Deterministic and Efficiently Searchable Encryption

نویسندگان

  • Mihir Bellare
  • Alexandra Boldyreva
  • Adam O'Neill
چکیده

We present as-strong-as-possible definitions of privacy, and constructions achieving them,for public-key encryption schemes where the encryption algorithm is deterministic. We obtainas a consequence database encryption methods that permit fast (i.e. sub-linear, and in factlogarithmic, time) search while provably providing privacy that is as strong as possible subjectto this fast search constraint. One of our constructs, called RSA-DOAEP, has the added featureof being length preserving, so that it is the first example of a public-key cipher. We generalizethis to obtain a notion of efficiently-searchable encryption schemes which permit more flexibleprivacy to search-time trade-offs via a technique called bucketization. Our results answer much-asked questions in the database community and provide foundations for work done there.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

Efficiently-Searchable and Deterministic Asymmetric Encryption

Outsourcing data storage is a topic of emerging importance in database security. Inthis paper, we consider exact-match query functionality in the public-key setting. Solutionsproposed in the database community lack clarity and proofs of security, while encryption-with-keyword-search schemes from the cryptographic community require linear search time(in database size) for each qu...

متن کامل

An Efficiently Searchable Encrypted Data Structure for Range Queries

At CCS 2015 Naveed et al. presented first attacks on efficiently searchable encryption, such as deterministic and order-preserving encryption. These plaintext guessing attacks have been further improved in subsequent work, e.g. by Grubbs et al. in 2016. Such cryptanalysis is crucially important to sharpen our understanding of the implications of security models. In this paper we present an effi...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases

Processing queries on encrypted data protects sensitive data stored in cloud databases. CryptDB has introduced the approach of adjustable encryption for such processing. A database column is adjusted to the necessary level of encryption, e.g. order-preserving, for the set of executed queries, but never reversed. This has the drawback that long running cloud databases will eventually transform i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006