Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency

被引:104
作者
Song, Xiangfu [1 ]
Dong, Changyu [2 ]
Yuan, Dandan [1 ]
Xu, Qiuliang [1 ]
Zhao, Minghao [3 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technoloy, Jinan 250101, Peoples R China
[2] Newcastle Univ, Sch Comp, Newcastle Upon Tyne NE4 5TG, Tyne & Wear, England
[3] Tsinghua Univ, Sch Software, Beijing 100084, Peoples R China
基金
英国工程与自然科学研究理事会; 中国国家自然科学基金;
关键词
Servers; Encryption; Privacy; Indexes; Public key; Searchable encryption; symmetric primitives; forward privacy; I; O efficiency; SUPPORT;
D O I
10.1109/TDSC.2018.2822294
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will very likely to become a must-have property of all new searchable encryption schemes. For a long time, forward privacy implies inefficiency and thus most existing searchable encryption schemes do not support it. Very recently, Bost (CCS 2016) showed that forward privacy can be obtained without inducing a large communication overhead. However, Bost's scheme is constructed with a relatively inefficient public key cryptographic primitive, and has poor I/O performance. Both of the deficiencies significantly hinder the practical efficiency of the scheme, and prevent it from scaling to large data settings. To address the problems, we first present FAST, which achieves forward privacy and the same communication efficiency as Bost's scheme, but uses only symmetric cryptographic primitives. We then present FASTIO, which retains all good properties of FAST, and further improves I/O efficiency. We implemented the two schemes and compared their performance with Bost's scheme. The experiment results show that both our schemes are highly efficient.
引用
收藏
页码:912 / 927
页数:16
相关论文
共 37 条
[31]  
Shi E, 2011, LECT NOTES COMPUT SC, V7073, P197, DOI 10.1007/978-3-642-25385-0_11
[32]  
Song DXD, 2000, P IEEE S SECUR PRIV, P44, DOI 10.1109/SECPRI.2000.848445
[33]   Practical Dynamic Searchable Encryption with Small Leakage [J].
Stefanov, Emil ;
Papamanthou, Charalampos ;
Shi, Elaine .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[34]   An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries [J].
Sun, Shi-Feng ;
Liu, Joseph K. ;
Sakzad, Amin ;
Steinfeld, Ron ;
Yuen, Tsz Hon .
COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 :154-172
[35]   A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data [J].
Xia, Zhihua ;
Wang, Xinhui ;
Sun, Xingming ;
Wang, Qian .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (02) :340-352
[36]  
Yao A. C., 1982, 23rd Annual Symposium on Foundations of Computer Science, P160, DOI 10.1109/SFCS.1982.38
[37]  
Zhang YP, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P707