A Survey of Provably Secure Searchable Encryption

被引:204
作者
Bosch, Christoph [1 ]
Hartel, Pieter [1 ]
Jonker, Willem [1 ]
Peter, Andreas [1 ]
机构
[1] Univ Twente, Ctr Telemat & Informat Technol, NL-7500 AE Enschede, Netherlands
关键词
Security; Secure data management; privacy; keyword search on encrypted data; searchable encryption; provably secure; PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; HIDDEN-VECTOR ENCRYPTION; ATTRIBUTE-BASED ENCRYPTION; FULLY HOMOMORPHIC ENCRYPTION; CONJUNCTIVE KEYWORD SEARCHES; PREDICATE ENCRYPTION; HYBRID ENCRYPTION; GUESSING ATTACKS; EQUALITY TEST;
D O I
10.1145/2636328
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We survey the notion of provably secure searchable encryption (SE) by giving a complete and comprehensive overview of the two main SE techniques: searchable symmetric encryption (SSE) and public key encryption with keyword search (PEKS). Since the pioneering work of Song, Wagner, and Perrig (IEEE S&P '00), the field of provably secure SE has expanded to the point where we felt that taking stock would provide benefit to the community. The survey has been written primarily for the nonspecialist who has a basic information security background. Thus, we sacrifice full details and proofs of individual constructions in favor of an overview of the underlying key techniques. We categorize and compare the different SE schemes in terms of their security, efficiency, and functionality. For the experienced researcher, we point out connections between the many approaches to SE and identify open research problems. Two major conclusions can be drawn from our work. While the so-called IND-CKA2 security notion becomes prevalent in the literature and efficient (sublinear) SE schemes meeting this notion exist in the symmetric setting, achieving this strong form of security efficiently in the asymmetric setting remains an open problem. We observe that in multirecipient SE schemes, regardless of their efficiency drawbacks, there is a noticeable lack of query expressiveness that hinders deployment in practice.
引用
收藏
页数:51
相关论文
共 155 条
  • [1] Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
    Abdalla, Michel
    Bellare, Mihir
    Catalano, Dario
    Kiltz, Eike
    Kohno, Tadayoshi
    Lange, Tanja
    Malone-Lee, John
    Neven, Gregory
    Paillier, Pascal
    Shi, Haixia
    [J]. JOURNAL OF CRYPTOLOGY, 2008, 21 (03) : 350 - 391
  • [2] Abe M, 2005, LECT NOTES COMPUT SC, V3494, P128
  • [3] Adjedj M, 2009, LECT NOTES COMPUT SC, V5905, P86, DOI 10.1007/978-3-642-10772-6_8
  • [4] Agrawal R., 2004, P ACM SIGMOD INT C M, P563
  • [5] Amanatidis G, 2007, LECT NOTES COMPUT SC, V4602, P14
  • [6] [Anonymous], 2004, ISO 18033 2
  • [7] [Anonymous], 2009, IACR CRYPTOLOGY EPRI
  • [8] [Anonymous], 2011, P INT WORKSH INT SEC
  • [9] [Anonymous], 1993, CRYPTO, DOI DOI 10.1007/3-540-48329-2
  • [10] [Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596