Searchable Symmetric Encryption: Sequential Scan Can Be Practical

被引:0
|
作者
Horvath, Mate [1 ]
Vajda, Istvan [1 ]
机构
[1] Budapest Univ Technol & Econ, Dept Networked Syst & Serv, Lab Cryptog & Syst Secur CrySyS, Budapest, Hungary
关键词
Searchable Symmetric Encryption; Forward Index; Type-3; Pairings; MAC;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of cloud computing highlights the importance of techniques that allow both securing sensitive data and flexible data management at the same time. One line of research with this double motivation is the study of Searchable Symmetric Encryption (SSE) that has provided several outstanding results in the recent years. These solutions allow sublinear keyword search in huge databases by using various data structures to store keywords and document identifiers. In this work, we focus on certain scenarios in which search over the whole database is not necessary and show that the otherwise inefficient sequential scan (in linear time) can be very practical. This is due to the fact that adding new entries to the database comes for free in this case while updating a complex data structure without information leakage is rather complicated. To demonstrate the practicality of our approach we build a simple SSE scheme based on bilinear pairings and prove its security against adaptive chosen-keyword attacks in the standard model under the widely used Symmetric eXternal Diffie-Hellman (SXDH) assumption.
引用
下载
收藏
页码:399 / 403
页数:5
相关论文
共 50 条
  • [1] A Practical Synonym Symmetric Searchable Encryption
    Liu, Zuo-Peng
    Lu, Hai-Ning
    Ding, Ning
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 736 - 746
  • [2] Practical and Secure Searchable Symmetric Encryption with a Small Index
    Miyoshi, Ryuji
    Yamamoto, Hiroaki
    Fujiwara, Hiroshi
    Miyazaki, Takashi
    SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 53 - 69
  • [3] Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption
    Sun, Shi-Feng
    Yuan, Xingliang
    Liu, Joseph K.
    Steinfeld, Ron
    Sakzad, Amin
    Viet Vo
    Nepal, Surya
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 763 - 780
  • [4] Practical, Dynamic and Efficient Integrity Verification for Symmetric Searchable Encryption
    Chen, Lanxiang
    Chen, Zhenchao
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 163 - 183
  • [5] A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data
    Li, Jiangnan
    Niu, Xiangyu
    Sun, Jinyuan Stella
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [6] Practical Query-based Order Revealing Encryption from Symmetric Searchable Encryption
    Yoshino, Masayuki
    Naganuma, Ken
    Kunihiro, Noboru
    Sato, Hisayoshi
    2020 15TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2020), 2020, : 16 - 23
  • [7] Distributed Searchable Symmetric Encryption
    Bosch, Christoph
    Peter, Andreas
    Leenders, Bram
    Lim, Hoon Wei
    Tang, Qiang
    Wang, Huaxiong
    Hartel, Pieter
    Jonker, Willem
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 330 - 337
  • [8] Research on Searchable Symmetric Encryption
    Wang Y.
    Chen X.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (10): : 2374 - 2385
  • [9] A Survey on Searchable Symmetric Encryption
    Li, Feng
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Ximeng
    Ning, Jianting
    Deng, Robert H.
    ACM COMPUTING SURVEYS, 2024, 56 (05)
  • [10] Research on Searchable Symmetric Encryption
    Wang Yunling
    Chen Xiaofeng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (10) : 2374 - 2385