Javascript must be enabled to continue!
An Order-Preserving Encryption Scheme Based on Weighted Random Interval Division for Ciphertext Comparison in Wearable Systems
View through CrossRef
With the rapid development of wearable devices with various sensors, massive sensing data for health management have been generated. This causes a potential revolution in medical treatments, diagnosis, and prediction. However, due to the privacy risks of health data aggregation, data comparative analysis under privacy protection faces challenges. Order-preserving encryption is an effective scheme to achieve private data retrieval and comparison, but the existing order-preserving encryption algorithms are mainly aimed at either integer data or single characters. It is urgent to build a lightweight order-preserving encryption scheme that supports multiple types of data such as integer, floating number, and string. In view of the above problems, this paper proposes an order-preserving encryption scheme (WRID-OPES) based on weighted random interval division (WRID). WRID-OPES converts all kinds of data into hexadecimal number strings and calculates the frequency and weight of each hexadecimal number. The plaintext digital string is blocked and recombined, and each block is encrypted using WRID algorithm according to the weight of each hexadecimal digit. Our schemes can realize the order-preserving encryption of multiple types of data and achieve indistinguishability under ordered selection plaintext attack (IND-OCPA) security in static data sets. Security analysis and experiments show that our scheme can resist attacks using exhaustive methods and statistical methods and has linear encryption time and small ciphertext expansion rate.
Title: An Order-Preserving Encryption Scheme Based on Weighted Random Interval Division for Ciphertext Comparison in Wearable Systems
Description:
With the rapid development of wearable devices with various sensors, massive sensing data for health management have been generated.
This causes a potential revolution in medical treatments, diagnosis, and prediction.
However, due to the privacy risks of health data aggregation, data comparative analysis under privacy protection faces challenges.
Order-preserving encryption is an effective scheme to achieve private data retrieval and comparison, but the existing order-preserving encryption algorithms are mainly aimed at either integer data or single characters.
It is urgent to build a lightweight order-preserving encryption scheme that supports multiple types of data such as integer, floating number, and string.
In view of the above problems, this paper proposes an order-preserving encryption scheme (WRID-OPES) based on weighted random interval division (WRID).
WRID-OPES converts all kinds of data into hexadecimal number strings and calculates the frequency and weight of each hexadecimal number.
The plaintext digital string is blocked and recombined, and each block is encrypted using WRID algorithm according to the weight of each hexadecimal digit.
Our schemes can realize the order-preserving encryption of multiple types of data and achieve indistinguishability under ordered selection plaintext attack (IND-OCPA) security in static data sets.
Security analysis and experiments show that our scheme can resist attacks using exhaustive methods and statistical methods and has linear encryption time and small ciphertext expansion rate.
Related Results
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Design on Face Recognition System with Privacy Preservation Based on Homomorphic Encryption
Design on Face Recognition System with Privacy Preservation Based on Homomorphic Encryption
Abstract
Face recognition is playing an increasingly important role in present society, and suffers from the privacy leakage in plaintext. Therefore, a recognition system b...
Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key
Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key
As a method for providing security of the messages sent via a public channel in the case of potential coercive attacks there had been proposed algorithms and protocols of deniable ...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
TCA-PEKS: Trusted Certificateless Authentication Public-key Encryption with Keyword Search scheme in Cloud Storage
TCA-PEKS: Trusted Certificateless Authentication Public-key Encryption with Keyword Search scheme in Cloud Storage
Abstract
Public key encryption with keyword search (PEKS) technology achieves accurate ciphertext retrieval while protecting data privacy. However, curious or malicious sem...
Research on Ciphertext‐Policy Attribute‐Based Encryption with Attribute Level User Revocation in Cloud Storage
Research on Ciphertext‐Policy Attribute‐Based Encryption with Attribute Level User Revocation in Cloud Storage
Attribute‐based encryption (ABE) scheme is more and more widely used in the cloud storage, which can achieve fine‐grained access control. However, it is an important challenge to s...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...


