Skip to main content

Similarity Recoverable, Format-Preserving String Encryption

  • Conference paper
  • First Online:
Web Technologies and Applications (APWeb 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9932))

Included in the following conference series:

Abstract

Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format. In this paper, we consider FPE on string data, and design new FPE algorithms that preserve the string similarity for a large number of string metrics. The experiments show that our encryption algorithm is efficient and robust against the frequency analysis attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://github.com/miracl/MIRACL.

  2. 2.

    http://www2.census.gov/topics/genealogy/1990surnames/dist.all.last.

  3. 3.

    http://archive.ics.uci.edu/ml/datasets/Adult.

  4. 4.

    Similarity metrics: https://github.com/tdebatty/java-string-similarity.

References

  1. Aggarwal, C.C., Philip, S.Y.: On anonymization of string data. In: SDM, pp. 419–424 (2007)

    Google Scholar 

  2. Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proceedings of the 21st International Conference on Data Engineering, pp. 217–228 (2005)

    Google Scholar 

  3. Bellare, M., Ristenpart, T., Rogaway, P., Stegers, T.: Format-preserving encryption. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 295–312. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  4. Black, J.A., Rogaway, P.: Ciphers with arbitrary finite domains. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 114–130. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Brier, E., Peyrin, T., Stern, J.: BPS: a format-preserving encryption proposal (2010). http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/bps/bps-spec.pdf

  6. Churches, T., Christen, P.: Some methods for blindfolded record linkage. BMC Med. Inf. Decis. Mak. 4(1), 1 (2004)

    Article  Google Scholar 

  7. Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  8. Scannapieco, M., Figotin, I., Bertino, E., Elmagarmid, A.K.: Privacy preserving schema and data matching. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 653–664 (2007)

    Google Scholar 

  9. Wang, J., Kraska, T., Franklin, M.J., Feng, J.: Crowder: crowdsourcing entity resolution. Proc. VLDB Endowment 5(11), 1483–1494 (2012)

    Article  Google Scholar 

Download references

Acknowledgment

This material is based upon work supported by the U.S. National Science Foundation under Grant No. 1464800.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wendy Hui Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Li, Y., Wang, W.H. (2016). Similarity Recoverable, Format-Preserving String Encryption. In: Li, F., Shim, K., Zheng, K., Liu, G. (eds) Web Technologies and Applications. APWeb 2016. Lecture Notes in Computer Science(), vol 9932. Springer, Cham. https://doi.org/10.1007/978-3-319-45817-5_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-45817-5_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-45816-8

  • Online ISBN: 978-3-319-45817-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics