Final Project: Conjunctive, Subset, and Range Queries on Encrypted Data
نویسنده
چکیده
The 2006 paper Conjunctive, Subset, and Range Queries on Encrypted Data by Dan Boneh and Brent Waters addresses the problem of predicate evaluation on encrypted data in the public key setting – one that does not leak any additional information about the data. The authors provide both a security notion for such queries and an efficient construction based on the bilinear and 3-party composite Diffie-Hellman assumptions. The goal of this write-up is to present the security notion devised by Boneh and Waters and describe their construction at a high level.
منابع مشابه
Conjunctive, Subset, and Range Queries on Encrypted Data
We construct public-key systems that support comparison queries (x ≥ a) on encrypted data as well as more general queries such as subset queries (x ∈ S). Furthermore, these systems support arbitrary conjunctive queries (P1 ∧ · · · ∧ P`) without leaking information on individual conjuncts. We present a general framework for constructing and analyzing public-key systems supporting queries on encr...
متن کاملEvaluating Predicates over Encrypted Data
Predicate encryption is a new encryption paradigm where the secret key owner can perform fine-grained access control over the encrypted data. In particular, the secret key owner can generate a capability corresponding to a query predicate (e.g., whether an encrypted email contains the keyword MEDICAL), and the capability allows one to evaluate the outcome of this predicate on the encrypted data...
متن کاملSeparating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملTree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy
With searchable encryption, a data user is able to perform meaningful search on encrypted data stored in the public cloud without revealing data privacy. Besides handling simple queries (e.g., keyword queries), complex search functions, such as multi-dimensional (conjunctive) range queries, have also been studied in several approaches to support the search of multi-dimensional data. However, cu...
متن کاملOn a security model of conjunctive keyword search over encrypted relational database
We study a security model for searching documents containing each of several keywords (conjunctive keyword search) over encrypted documents. A conjunctive keyword search protocol consists of three entities: a data supplier, a storage system such as database, and a user of storage system. A data supplier uploads encrypted documents on a storage system, and then a user of the storage system searc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012