Searchable Symmetric Encryption with Tunable Leakage Using Multiple Servers

作者: Xiangfu Song , Dong Yin , Han Jiang , Qiuliang Xu

DOI: 10.1007/978-3-030-59410-7_10

关键词:

摘要: Searchable symmetric encryption has been a promising primitive as it enables cloud user to search over outsourced encrypted data efficiently by only leaking small amount of controllable leakage. However, recent leakage-abuse attacks demonstrate that those stand leakage profiles can be exploited perform severe – the attacker recover query or document with high probability. Ideal defending methods leveraging heavy cryptographic primitives, e.g. Oblivious RAM, Multiparty Computation, are still too inefficient for practice nowadays.

参考文章(35)
Lakshminarayanan Subramanian, Sherman S. M. Chow, Sherman S. M. Chow, Jie-Han Lee, Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases. network and distributed system security symposium. ,(2009)
David Cash, Stefano Tessaro, The Locality of Searchable Symmetric Encryption theory and application of cryptographic techniques. pp. 351- 368 ,(2014) , 10.1007/978-3-642-55220-5_20
David Cash, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cătălin Roşu, Michael Steiner, Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries international cryptology conference. ,vol. 2013, pp. 353- 373 ,(2013) , 10.1007/978-3-642-40041-4_20
Emil Stefanov, Charalampos Papamanthou, Elaine Shi, Practical Dynamic Searchable Encryption with Small Leakage network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23298
David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart, Leakage-Abuse Attacks Against Searchable Encryption computer and communications security. pp. 668- 679 ,(2015) , 10.1145/2810103.2813700
Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu, Toward Robust Hidden Volumes Using Write-Only Oblivious RAM computer and communications security. pp. 203- 214 ,(2014) , 10.1145/2660267.2660313
Mingzhong Wang, Yu-an Tan, Chang Liu, Liehuang Zhu, Search pattern leakage in searchable encryption: Attacks and new construction Information Sciences. ,vol. 265, pp. 176- 188 ,(2014) , 10.1016/J.INS.2013.11.021
Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky, Searchable symmetric encryption: Improved definitions and efficient constructions Journal of Computer Security. ,vol. 19, pp. 895- 934 ,(2011) , 10.3233/JCS-2011-0426
B. Chor, O. Goldreich, E. Kushilevitz, M. Sudan, Private information retrieval foundations of computer science. pp. 41- 50 ,(1995) , 10.1109/SFCS.1995.492461
Srinivas Devadas, Victor Costan, Intel SGX Explained. IACR Cryptology ePrint Archive. ,vol. 2016, pp. 86- ,(2016)