with Computationally-Secure Leakage

IACR Cryptology ePrint Archive • 2018
View 3 Excerpts

Structured Encryption and Leakage Suppression

IACR Cryptology ePrint Archive • 2018
View 2 Excerpts

Secure Queries on Encrypted Multi-writer Tables

2017 IEEE European Symposium on Security and Privacy (EuroS&P) • 2017
View 1 Excerpt

Secure and Efficient Query Processing over Hybrid Clouds

2017 IEEE 33rd International Conference on Data Engineering (ICDE) • 2017
View 1 Excerpt

SoK: Cryptographically Protected Database Search

2017 IEEE Symposium on Security and Privacy (SP) • 2017


Publications referenced by this paper.
Showing 1-10 of 29 references

Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation

IACR Cryptology ePrint Archive • 2014
View 6 Excerpts
Highly Influenced

Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries

IACR Cryptology ePrint Archive • 2013
View 7 Excerpts
Highly Influenced

Orthogonal Security with Cipherbase

View 4 Excerpts
Highly Influenced

GRECS: Graph Encryption for Approximate Shortest Distance Queries

ACM Conference on Computer and Communications Security • 2015
View 1 Excerpt

Inference Attacks on Property-Preserving Encrypted Databases

ACM Conference on Computer and Communications Security • 2015
View 3 Excerpts

Rich Queries on Encrypted Data: Beyond Exact Matches

IACR Cryptology ePrint Archive • 2015
View 1 Excerpt

Similar Papers

Loading similar papers…