Private Conjunctive Query over Encrypted Data

被引:6
|
作者
Saha, Tushar Kanti [1 ]
Koshiba, Takeshi [2 ]
机构
[1] Saitama Univ, Grad Sch Sci & Engn, Div Math Elect & Informat, Saitama, Japan
[2] Waseda Univ, Fac Educ & Integrated Arts & Sci, Tokyo, Japan
来源
关键词
Private; Conjunctive; Query processing; Encrypted; Data; Packing method; Homomorphic encryption; FULLY HOMOMORPHIC ENCRYPTION;
D O I
10.1007/978-3-319-57339-7_9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we propose an efficient protocol to process a private conjunctive query over encrypted data in the cloud using the somewhat homomorphic encryption (SwHE) scheme with a batch technique. In 2016, Cheon, Kim, and Kim (CKK) [IEEE Trans. Inf. Forensics Security] showed conjunctive query processing over encrypted data using search-and-compute circuits and an SwHE scheme and mentioned that their scheme should be improved in performance. To improve the performance of processing a private conjunctive query, we also propose a new packing method to support an efficient batch computation for our protocol using a few multiplications. Our implementation shows that our protocol works more than 50 times as fast as the CKK protocol for conjunctive query processing. In addition, the security level of our protocol is better than the security level of the CKK protocol.
引用
收藏
页码:149 / 164
页数:16
相关论文
共 50 条
  • [21] Query-Biased Preview over Outsourced and Encrypted Data
    Peng, Ningduo
    Luo, Guangchun
    Qin, Ke
    Chen, Aiguo
    SCIENTIFIC WORLD JOURNAL, 2013,
  • [22] Secure Range Query over Encrypted Data in Outsourced Environments
    Cui, Ningning
    Yang, Xiaochun
    Wang, Leixia
    Wang, Bin
    Li, Jianxin
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2018), PT II, 2018, 10828 : 112 - 129
  • [23] Secure range query over encrypted data in outsourced environments
    Cui, Ningning
    Yang, Xiaochun
    Wang, Bin
    Geng, Jing
    Li, Jianxin
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (01): : 491 - 517
  • [24] Storage and query over encrypted character and numerical data in database
    Wang, ZF
    Wang, W
    Shi, BL
    FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 77 - 81
  • [25] Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
    Jiang, Shunrong
    Zhu, Xiaoyan
    Guo, Linke
    Liu, Jianqing
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (03) : 799 - 813
  • [26] Secure range query over encrypted data in outsourced environments
    Ningning Cui
    Xiaochun Yang
    Bin Wang
    Jing Geng
    Jianxin Li
    World Wide Web, 2020, 23 : 491 - 517
  • [27] POSTER: Efficient Method for Disjunctive and Conjunctive Keyword Search over Encrypted Data
    Zhang, Yu
    Lu, Songfeng
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1535 - 1537
  • [28] Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud
    Shao, Jun
    Lu, Rongxing
    Guan, Yunguo
    Wei, Guiyi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 124 - 137
  • [29] VBTree: forward secure conjunctive queries over encrypted data for cloud computing
    Wu, Zhiqiang
    Li, Kenli
    VLDB JOURNAL, 2019, 28 (01): : 25 - 46
  • [30] VBTree: forward secure conjunctive queries over encrypted data for cloud computing
    Zhiqiang Wu
    Kenli Li
    The VLDB Journal, 2019, 28 : 25 - 46