Title | Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound |
---|---|

Booktitle | Theory of Cryptography |

Volume | 11240 |

Pages | 177-191 |

Year | 2018 |

URL | Search for the paper |

DOI | 10.1007/978-3-030-03810-6_7 (link) |

Author | Gil Segev |

Author | Ido Shahaf |

Abstract | Order-preserving encryption emerged as a key ingredient underlying the security of practical database management systems. Boldyreva et al. (EUROCRYPT ’09) initiated the study of its security by introducing two natural notions of security. They proved that their first notion, a “best-possible” relaxation of semantic security allowing ciphertexts to reveal the ordering of their corresponding plaintexts, is not realizable. Later on Boldyreva et al. (CRYPTO ’11) proved that any scheme satisfying their second notion, indistinguishability from a random order-preserving function, leaks about half of the bits of a random plaintext.This unsettling state of affairs was recently changed by Chenette et al. (FSE ’16), who relaxed the above “best-possible” notion and constructed a scheme satisfying it based on any pseudorandom function. In addition to revealing the ordering of any two encrypted plaintexts, ciphertexts in their scheme reveal only the position of the most significant bit on which the plaintexts differ. A significant drawback of their scheme, however, is its substantial ciphertext expansion: Encrypting plaintexts of length m bits results in ciphertexts of length $$m \cdot \ell $$ bits, where $$\ell $$ determines the level of security (e.g., $$\ell = 80$$ in practice).In this work we prove a lower bound on the ciphertext expansion of any order-preserving encryption scheme satisfying the “limited-leakage” notion of Chenette et al. with respect to non-uniform polynomial-time adversaries, matching the ciphertext expansion of their scheme up to lower-order terms. This improves a recent result of Cash and Zhang (TCC ’18), who proved such a lower bound for schemes satisfying this notion with respect to computationally-unbounded adversaries (capturing, for example, schemes whose security can be proved in the random-oracle model without relying on cryptographic assumptions). Our lower bound applies, in particular, to schemes whose security is proved in the standard model. |

@article{tcc-2018-29033, title={Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound}, booktitle={Theory of Cryptography}, series={Theory of Cryptography}, publisher={Springer}, volume={11240}, pages={177-191}, doi={10.1007/978-3-030-03810-6_7}, author={Gil Segev and Ido Shahaf}, year=2018 }