How to Compress Encrypted Data

被引:1
|
作者
Fleischhacker, Nils [1 ]
Larsen, Kasper Green [2 ]
Simkin, Mark [3 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
[2] Aarhus Univ, Aarhus, Denmark
[3] Ethereum Fdn, Aarhus, Denmark
关键词
D O I
10.1007/978-3-031-30545-0_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the task of obliviously compressing a vector comprised of n ciphertexts of size xi bits each, where at most t of the corresponding plaintexts are non-zero. This problem commonly features in applications involving encrypted outsourced storages, such as searchable encryption or oblivious message retrieval. We present two new algorithms with provable worst-case guarantees, solving this problem by using only homomorphic additions and multiplications by constants. Both of our new constructions improve upon the state of the art asymptotically and concretely. Our first construction, based on sparse polynomials, is perfectly correct and the first to achieve an asymptotically optimal compression rate by compressing the input vector into O(t xi) bits. Compression can be performed homomorphically by performing O( n log n) homomorphic additions and multiplications by constants. The main drawback of this construction is a decoding complexity of ohm(root n). Our second construction is based on a novel variant of invertible bloom lookup tables and is correct with probability 1 - 2(-kappa). It has a slightly worse compression rate compared to our first construction as it compresses the input vector into O(xi kappa t/ log t) bits, where kappa >= log t. In exchange, both compression and decompression of this construction are highly efficient. The compression complexity is dominated by O(n kappa/ log t) homomorphic additions and multiplications by constants. The decompression complexity is dominated by O(kappa t/ log t) decryption operations and equally many inversions of a pseudorandom permutation.
引用
收藏
页码:551 / 577
页数:27
相关论文
共 50 条
  • [41] Contingency access to encrypted data
    McLees, Todd
    Software World, 2006, 37 (03): : 11 - 12
  • [42] Quantile estimation for encrypted data
    Park, Minje
    Kim, Jaeseon
    Shin, Sungchul
    Park, Cheolwoo
    Jeon, Jong-June
    Kwon, SoonSun
    Choi, Hosik
    APPLIED INTELLIGENCE, 2023, 53 (21) : 24782 - 24791
  • [43] Quantum computing on encrypted data
    K. A. G. Fisher
    A. Broadbent
    L. K. Shalm
    Z. Yan
    J. Lavoie
    R. Prevedel
    T. Jennewein
    K. J. Resch
    Nature Communications, 5
  • [44] Encrypted Shared Data Spaces
    Russello, Giovanni
    Dong, Changyu
    Dulay, Naranker
    Chaudron, Michel
    van Steen, Maarten
    COORDINATION MODELS AND LANGUAGES, PROCEEDINGS, 2008, 5052 : 264 - +
  • [45] Hindering data theft with encrypted data trees
    Blasco, Jorge
    Tapiador, Juan E.
    Pens-Lopez, Pedro
    Suarez-Tangil, Guillermo
    JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 101 : 147 - 158
  • [46] Compressive Sensing: To Compress or Not To Compress
    Kirachaiwanich, Davis
    Liang, Qilian
    2011 CONFERENCE RECORD OF THE FORTY-FIFTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS (ASILOMAR), 2011, : 809 - 813
  • [47] Searchable Encrypted String for Query Support on Different Encrypted Data Types
    Azizi, Shahrzad
    Mohammadpur, Davud
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (10): : 4198 - 4213
  • [48] INFORMATION PRESERVING CODES COMPRESS BINARY PICTORIAL DATA
    MOILANEN, U
    COMPUTER DESIGN, 1978, 17 (11): : 134 - &
  • [49] Third Party Data Clustering Over Encrypted Data Without Data Owner Participation: Introducing the Encrypted Distance Matrix
    Almutairi, Nawal
    Coenen, Frans
    Dures, Keith
    BIG DATA ANALYTICS AND KNOWLEDGE DISCOVERY (DAWAK 2018), 2018, 11031 : 163 - 173
  • [50] Learning to Compress Unstructured Mesh Data From Simulations
    Kamath, Chandrika
    2017 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA), 2017, : 621 - 630