Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency

被引:104
作者
Song, Xiangfu [1 ]
Dong, Changyu [2 ]
Yuan, Dandan [1 ]
Xu, Qiuliang [1 ]
Zhao, Minghao [3 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technoloy, Jinan 250101, Peoples R China
[2] Newcastle Univ, Sch Comp, Newcastle Upon Tyne NE4 5TG, Tyne & Wear, England
[3] Tsinghua Univ, Sch Software, Beijing 100084, Peoples R China
基金
英国工程与自然科学研究理事会; 中国国家自然科学基金;
关键词
Servers; Encryption; Privacy; Indexes; Public key; Searchable encryption; symmetric primitives; forward privacy; I; O efficiency; SUPPORT;
D O I
10.1109/TDSC.2018.2822294
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will very likely to become a must-have property of all new searchable encryption schemes. For a long time, forward privacy implies inefficiency and thus most existing searchable encryption schemes do not support it. Very recently, Bost (CCS 2016) showed that forward privacy can be obtained without inducing a large communication overhead. However, Bost's scheme is constructed with a relatively inefficient public key cryptographic primitive, and has poor I/O performance. Both of the deficiencies significantly hinder the practical efficiency of the scheme, and prevent it from scaling to large data settings. To address the problems, we first present FAST, which achieves forward privacy and the same communication efficiency as Bost's scheme, but uses only symmetric cryptographic primitives. We then present FASTIO, which retains all good properties of FAST, and further improves I/O efficiency. We implemented the two schemes and compared their performance with Bost's scheme. The experiment results show that both our schemes are highly efficient.
引用
收藏
页码:912 / 927
页数:16
相关论文
共 37 条
[1]  
[Anonymous], 2016, LECT NOTES COMPUT SC, DOI DOI 10.1007/978-3-319-29485-8_5
[2]   Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations [J].
Asharov, Gilad ;
Naor, Moni ;
Segev, Gil ;
Shahaf, Ido .
STOC'16: PROCEEDINGS OF THE 48TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2016, :1101-1114
[3]   Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [J].
Bost, Raphael ;
Minaud, Brice ;
Ohrimenko, Olga .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1465-1482
[4]   Σοφοζ - Forward Secure Searchable Encryption [J].
Bost, Raphael .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :1143-1154
[5]   Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation [J].
Cash, David ;
Jaeger, Joseph ;
Jarecki, Stanislaw ;
Jutla, Charanjit ;
Krawczyk, Hugo ;
Rosu, Marcel-Catalin ;
Steine, Michael .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[6]   Leakage-Abuse Attacks Against Searchable Encryption [J].
Cash, David ;
Grubbs, Paul ;
Perry, Jason ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :668-679
[7]  
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[8]  
Cash D, 2014, LECT NOTES COMPUT SC, V8441, P351, DOI 10.1007/978-3-642-55220-5_20
[9]  
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[10]   Structured Encryption and Controlled Disclosure [J].
Chase, Melissa ;
Kamara, Seny .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 :577-594