Searching Encrypted Data with Size-Locked Indexes

被引:0
|
作者
Xu, Min [1 ]
Namavari, Armin [2 ]
Cash, David [1 ]
Ristenpart, Thomas [3 ]
机构
[1] Univ Chicago, Chicago, IL 60637 USA
[2] Cornell Univ, Ithaca, NY 14853 USA
[3] Cornell Tech, New York, NY USA
基金
美国国家科学基金会;
关键词
DYNAMIC SEARCHABLE ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We investigate a simple but overlooked folklore approach for searching encrypted documents held at an untrusted service: Just stash an index (with unstructured encryption) at the service and download it for updating and searching. This approach is simple to deploy, enables rich search support beyond unsorted keyword lookup, requires no persistent client state, and (intuitively at least) provides excellent security compared with approaches like dynamic searchable symmetric encryption (DSSE). This work first shows that implementing this construct securely is more subtle than it appears, and that naive implementations with commodity indexes are insecure due to the leakage of the byte-length of the encoded index. We then develop a set of techniques for encoding indexes, called size-locking, that eliminates this leakage. Our key idea is to fix the size of indexes to depend only on features that are safe to leak. We further develop techniques for securely partitioning indexes into smaller pieces that are downloaded, trading leakage for large increases in performance in a measured way. We implement our systems and evaluate that they provide search quality matching plaintext systems, support for stateless clients, and resistance to damaging injection attacks.
引用
收藏
页码:4025 / 4042
页数:18
相关论文
共 50 条
  • [41] SUPERIMPOSING ENCRYPTED DATA
    YU, KW
    YU, TL
    COMMUNICATIONS OF THE ACM, 1991, 34 (02) : 48 - 54
  • [42] Querying Encrypted Data
    Arasu, Arvind
    Eguro, Ken
    Kaushik, Raghav
    Ramamurthy, Ravi
    2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2013, : 1262 - 1263
  • [43] Computing on Encrypted Data
    Smart, Nigel
    IEEE SECURITY & PRIVACY, 2023, 21 (04) : 94 - 98
  • [44] Computing on Encrypted Data
    Gentry, Craig
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 477 - 477
  • [45] PROCESSING ENCRYPTED DATA
    AHITUV, N
    LAPID, Y
    NEUMANN, S
    COMMUNICATIONS OF THE ACM, 1987, 30 (09) : 777 - 780
  • [46] On compressing encrypted data
    Johnson, M
    Ishwar, P
    Prabhakaran, V
    Schonberg, D
    Ramchandran, K
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2004, 52 (10) : 2992 - 3006
  • [47] Operations On Encrypted Data In An ORM Made For Encrypted Choreographies
    Alboaie, Sinica
    Alboaie, Lenuta
    Bogdan, Ioana
    Vaida, Mircea-F.
    2017 16TH ROEDUNET CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2017,
  • [48] Encrypted Data Reduction: Removing Redundancy from Encrypted Data in Outsourced Storage
    Zhao, Jia
    Yang, Zuoru
    Li, Jingwei
    Lee, Patrick P. C.
    ACM TRANSACTIONS ON STORAGE, 2024, 20 (04)
  • [49] SYSTEMATIC SEARCHING OF ABSTRACTS AND INDEXES IN INTERDISCIPLINARY AREAS
    SMITH, LC
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE, 1974, 25 (06): : 343 - 353
  • [50] Savvy searching -: Browsing indexes of cited references
    Jacsó, P
    ONLINE INFORMATION REVIEW, 2005, 29 (01) : 107 - 112