{"title":"Request-Based Comparable Encryption Scheme with Multiple Users","authors":"Jun Ye, Meixia Miao, Peng Chen, Xiaofeng Chen","doi":"10.1109/BWCCA.2015.30","DOIUrl":null,"url":null,"abstract":"Order Preserving Encryption (OPE) is widely used for data searching. But, when all the numbers in the domain are encrypted by using OPE, an attacker can easily obtain the correspondence between encrypted numbers and original numbers. Furukawa proposed a new encryption scheme, which is called request-based comparable encryption, to solve the problem. However, comparable encryption only applies to single user. In this paper, a novel of request-based comparable encryption with multiple users is proposed. The different ciphertexts which are encrypted with different private keys can be compared by using the token transformation skill.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BWCCA.2015.30","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Order Preserving Encryption (OPE) is widely used for data searching. But, when all the numbers in the domain are encrypted by using OPE, an attacker can easily obtain the correspondence between encrypted numbers and original numbers. Furukawa proposed a new encryption scheme, which is called request-based comparable encryption, to solve the problem. However, comparable encryption only applies to single user. In this paper, a novel of request-based comparable encryption with multiple users is proposed. The different ciphertexts which are encrypted with different private keys can be compared by using the token transformation skill.