Dynamic searchable symmetric encryption

作者: Seny Kamara , Charalampos Papamanthou , Tom Roeder

DOI: 10.1145/2382196.2382298

关键词:

摘要: Searchable symmetric encryption (SSE) allows a client to encrypt its data in such way that this can still be searched. The most immediate application of SSE is cloud storage, where it enables securely outsource an untrusted provider without sacrificing the ability search over it.SSE has been focus active research and multitude schemes achieve various levels security efficiency have proposed. Any practical scheme, however, should (at minimum) satisfy following properties: sublinear time, against adaptive chosen-keyword attacks, compact indexes add delete files efficiently. Unfortunately, none previously-known constructions all these properties at same time. This severely limits value decreases chance deployment real-world storage systems.To address this, we propose first scheme outlined above. Our construction extends inverted index approach (Curtmola et al., CCS 2006) several non-trivial ways introduces new techniques for design SSE. In addition, implement our conduct performance evaluation, showing highly efficient ready deployment.

参考文章(21)
Kaoru Kurosawa, Yasuhiro Ohtaki, UC-Secure Searchable Symmetric Encryption financial cryptography. pp. 285- 298 ,(2012) , 10.1007/978-3-642-32946-3_21
Yevgeniy Dodis, Thomas Ristenpart, John Steinberger, Stefano Tessaro, To Hash or Not to Hash Again? InDifferentiability Results for $$H^2$$ and HMAC international cryptology conference. ,vol. 2013, pp. 348- 366 ,(2012) , 10.1007/978-3-642-32009-5_21
Georgios Amanatidis, Alexandra Boldyreva, Adam O’Neill, Provably-secure schemes for basic query support in outsourced databases Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security. pp. 14- 30 ,(2007) , 10.1007/978-3-540-73538-0_2
Mihir Bellare, Alexandra Boldyreva, Adam O’Neill, Deterministic and Efficiently Searchable Encryption Advances in Cryptology - CRYPTO 2007. pp. 535- 552 ,(2007) , 10.1007/978-3-540-74143-5_30
Seny Kamara, Kristin Lauter, Cryptographic Cloud Storage Financial Cryptography and Data Security. ,vol. 6054, pp. 136- 149 ,(2010) , 10.1007/978-3-642-14992-4_13
Melissa Chase, Seny Kamara, Structured Encryption and Controlled Disclosure international conference on the theory and application of cryptology and information security. ,vol. 6477, pp. 577- 594 ,(2010) , 10.1007/978-3-642-17373-8_33
Yehuda Lindell, Jonathan Katz, Introduction to Modern Cryptography ,(2007)
Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, Pieter Hartel, Willem Jonker, Computationally efficient searchable symmetric encryption very large data bases. pp. 87- 100 ,(2010) , 10.1007/978-3-642-15546-8_7
Oded Goldreich, Rafail Ostrovsky, Software protection and simulation on oblivious RAMs Journal of the ACM. ,vol. 43, pp. 431- 473 ,(1996) , 10.1145/233551.233553