How to Compress Encrypted Data

被引:1
|
作者
Fleischhacker, Nils [1 ]
Larsen, Kasper Green [2 ]
Simkin, Mark [3 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
[2] Aarhus Univ, Aarhus, Denmark
[3] Ethereum Fdn, Aarhus, Denmark
关键词
D O I
10.1007/978-3-031-30545-0_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the task of obliviously compressing a vector comprised of n ciphertexts of size xi bits each, where at most t of the corresponding plaintexts are non-zero. This problem commonly features in applications involving encrypted outsourced storages, such as searchable encryption or oblivious message retrieval. We present two new algorithms with provable worst-case guarantees, solving this problem by using only homomorphic additions and multiplications by constants. Both of our new constructions improve upon the state of the art asymptotically and concretely. Our first construction, based on sparse polynomials, is perfectly correct and the first to achieve an asymptotically optimal compression rate by compressing the input vector into O(t xi) bits. Compression can be performed homomorphically by performing O( n log n) homomorphic additions and multiplications by constants. The main drawback of this construction is a decoding complexity of ohm(root n). Our second construction is based on a novel variant of invertible bloom lookup tables and is correct with probability 1 - 2(-kappa). It has a slightly worse compression rate compared to our first construction as it compresses the input vector into O(xi kappa t/ log t) bits, where kappa >= log t. In exchange, both compression and decompression of this construction are highly efficient. The compression complexity is dominated by O(n kappa/ log t) homomorphic additions and multiplications by constants. The decompression complexity is dominated by O(kappa t/ log t) decryption operations and equally many inversions of a pseudorandom permutation.
引用
收藏
页码:551 / 577
页数:27
相关论文
共 50 条
  • [21] On compressing encrypted data
    Johnson, M
    Ishwar, P
    Prabhakaran, V
    Schonberg, D
    Ramchandran, K
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2004, 52 (10) : 2992 - 3006
  • [22] Operations On Encrypted Data In An ORM Made For Encrypted Choreographies
    Alboaie, Sinica
    Alboaie, Lenuta
    Bogdan, Ioana
    Vaida, Mircea-F.
    2017 16TH ROEDUNET CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2017,
  • [23] Encrypted Data Reduction: Removing Redundancy from Encrypted Data in Outsourced Storage
    Zhao, Jia
    Yang, Zuoru
    Li, Jingwei
    Lee, Patrick P. C.
    ACM TRANSACTIONS ON STORAGE, 2024, 20 (04)
  • [24] To Compress or Not to Compress; That Is the Question
    Link, Mark S.
    AMERICAN JOURNAL OF CARDIOLOGY, 2012, 109 (05): : 675 - 676
  • [25] TO COMPRESS OR NOT TO COMPRESS - THAT IS THE QUESTION
    WITKOWSKI, JA
    PARISH, LC
    INTERNATIONAL JOURNAL OF DERMATOLOGY, 1979, 18 (04) : 291 - 291
  • [26] Techniques to Compress Time-Series Data
    Iqbal, Owais
    Keskar, Dr R. B.
    2021 10TH INTERNATIONAL CONFERENCE ON POWER SCIENCE AND ENGINEERING (ICPSE 2021), 2021, : 56 - 60
  • [27] Exploiting Connection Relation to Compress Data Graph
    Zhang, Jun
    Peng, Zhaohui
    Wang, Shan
    Zhan, Jiang
    ADVANCES IN WEB AND NETWORK TECHNOLOGIES, AND INFORMATION MANAGEMENT, PROCEEDINGS, 2007, 4537 : 241 - 246
  • [28] Clustering based Compress Data Cube algorithm
    Xie, Zhijun
    Nie, Mingxing
    Wang, Tongsen
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 4, PROCEEDINGS, 2009, : 429 - 433
  • [29] Efficient search on encrypted data
    Joseph, LTA
    Samsudin, A
    Belaton, B
    2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, : 352 - 357
  • [30] Identification with encrypted biometric data
    Bringer, Julien
    Chabanne, Herve
    Kindarji, Bruno
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (05) : 548 - 562