How to Compress Encrypted Data

被引:1
|
作者
Fleischhacker, Nils [1 ]
Larsen, Kasper Green [2 ]
Simkin, Mark [3 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
[2] Aarhus Univ, Aarhus, Denmark
[3] Ethereum Fdn, Aarhus, Denmark
关键词
D O I
10.1007/978-3-031-30545-0_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the task of obliviously compressing a vector comprised of n ciphertexts of size xi bits each, where at most t of the corresponding plaintexts are non-zero. This problem commonly features in applications involving encrypted outsourced storages, such as searchable encryption or oblivious message retrieval. We present two new algorithms with provable worst-case guarantees, solving this problem by using only homomorphic additions and multiplications by constants. Both of our new constructions improve upon the state of the art asymptotically and concretely. Our first construction, based on sparse polynomials, is perfectly correct and the first to achieve an asymptotically optimal compression rate by compressing the input vector into O(t xi) bits. Compression can be performed homomorphically by performing O( n log n) homomorphic additions and multiplications by constants. The main drawback of this construction is a decoding complexity of ohm(root n). Our second construction is based on a novel variant of invertible bloom lookup tables and is correct with probability 1 - 2(-kappa). It has a slightly worse compression rate compared to our first construction as it compresses the input vector into O(xi kappa t/ log t) bits, where kappa >= log t. In exchange, both compression and decompression of this construction are highly efficient. The compression complexity is dominated by O(n kappa/ log t) homomorphic additions and multiplications by constants. The decompression complexity is dominated by O(kappa t/ log t) decryption operations and equally many inversions of a pseudorandom permutation.
引用
收藏
页码:551 / 577
页数:27
相关论文
共 50 条
  • [31] Quantum Walks with Encrypted Data
    Rohde, Peter P.
    Fitzsimons, Joseph F.
    Gilchrist, Alexei
    PHYSICAL REVIEW LETTERS, 2012, 109 (15)
  • [32] Arithmetic operations on encrypted data
    Chang, CC
    Tsu, SM
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1995, 56 (1-2) : 1 - 10
  • [33] Efficient Clustering on Encrypted Data
    Zhang, Mengyu
    Wang, Long
    Zhang, Xiaoping
    Liu, Zhuotao
    Wang, Yisong
    Bao, Han
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 213 - 236
  • [34] Efficient sharing of encrypted data
    Bennett, K
    Grothoff, C
    Horozov, T
    Patrascu, I
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 107 - 120
  • [35] Quantum computing on encrypted data
    Fisher, K. A. G.
    Broadbent, A.
    Shalm, L. K.
    Yan, Z.
    Lavoie, J.
    Prevedel, R.
    Jennewein, T.
    Resch, K. J.
    NATURE COMMUNICATIONS, 2014, 5
  • [36] Efficient Analytics on Encrypted Data
    Gershinsky, Gidon
    SYSTOR'18: PROCEEDINGS OF THE 11TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE, 2018, : 121 - 121
  • [37] Quantile estimation for encrypted data
    Minje Park
    Jaeseon Kim
    Sungchul Shin
    Cheolwoo Park
    Jong-June Jeon
    SoonSun Kwon
    Hosik Choi
    Applied Intelligence, 2023, 53 : 24782 - 24791
  • [38] Querying Encrypted OLAP Data
    Cuzzocrea, Alfredo
    Grasso, Giorgio Mario
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 161 - 163
  • [39] Compression of encrypted visual data
    Gschwandtner, Michael
    Uhl, Andreas
    Wild, Peter
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 141 - 150
  • [40] Search Over Encrypted Data
    Vaidya, Siddhesh Ashok
    Bhosale, Varsha
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 287 - 292