Injection-Secure Structured and Searchable Symmetric Encryption

被引:3
|
作者
Amjad, Ghous [1 ]
Kamara, Seny [2 ,3 ]
Moataz, Tarik [2 ]
机构
[1] Google, Menlo Pk, CA 94025 USA
[2] MongoDB, New York, NY USA
[3] Brown Univ, Providence, RI 02912 USA
来源
ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PART VI | 2023年 / 14443卷
关键词
D O I
10.1007/978-981-99-8736-8_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent work on dynamic structured and searchable symmetric encryption has focused on achieving the notion of forward-privacy. This is mainly motivated by the claim that forward privacy protects against adaptive file injection attacks (Zhang, Katz, Papamanthou, Usenix Security, 2016). In this work, we revisit the notion of forward-privacy in several respects. First, we observe that forward-privacy does not necessarily guarantee security against adaptive file injection attacks if a scheme reveals other leakage patterns like the query equality. We then propose a notion of security called correlation security which generalizes forward privacy. We then show how correlation security can be used to formally define security against different kinds of injection attacks. We then propose the first injection-secure multi-map encryption scheme and use it as a building block to design the first injection-secure searchable symmetric encryption (SSE) scheme. Towards achieving this, we also propose a new fully-dynamic volume-hiding multi-map encryption scheme which may be of independent interest.
引用
收藏
页码:232 / 262
页数:31
相关论文
共 50 条
  • [31] MCVDSSE: Secure Multi-client Verifiable Dynamic Symmetric Searchable Encryption
    Jinyang Li
    Zhenfu Cao
    Jiachen Shen
    Xiaolei Dong
    SCIENCE OF CYBER SECURITY, SCISEC 2023, 2023, 14299 : 85 - 96
  • [32] Towards Forward Secure Conjunctive Searchable Symmetric Encryption with Result Pattern Hidden
    Wang, Yunling
    Zhu, Yichao
    Wang, Jianfeng
    International Journal of Network Security, 2022, 24 (02): : 273 - 285
  • [33] Secure query processing for smart grid data using searchable symmetric encryption
    Souror, Samia
    Badawy, Mohammed
    El-Fishawy, Nawal
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (16): : 24173 - 24211
  • [34] Research Advances on Secure Searchable Encryption
    Dong X.
    Zhou J.
    Cao Z.
    Cao, Zhenfu (zfcao@sei.ecnu.edu.cn), 1600, Science Press (54): : 2107 - 2120
  • [35] Searchable Encryption with Secure and Efficient Updates
    Hahn, Florian
    Kerschbaum, Florian
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 310 - 320
  • [36] A Survey of Provably Secure Searchable Encryption
    Bosch, Christoph
    Hartel, Pieter
    Jonker, Willem
    Peter, Andreas
    ACM COMPUTING SURVEYS, 2015, 47 (02)
  • [37] Searchable Symmetric Encryption: Designs and Challe
    Sen Poh, Geong
    Chin, Ji-Jian
    Yau, Wei-Chuen
    Choo, Kim-Kwang Raymond
    Mohamad, Moesfa Soeheila
    ACM COMPUTING SURVEYS, 2017, 50 (03)
  • [38] Searchable Symmetric Encryption for Restricted Search
    Horvath, Mate
    Vajda, Istvan
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2018, 14 (01) : 104 - 111
  • [39] Searchable Symmetric Encryption Security Definitions
    Mohamad, M. S.
    Tan, S. Y.
    Chin, J. J.
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2019, 13 : 31 - 47
  • [40] No-Dictionary Searchable Symmetric Encryption
    Ogata, Wakaha
    Kurosawa, Kaoru
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01) : 114 - 124