Private Conjunctive Query over Encrypted Data

被引:6
|
作者
Saha, Tushar Kanti [1 ]
Koshiba, Takeshi [2 ]
机构
[1] Saitama Univ, Grad Sch Sci & Engn, Div Math Elect & Informat, Saitama, Japan
[2] Waseda Univ, Fac Educ & Integrated Arts & Sci, Tokyo, Japan
来源
关键词
Private; Conjunctive; Query processing; Encrypted; Data; Packing method; Homomorphic encryption; FULLY HOMOMORPHIC ENCRYPTION;
D O I
10.1007/978-3-319-57339-7_9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we propose an efficient protocol to process a private conjunctive query over encrypted data in the cloud using the somewhat homomorphic encryption (SwHE) scheme with a batch technique. In 2016, Cheon, Kim, and Kim (CKK) [IEEE Trans. Inf. Forensics Security] showed conjunctive query processing over encrypted data using search-and-compute circuits and an SwHE scheme and mentioned that their scheme should be improved in performance. To improve the performance of processing a private conjunctive query, we also propose a new packing method to support an efficient batch computation for our protocol using a few multiplications. Our implementation shows that our protocol works more than 50 times as fast as the CKK protocol for conjunctive query processing. In addition, the security level of our protocol is better than the security level of the CKK protocol.
引用
收藏
页码:149 / 164
页数:16
相关论文
共 50 条
  • [1] Efficient Private Conjunctive Query Protocol Over Encrypted Data
    Saha, Tushar Kanti
    Koshiba, Takeshi
    CRYPTOGRAPHY, 2021, 5 (01) : 1 - 28
  • [2] Adaptively Secure Conjunctive Query Processing over Encrypted Data for Cloud Computing
    Li, Rui
    Liu, Alex X.
    2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), 2017, : 697 - 708
  • [3] ECQ: An Efficient Conjunctive Query Scheme over Encrypted Multidimensional Data in Smart Grid
    Wen, Mi
    Lu, Rongxing
    Lei, Jingshen
    Liang, Xiaohui
    Li, Hongwei
    Shen, Xuemin
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 796 - 801
  • [4] Private Key Based Query on Encrypted Data
    Afzali, Hammad
    Nemati, Hamed
    Azmi, Reza
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 4 (01): : 41 - 50
  • [5] Private Boolean Query Processing on Encrypted Data
    Do, Hoang Giang
    Ng, Wee Keong
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 321 - 332
  • [6] On query execution over encrypted data
    Baby, Tinu
    Cherukuri, Aswani Kumar
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (02) : 321 - 331
  • [7] Differentially-Private Data Aggregation over Encrypted Location Data for Range Counting Query
    Sasada, Taisho
    Kaaniche, Nesrine
    Laurent, Maryline
    Taenaka, Yuzo
    Kadobayashi, Youki
    38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 409 - 414
  • [8] Secure conjunctive keyword search over encrypted data
    Golle, P
    Staddon, J
    Waters, B
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 31 - 45
  • [9] On query result integrity over encrypted data
    Esiner, Ertem
    Datta, Anwitaman
    INFORMATION PROCESSING LETTERS, 2017, 122 : 34 - 39
  • [10] Expressive query over outsourced encrypted data
    Yang, Yang
    Liu, Ximeng
    Deng, Robert
    INFORMATION SCIENCES, 2018, 442 : 33 - 53