Private Conjunctive Query over Encrypted Data

被引:6
作者
Saha, Tushar Kanti [1 ]
Koshiba, Takeshi [2 ]
机构
[1] Saitama Univ, Grad Sch Sci & Engn, Div Math Elect & Informat, Saitama, Japan
[2] Waseda Univ, Fac Educ & Integrated Arts & Sci, Tokyo, Japan
来源
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017 | 2017年 / 10239卷
关键词
Private; Conjunctive; Query processing; Encrypted; Data; Packing method; Homomorphic encryption; FULLY HOMOMORPHIC ENCRYPTION;
D O I
10.1007/978-3-319-57339-7_9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we propose an efficient protocol to process a private conjunctive query over encrypted data in the cloud using the somewhat homomorphic encryption (SwHE) scheme with a batch technique. In 2016, Cheon, Kim, and Kim (CKK) [IEEE Trans. Inf. Forensics Security] showed conjunctive query processing over encrypted data using search-and-compute circuits and an SwHE scheme and mentioned that their scheme should be improved in performance. To improve the performance of processing a private conjunctive query, we also propose a new packing method to support an efficient batch computation for our protocol using a few multiplications. Our implementation shows that our protocol works more than 50 times as fast as the CKK protocol for conjunctive query processing. In addition, the security level of our protocol is better than the security level of the CKK protocol.
引用
收藏
页码:149 / 164
页数:16
相关论文
共 18 条
[1]  
[Anonymous], IACR CRYPTOLOGY EPRI
[2]  
[Anonymous], PARI GP VERS 2 7 5
[3]  
[Anonymous], 2006, CHIN ACAD AGR SCI, DOI DOI 10.7666/D.Y1057240
[4]  
[Anonymous], NIST SPECIAL PUBLI 1
[5]  
[Anonymous], IACR CRYPTOLOGY EPRI
[6]  
Boneh D., 2013, Applied Cryptography and Network Security (ACNS)
[7]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[8]  
Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29
[9]   Provably Weak Instances of Ring-LWE Revisited [J].
Castryck, Wouter ;
Iliashenko, Ilia ;
Vercauteren, Frederik .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 :147-167
[10]   Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data [J].
Cheon, Jung Hee ;
Kim, Miran ;
Kim, Myungsun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (01) :188-199