{"id":"https://openalex.org/W3092436882","doi":"https://doi.org/10.1145/3320269.3384739","title":"Efficient Secure Computation of Order-Preserving Encryption","display_name":"Efficient Secure Computation of Order-Preserving Encryption","publication_year":2020,"publication_date":"2020-10-05","ids":{"openalex":"https://openalex.org/W3092436882","doi":"https://doi.org/10.1145/3320269.3384739","mag":"3092436882"},"language":"en","primary_location":{"id":"doi:10.1145/3320269.3384739","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3320269.3384739","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055500838","display_name":"Anselme Tueno","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132444","display_name":"Systems, Applications & Products in Data Processing (Germany)","ror":"https://ror.org/03dsc8d33","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210132444"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Anselme Tueno","raw_affiliation_strings":["SAP Security Research, Walldorf, Germany"],"affiliations":[{"raw_affiliation_string":"SAP Security Research, Walldorf, Germany","institution_ids":["https://openalex.org/I4210132444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102985450","display_name":"Florian Kerschbaum","orcid":"https://orcid.org/0000-0003-4288-2286"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Florian Kerschbaum","raw_affiliation_strings":["University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5055500838"],"corresponding_institution_ids":["https://openalex.org/I4210132444"],"apc_list":null,"apc_paid":null,"fwci":1.8558,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.88576857,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"193","last_page":"207"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8133187890052795},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7719581723213196},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.6657552719116211},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5629194974899292},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.5610266923904419},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.5525366067886353},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5171241760253906},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4958275258541107},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.45486822724342346},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4127853512763977},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3970949351787567},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3828016519546509}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8133187890052795},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7719581723213196},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.6657552719116211},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5629194974899292},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.5610266923904419},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.5525366067886353},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5171241760253906},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4958275258541107},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.45486822724342346},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4127853512763977},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3970949351787567},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3828016519546509}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3320269.3384739","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3320269.3384739","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W780859780","https://openalex.org/W1534636449","https://openalex.org/W1799617698","https://openalex.org/W1819119697","https://openalex.org/W2047370889","https://openalex.org/W2106217851","https://openalex.org/W2116025923","https://openalex.org/W2134340933","https://openalex.org/W2135297873","https://openalex.org/W2146828512","https://openalex.org/W2159915142","https://openalex.org/W2188232729","https://openalex.org/W2397857137","https://openalex.org/W2782412754","https://openalex.org/W2795038002","https://openalex.org/W2907745774","https://openalex.org/W2949933192","https://openalex.org/W2951468471","https://openalex.org/W2974330110","https://openalex.org/W3043405295","https://openalex.org/W4239982965"],"related_works":["https://openalex.org/W3118757263","https://openalex.org/W3181603331","https://openalex.org/W2990148432","https://openalex.org/W1484220609","https://openalex.org/W3165760144","https://openalex.org/W2886707668","https://openalex.org/W2386528781","https://openalex.org/W4366959067","https://openalex.org/W2952102040","https://openalex.org/W784757290"],"abstract_inverted_index":{"Order-preserving":[0],"encryption":[1,97,174,193],"(OPE)":[2],"allows":[3],"encrypting":[4],"data,":[5],"while":[6,295],"still":[7],"enabling":[8],"efficient":[9],"range":[10,85,131,155,312],"queries":[11,86,132,156],"on":[12,87,187,223,238,264,314],"the":[13,24,50,71,92,100,104,116,139,143,146,153,163,235,248,252,292,296],"encrypted":[14,68,227],"data.":[15,89],"Moreover,":[16,294],"it":[17,258],"does":[18],"not":[19],"require":[20],"any":[21,159],"change":[22],"to":[23,53,70,82,150,162,172,213,287,304,308],"database":[25,249,316],"management":[26],"system,":[27],"which":[28,230],"makes":[29],"OPE":[30,44,185,215,219,221],"schemes":[31,45,216],"very":[32],"suitable":[33],"for":[34,133],"data":[35,69,228],"outsourcing":[36],"with":[37,142,175,191,203,281,317],"threats":[38],"from":[39],"weak":[40],"adversaries.":[41],"However,":[42],"all":[43],"are":[46],"necessarily":[47],"symmetric":[48],"limiting":[49],"use":[51],"case":[52],"one":[54,57],"client":[55],"and":[56,76,145,194,206,220,244,275],"server.":[58],"Imagine":[59],"a":[60,63,77,119,124,176,267,273,279,309,315],"scenario":[61],"where":[62],"Data":[64,78],"Owner":[65],"(DO)":[66],"outsources":[67],"Cloud":[72],"Service":[73],"Provider":[74],"(CSP)":[75],"Analyst":[79],"(DA)":[80],"wants":[81],"execute":[83],"private":[84,105,154],"this":[88,108,112,137,181],"Then":[90],"either":[91],"DO":[93,144,253],"must":[94,102],"reveal":[95,103],"its":[96],"key":[98],"or":[99],"DA":[101,140],"queries.":[106],"In":[107,136,180],"paper,":[109],"we":[110,183],"overcome":[111],"limitation":[113],"by":[114],"allowing":[115],"equivalent":[117],"of":[118,168,234,251,291,302,326],"public-key":[120],"OPE.":[121,239],"We":[122,209,240],"present":[123],"secure":[125,130],"multiparty":[126],"protocol":[127],"that":[128,246],"enables":[129],"multiple":[134],"users.":[135],"scheme,":[138],"cooperates":[141],"CSP":[147],"in":[148],"order":[149],"order-preserving":[151],"encrypt":[152,288],"without":[157],"revealing":[158],"other":[160],"information":[161],"parties.":[164],"The":[165],"basic":[166],"idea":[167],"our":[169,211,242,321],"scheme":[170,243,322],"is":[171],"replace":[173],"secure,":[177],"interactive":[178],"protocol.":[179],"protocol,":[182],"combine":[184],"based":[186,222],"binary":[188],"search":[189],"trees":[190],"homomorphic":[192],"garbled":[195],"circuits":[196],"(GC)":[197],"achieving":[198],"security":[199],"against":[200],"passive":[201],"adversaries":[202],"sublinear":[204],"communication":[205],"computation":[207],"complexity.":[208],"apply":[210],"construction":[212],"different":[214],"including":[217],"frequency-hiding":[218],"an":[224,289,300,324],"efficiently":[225],"searchable":[226],"structure":[229],"can":[231],"withstand":[232],"many":[233],"popularized":[236],"attacks":[237],"implemented":[241],"observed":[245],"if":[247],"size":[250],"has":[254,299,323],"1":[255],"million":[256,319],"entries":[257],"takes":[259],"only":[260,327],"about":[261,282],"0.3":[262],"s":[263,271,277],"average":[265],"via":[266,272,278],"loopback":[268],"interface":[269],"(1.3":[270],"LAN":[274],"15.6":[276],"WAN":[280],"200":[283],"ms":[284],"round-trip":[285],"time)":[286],"input":[290],"DA.":[293],"related":[297],"work":[298],"overhead":[301,325],"10":[303,318],"100":[305],"seconds":[306],"compared":[307],"plaintext":[310],"MySQL":[311],"query":[313],"entries,":[320],"360":[328],"milliseconds.":[329]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
