Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption

被引:152
作者
Sun, Shi-Feng [1 ,2 ]
Yuan, Xingliang [1 ]
Liu, Joseph K. [1 ]
Steinfeld, Ron [1 ]
Sakzad, Amin [1 ]
Viet Vo [1 ,2 ]
Nepal, Surya [2 ]
机构
[1] Monash Univ, Fac Informat Technol, Melbourne, Vic, Australia
[2] CSIRO, Data61, Melbourne, Vic, Australia
来源
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) | 2018年
基金
澳大利亚研究理事会;
关键词
Symmetric Searchable Encryption; Puncturable Encryption; Backward Security; SUPPORT;
D O I
10.1145/3243734.3243782
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Symmetric Searchable Encryption (SSE) has received wide attention due to its practical application in searching on encrypted data. Beyond search, data addition and deletion are also supported in dynamic SSE schemes. Unfortunately, these update operations leak some information of updated data. To address this issue, forward-secure SSE is actively explored to protect the relations of newly updated data and previously searched keywords. On the contrary, little work has been done in backward security, which enforces that search should not reveal information of deleted data. In this paper, we propose the first practical and non-interactive backward-secure SSE scheme. In particular, we introduce a new form of symmetric encryption, named symmetric puncturable encryption (SPE), and construct a generic primitive from simple cryptographic tools. Based on this primitive, we then present a backwardsecure SSE scheme that can revoke a server's searching ability on deleted data. We instantiate our scheme with a practical puncturable pseudorandom function and implement it on a large dataset. The experimental results demonstrate its efficiency and scalability. Compared to the state-of-the-art, our scheme achieves a speedup of almost 50x in search latency, and a saving of 62% in server storage consumption.
引用
收藏
页码:763 / 780
页数:18
相关论文
共 37 条
  • [1] Abdalla M, 2012, LECT NOTES COMPUT SC, V7293, P316, DOI 10.1007/978-3-642-30057-8_19
  • [2] From Selective to Adaptive Security in Functional Encryption
    Ananth, Prabhanjan
    Brakerski, Zvika
    Segev, Gil
    Vaikuntanathan, Vinod
    [J]. ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 657 - 677
  • [3] [Anonymous], 2017, 20171060 CRYPT EPRIN
  • [4] Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
    Bost, Raphael
    Minaud, Brice
    Ohrimenko, Olga
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1465 - 1482
  • [5] Σοφοζ - Forward Secure Searchable Encryption
    Bost, Raphael
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1143 - 1154
  • [6] Chosen-Ciphertext Secure Fully Homomorphic Encryption
    Canetti, Ran
    Raghuraman, Srinivasan
    Richelson, Silas
    Vaikuntanathan, Vinod
    [J]. PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 213 - 240
  • [7] Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
    Cash, David
    Jaeger, Joseph
    Jarecki, Stanislaw
    Jutla, Charanjit
    Krawczyk, Hugo
    Rosu, Marcel-Catalin
    Steine, Michael
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [8] Leakage-Abuse Attacks Against Searchable Encryption
    Cash, David
    Grubbs, Paul
    Perry, Jason
    Ristenpart, Thomas
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 668 - 679
  • [9] Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
  • [10] Cash D, 2014, LECT NOTES COMPUT SC, V8441, P351, DOI 10.1007/978-3-642-55220-5_20