Efficiently-Searchable and Deterministic Asymmetric Encryption

نویسندگان

  • Mihir Bellare
  • Alexandra Boldyreva
  • Adam O’Neill
چکیده

Outsourcing data storage is a topic of emerging importance in database security. Inthis paper, we consider exact-match query functionality in the public-key setting. Solutionsproposed in the database community lack clarity and proofs of security, while encryption-with-keyword-search schemes from the cryptographic community require linear search time(in database size) for each query, which is prohibitive. To bridge the gap, we introduce anew cryptographic primitive we call (asymmetric) efficiently-searchable encryption (ESE),which allows users to store encrypted data on a remote, untrusted server in such a waythat the server can index the data and retrieve or update required parts on request just asefficiently as for unencrypted data. We give an appropriate definition of security for ESEand several constructions that provably-achieve the definition, in the random oracle model,while providing various computationand bandwidth-efficiency properties. As deterministicencryption implies ESE, the security definition and several of the constructions are also thefirst for asymmetric deterministic encryption schemes in general.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

An Efficiently Searchable Encrypted Data Structure for Range Queries

At CCS 2015 Naveed et al. presented first attacks on efficiently searchable encryption, such as deterministic and order-preserving encryption. These plaintext guessing attacks have been further improved in subsequent work, e.g. by Grubbs et al. in 2016. Such cryptanalysis is crucially important to sharpen our understanding of the implications of security models. In this paper we present an effi...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

Deterministic and Efficiently Searchable Encryption

We present as-strong-as-possible definitions of privacy, and constructions achieving them,for public-key encryption schemes where the encryption algorithm is deterministic. We obtainas a consequence database encryption methods that permit fast (i.e. sub-linear, and in factlogarithmic, time) search while provably providing privacy that is as strong as possible subjectto this ...

متن کامل

A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods

Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006