Cryptographic Treatment of CryptDB's Adjustable Join
In this document, we provide a cryptographic treatment of the adjustable join protocol from CryptDB. We also discuss how our scheme could be used outside of CryptDB because it provides a simple functionality that may be needed in other settings. Intuitively, it is a pseudorandom permutation where an...
Main Authors: | , |
---|---|
Other Authors: | |
Language: | en-US |
Published: |
2012
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/69859 |
_version_ | 1826214837802237952 |
---|---|
author | Popa, Raluca Ada Zeldovich, Nickolai |
author2 | Nickolai Zeldovich |
author_facet | Nickolai Zeldovich Popa, Raluca Ada Zeldovich, Nickolai |
author_sort | Popa, Raluca Ada |
collection | MIT |
description | In this document, we provide a cryptographic treatment of the adjustable join protocol from CryptDB. We also discuss how our scheme could be used outside of CryptDB because it provides a simple functionality that may be needed in other settings. Intuitively, it is a pseudorandom permutation where an external party not knowing the secret key can nonetheless adjust a ciphertext under one key to a ciphertext under a different key, given an adjustment token from a party that knows the secret key. |
first_indexed | 2024-09-23T16:11:57Z |
id | mit-1721.1/69859 |
institution | Massachusetts Institute of Technology |
language | en-US |
last_indexed | 2024-09-23T16:11:57Z |
publishDate | 2012 |
record_format | dspace |
spelling | mit-1721.1/698592019-04-11T08:23:35Z Cryptographic Treatment of CryptDB's Adjustable Join Popa, Raluca Ada Zeldovich, Nickolai Nickolai Zeldovich Parallel and Distributed Operating Systems SQL queries encrypted database In this document, we provide a cryptographic treatment of the adjustable join protocol from CryptDB. We also discuss how our scheme could be used outside of CryptDB because it provides a simple functionality that may be needed in other settings. Intuitively, it is a pseudorandom permutation where an external party not knowing the secret key can nonetheless adjust a ciphertext under one key to a ciphertext under a different key, given an adjustment token from a party that knows the secret key. 2012-03-26T18:00:05Z 2012-03-26T18:00:05Z 2012-03-25 http://hdl.handle.net/1721.1/69859 en-US MIT-CSAIL-TR-2012-006 14 p. application/pdf |
spellingShingle | SQL queries encrypted database Popa, Raluca Ada Zeldovich, Nickolai Cryptographic Treatment of CryptDB's Adjustable Join |
title | Cryptographic Treatment of CryptDB's Adjustable Join |
title_full | Cryptographic Treatment of CryptDB's Adjustable Join |
title_fullStr | Cryptographic Treatment of CryptDB's Adjustable Join |
title_full_unstemmed | Cryptographic Treatment of CryptDB's Adjustable Join |
title_short | Cryptographic Treatment of CryptDB's Adjustable Join |
title_sort | cryptographic treatment of cryptdb s adjustable join |
topic | SQL queries encrypted database |
url | http://hdl.handle.net/1721.1/69859 |
work_keys_str_mv | AT poparalucaada cryptographictreatmentofcryptdbsadjustablejoin AT zeldovichnickolai cryptographictreatmentofcryptdbsadjustablejoin |