POPE: Partial Order Preserving Encoding

作者: Arkady Yerukhimovich , Daniel Apon , Daniel Roche , Seung Geol Choi , MASSACHUSETTS INST OF TECH LEXINGTON

DOI: 10.1145/2976749.2978345

关键词: Theoretical computer scienceEncryptionIdeal (set theory)Encoding (memory)Fraction (mathematics)Scheme (programming language)Range (mathematics)Computer science

摘要: Recently there has been much interest in performing search queries over encrypted data to enable functionality while protecting sensitive data. One particularly efficient mechanism for executing such is order-preserving encryption/encoding (OPE) which results ciphertexts that preserve the relative order of underlying plaintexts thus allowing range and comparison be performed directly on ciphertexts. In this paper, we propose an alternative approach optimized support insert-heavy workloads as are common "big data" applications still maintaining achieving stronger security. Specifically, a new primitive called partial preserving encoding (POPE) achieves ideal OPE security with frequency hiding also leaves sizable fraction pairwise incomparable. Using only O(1) persistent $O(n^\epsilon)$ non-persistent client storage $0<\epsilon<1$, our POPE scheme provides extremely fast batch insertion consisting single round, amortized cost up $O(n^{1-\epsilon})$ queries. This improved performance makes better suited today's databases.

参考文章(43)
Avi Wigderson, Oded Goldreich, Silvio Micali, Proofs that Yield Nothing But their Validity and a Methodology of Cryptographic Protocol Design (Extended Abstract) foundations of computer science. pp. 174- 187 ,(1986)
Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman, Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation theory and application of cryptographic techniques. pp. 563- 594 ,(2015) , 10.1007/978-3-662-46803-6_19
David Cash, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cătălin Roşu, Michael Steiner, Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries international cryptology conference. ,vol. 2013, pp. 353- 373 ,(2013) , 10.1007/978-3-642-40041-4_20
Alok Aggarwal, Jeffrey Scott Vitter, The I/O Complexity of Sorting and Related Problems (Extended Abstract) international colloquium on automata languages and programming. pp. 467- 478 ,(1987) , 10.1007/3-540-18088-5_40
Dan Boneh, Brent Waters, Conjunctive, Subset, and Range Queries on Encrypted Data Theory of Cryptography. pp. 535- 554 ,(2007) , 10.1007/978-3-540-70936-7_29
Sanjam Garg, Craig Gentry, Shai Halevi, Candidate Multilinear Maps from Ideal Lattices theory and application of cryptographic techniques. pp. 1- 17 ,(2013) , 10.1007/978-3-642-38348-9_1
Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O’Neill, Order-Preserving Symmetric Encryption international cryptology conference. pp. 224- 241 ,(2009) , 10.1007/978-3-642-01001-9_13
Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, Constant Communication ORAM with Small Blocksize computer and communications security. pp. 862- 873 ,(2015) , 10.1145/2810103.2813701
Florian Kerschbaum, Axel Schroepfer, Optimal Average-Complexity Ideal-Security Order-Preserving Encryption computer and communications security. pp. 275- 286 ,(2014) , 10.1145/2660267.2660277
O. Goldreich, Towards a theory of software protection and simulation by oblivious RAMs symposium on the theory of computing. pp. 182- 194 ,(1987) , 10.1145/28395.28416