Skip to main content

2019 | OriginalPaper | Buchkapitel

3. Sorting on Encrypted Data

verfasst von : Ayantika Chatterjee, Khin Mi Mi Aung

Erschienen in: Fully Homomorphic Encryption in Real World Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Sorting is an age old problem of rearrangement. Since arrangement of items has profound influence on speed and simplicity of algorithms, sorting has attracted great deal of importance in computer science literature. Recently with the advent of cloud computing we revisit problem of sorting on encrypted data. Sorting network consists of comparators and swapping operations. The difference between classical comparison-based sorting algorithms and sorting networks on encrypted inputs are discussed in this chapter. The interesting fact for encrypted domain is that all operations must be data independent in the flow of the algorithm steps in sorting networks. Hence, in spite of the fact that data dependent algorithms may be faster, they may not suitable for encrypted data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
In computer science, comparator networks are abstract devices built up of a fixed number of “wires”, carrying values, and comparator modules that connect pairs of wires, swapping the values on the wires if they are not in a desired order. Such networks are typically designed to perform sorting on fixed numbers of values, in which case they are called sorting networks (Sorting Network 2018).
 
Literatur
Zurück zum Zitat Akin IH, Sunar B (2015) On the difficulty of securing web applications using CryptDB. IACR cryptology ePrint archive, vol 2015, p 82 Akin IH, Sunar B (2015) On the difficulty of securing web applications using CryptDB. IACR cryptology ePrint archive, vol 2015, p 82
Zurück zum Zitat Baldimtsi F, Ohrimenko O (2015) Sorting and searching behind the curtain. In: Financial cryptography and data security - 19th international conference, FC 2015, San Juan, Puerto Rico, 26–30 January 2015, Revised selected papers, pp 127–146 Baldimtsi F, Ohrimenko O (2015) Sorting and searching behind the curtain. In: Financial cryptography and data security - 19th international conference, FC 2015, San Juan, Puerto Rico, 26–30 January 2015, Revised selected papers, pp 127–146
Zurück zum Zitat Bogdanov D, Laur S, Talviste R (2014) A practical analysis of oblivious sorting algorithms for secure multi-party computation. In: Bernsmed K, Fischer-Hübner S (eds) Secure IT systems. NordSec 2014. Lecture notes in computer science, vol 8788. Springer Bogdanov D, Laur S, Talviste R (2014) A practical analysis of oblivious sorting algorithms for secure multi-party computation. In: Bernsmed K, Fischer-Hübner S (eds) Secure IT systems. NordSec 2014. Lecture notes in computer science, vol 8788. Springer
Zurück zum Zitat Çetin GS, Doröz Y, Sunar B, Savaş E (2015) Low depth circuits for efficient homomorphic sorting. Cryptology ePrint Archive, Report 2015/274 Çetin GS, Doröz Y, Sunar B, Savaş E (2015) Low depth circuits for efficient homomorphic sorting. Cryptology ePrint Archive, Report 2015/274
Zurück zum Zitat Chatterjee A, Kaushal M, SenGupta I (2013) Accelerating sorting of fully homomorphic encrypted data. INDOCRYPT 262–273 Chatterjee A, Kaushal M, SenGupta I (2013) Accelerating sorting of fully homomorphic encrypted data. INDOCRYPT 262–273
Zurück zum Zitat Chatterjee A, SenGupta I (2015) Windowing technique for lazy sorting of encrypted data. In: 2015 IEEE conference on communications and network security (CNS), pp 633–637 Chatterjee A, SenGupta I (2015) Windowing technique for lazy sorting of encrypted data. In: 2015 IEEE conference on communications and network security (CNS), pp 633–637
Zurück zum Zitat Chatterjee A, SenGupta I (2017) Sorting of fully homomorphic encrypted cloud data: can partitioning be effective? IEEE Trans Serv Comput Chatterjee A, SenGupta I (2017) Sorting of fully homomorphic encrypted cloud data: can partitioning be effective? IEEE Trans Serv Comput
Zurück zum Zitat Chatterjee A, SenGupta I (2018) Translating algorithms to handle fully homomorphic encrypted data on the cloud. IEEE Trans Cloud Comput 287–300 Chatterjee A, SenGupta I (2018) Translating algorithms to handle fully homomorphic encrypted data on the cloud. IEEE Trans Cloud Comput 287–300
Zurück zum Zitat Damgård I, Geisler M, Krøigaard M (2007) Efficient and secure comparison for on-line auctions. Springer, Berlin, pp 416–430MATH Damgård I, Geisler M, Krøigaard M (2007) Efficient and secure comparison for on-line auctions. Springer, Berlin, pp 416–430MATH
Zurück zum Zitat Emmadi N, Gauravaram P, Narumanchi H, Syed H (2015) Updates on sorting of fully homomorphic encrypted data. IACR cryptology ePrint archive, vol 2015, p 995 Emmadi N, Gauravaram P, Narumanchi H, Syed H (2015) Updates on sorting of fully homomorphic encrypted data. IACR cryptology ePrint archive, vol 2015, p 995
Zurück zum Zitat Fischlin M (2001) A cost-effective pay-per-multiplication comparison method for millionaires Fischlin M (2001) A cost-effective pay-per-multiplication comparison method for millionaires
Zurück zum Zitat Goldwasser S, Micali S (1982) Probabilistic encryption & how to play mental poker keeping secret all partial information. In: Proceedings of the Fourteenth annual ACM symposium on theory of computing, STOC ’82, pp 365–377. ACM, New York . http://doi.acm.org/10.1145/800070.802212 Goldwasser S, Micali S (1982) Probabilistic encryption & how to play mental poker keeping secret all partial information. In: Proceedings of the Fourteenth annual ACM symposium on theory of computing, STOC ’82, pp 365–377. ACM, New York . http://​doi.​acm.​org/​10.​1145/​800070.​802212
Zurück zum Zitat Katz J, Lindell Y (2007) Introduction to modern cryptography (Chapman & Hall/CRC Cryptography and network security series). Chapman & Hall/CRC Katz J, Lindell Y (2007) Introduction to modern cryptography (Chapman & Hall/CRC Cryptography and network security series). Chapman & Hall/CRC
Zurück zum Zitat Knuth DE (1998) The art of computer programming, vol 3, 2nd edn. Sorting and searching. Addison Wesley Longman Publishing Co., Inc, Redwood City, CA, USA Knuth DE (1998) The art of computer programming, vol 3, 2nd edn. Sorting and searching. Addison Wesley Longman Publishing Co., Inc, Redwood City, CA, USA
Zurück zum Zitat Liu D, Bertino E, Yi X (2014) Privacy of outsourced k-means clustering. In: A 9th ACM symposium on information, computer and communications security, ASIA CCS ’14, Kyoto, Japan - June 03 -06 2014, pp 123–134 Liu D, Bertino E, Yi X (2014) Privacy of outsourced k-means clustering. In: A 9th ACM symposium on information, computer and communications security, ASIA CCS ’14, Kyoto, Japan - June 03 -06 2014, pp 123–134
Zurück zum Zitat Naehrig M, Lauter K, Vaikuntanathan V, Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM workshop on cloud computing security workshop, ser. CCSW ’11. New York, NY, USA: ACM, pp 113–124 Naehrig M, Lauter K, Vaikuntanathan V, Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM workshop on cloud computing security workshop, ser. CCSW ’11. New York, NY, USA: ACM, pp 113–124
Zurück zum Zitat Popa RA, Redfield Catherine MS, Zeldovich N, Balakrishnan H (2011) CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of the 23rd ACM symposium on operating systems principles (SOSP), Cascais, Portugal Popa RA, Redfield Catherine MS, Zeldovich N, Balakrishnan H (2011) CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of the 23rd ACM symposium on operating systems principles (SOSP), Cascais, Portugal
Zurück zum Zitat Sander T, Young A, Yung M (1999) Non-interactive cryptocomputing for nc1. In: 40th annual symposium on foundations of computer science, pp 554–566 Sander T, Young A, Yung M (1999) Non-interactive cryptocomputing for nc1. In: 40th annual symposium on foundations of computer science, pp 554–566
Zurück zum Zitat Stinson D (2002) Cryptography: theory and practice, second edition : section 5.9.1, 2nd edn. CRC/C&H Stinson D (2002) Cryptography: theory and practice, second edition : section 5.9.1, 2nd edn. CRC/C&H
Zurück zum Zitat Vaidya J, Clifton C (2003) Privacy-preserving k-means clustering over vertically partitioned data. In: Proceedings of the Ninth ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’03, pp 206–215. ACM, New York. http://doi.acm.org/10.1145/956750.956776 Vaidya J, Clifton C (2003) Privacy-preserving k-means clustering over vertically partitioned data. In: Proceedings of the Ninth ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’03, pp 206–215. ACM, New York. http://​doi.​acm.​org/​10.​1145/​956750.​956776
Zurück zum Zitat Zhou H, Wornell GW (2014) Efficient homomorphic encryption on integer vectors and its applications. In: 2014 Information theory and applications workshop, ITA 2014, San Diego, CA, USA, 9–14 February 2014, pp 1–9 Zhou H, Wornell GW (2014) Efficient homomorphic encryption on integer vectors and its applications. In: 2014 Information theory and applications workshop, ITA 2014, San Diego, CA, USA, 9–14 February 2014, pp 1–9
Metadaten
Titel
Sorting on Encrypted Data
verfasst von
Ayantika Chatterjee
Khin Mi Mi Aung
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-6393-1_3