Perfectly Secure Oblivious Priority Queue

被引:0
|
作者
Ichikawa, Atsunori [1 ]
Ogata, Wakaha [2 ]
机构
[1] NTT Social Informat Labs, Musashino 1808585, Japan
[2] Tokyo Inst Technol, Tokyo 1528550, Japan
关键词
key oblivious data structure; oblivious priority queue; perfect security;
D O I
10.1587/transfun.2022CIP0019
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An Oblivious Priority Queue (OPQ) is a cryptographic primitive that enables a client to outsource its data to a dishonest server, and also to securely manage the data according to a priority queue algo-rithm. Though the first OPQ achieves perfect security, it supports only two operations; Inserting an element and extracting the top-priority element, which are the minimal requirement for a priority queue. In addition, this OPQ allows an adversary to observe operations in progress, which leaks the exact number of elements in the data structure. On the other hand, there are many subsequent works for OPQs that implement additional operations of a priority queue, hide the running operations, and improve efficiency. Though the recent works realize optimal efficiency, all of them achieve only statistical or computational security. Aiming to reconcile perfect security of the first OPQ with all functions (including the operation hiding) sup-ported by recent OPQs, we construct a novel perfectly secure OPQ that can simulate the following operations while hiding which one is in progress; Inserting an element, extracting the top-priority one, deleting an element, and modifying the priority of an element. The efficiency of our scheme is O(log2 N), which is larger than that of the best known statistically secure OPQ but is the same as the known perfectly secure scheme.
引用
收藏
页码:272 / 280
页数:9
相关论文
共 50 条
  • [41] InvisiPage: Oblivious Demand Paging for Secure Enclaves
    Aga, Shaizeen
    Narayanasamy, Satish
    PROCEEDINGS OF THE 2019 46TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '19), 2019, : 372 - 384
  • [42] A computationally secure quantum oblivious transfer scheme
    Lü, X
    Ma, Z
    Feng, DG
    8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U1547 - U1551
  • [43] The Adaptive Priority Queue with Elimination and Combining
    Calciu, Irina
    Mendes, Hammurabi
    Herlihy, Maurice
    DISTRIBUTED COMPUTING (DISC 2014), 2014, 8784 : 406 - 420
  • [44] A preemptive priority queue with preemptions penalty
    Emran Mohammadi
    Mahdi Alinaghian
    The International Journal of Advanced Manufacturing Technology, 2015, 77 : 399 - 405
  • [45] Hybrid Priority Queue and its Applications
    Li, Zhouzi
    Harchol-Balter, Mor
    Scheller-Wolf, Alan
    Performance Evaluation Review, 2024, 52 (02): : 12 - 14
  • [46] ObliDB: Oblivious Query Processing for Secure Databases
    Eskandarian, Saba
    Zaharia, Matei
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2019, 13 (02): : 169 - 183
  • [47] Analysis of an Unconditionally Secure Distributed Oblivious Transfer
    Hossein Ghodosi
    Journal of Cryptology, 2013, 26 : 75 - 79
  • [48] Unconditionally Secure Distributed Oblivious Polynomial Evaluation
    Cianciullo, Louis
    Ghodosi, Hossein
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 132 - 142
  • [49] Unconditionally secure Oblivious Polynomial Evaluation protocol
    Li Luyao
    Duan Zongtao
    Wang Qinglong
    Wang Jing
    Dai Ming
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED ICT AND EDUCATION, 2013, 33 : 579 - 583
  • [50] A Practical, Scalable, Relaxed Priority Queue
    Zhou, Tingzhe
    Michael, Maged
    Spear, Michael
    PROCEEDINGS OF THE 48TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING (ICPP 2019), 2019,