Deterministic and Efficiently Searchable Encryption

نویسنده

  • Michael Wang
چکیده

To provide some background to the paper, in the database literature, the naive solution of providing public key encryption on untrusted database servers (for example, data stored in a rented cloud server) includes encrypting every record non-deterministically in order to provide notions of privacy in the database. In other words, in order to find particular records in an encrypted database, the entire database would have to be scanned (in other words, searches would take time linear to the size of the database), as indexes cannot be built on non-deterministic ciphertext values. In this paper, the authors detail systems where database systems can maintain provable security bounds via encryption, while allowing logarithmic search bounds that are desired of database systems. They achieve this via deterministic public key encryption, which they prove in the paper that while normally deterministic public key encryptions do not grant the level of security expected in all applications, the deterministic public key encryption algorithms provided in the paper still maintain a degree of provable security against chosen plaintext attacks. The authors, in the last section of the paper, also include extensions to cover chosen ciphertext attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

Efficiently-Searchable and Deterministic Asymmetric Encryption

Outsourcing data storage is a topic of emerging importance in database security. Inthis paper, we consider exact-match query functionality in the public-key setting. Solutionsproposed in the database community lack clarity and proofs of security, while encryption-with-keyword-search schemes from the cryptographic community require linear search time(in database size) for each qu...

متن کامل

An Efficiently Searchable Encrypted Data Structure for Range Queries

At CCS 2015 Naveed et al. presented first attacks on efficiently searchable encryption, such as deterministic and order-preserving encryption. These plaintext guessing attacks have been further improved in subsequent work, e.g. by Grubbs et al. in 2016. Such cryptanalysis is crucially important to sharpen our understanding of the implications of security models. In this paper we present an effi...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

Deterministic and Efficiently Searchable Encryption

We present as-strong-as-possible definitions of privacy, and constructions achieving them,for public-key encryption schemes where the encryption algorithm is deterministic. We obtainas a consequence database encryption methods that permit fast (i.e. sub-linear, and in factlogarithmic, time) search while provably providing privacy that is as strong as possible subjectto this ...

متن کامل

Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases

Processing queries on encrypted data protects sensitive data stored in cloud databases. CryptDB has introduced the approach of adjustable encryption for such processing. A database column is adjusted to the necessary level of encryption, e.g. order-preserving, for the set of executed queries, but never reversed. This has the drawback that long running cloud databases will eventually transform i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012