The Locality of Searchable Symmetric Encryption

被引:0
|
作者
Cash, David [1 ]
Tessaro, Stefano [2 ]
机构
[1] Rutgers State Univ, Dept Comp Sci, Piscataway, NJ 08855 USA
[2] Univ Calif Santa Barbara, Dept Comp Sci, Santa Barbara, CA 93106 USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014 | 2014年 / 8441卷
关键词
Symmetric Encryption; Lower Bound; DETERMINISTIC ENCRYPTION; CONSISTENCY PROPERTIES; ANONYMOUS IBE; CONSTRUCTIONS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proves a lower bound on the trade-off between server storage size and the locality of memory accesses in searchable symmetric encryption (SSE). Namely, when encrypting an index of N identifier/keyword pairs, the encrypted index must have size omega(N) or the scheme must perform searching with omega(1) non-contiguous reads to memory or the scheme must read many more bits than is necessary to compute the results. Recent implementations have shown that nonlocality of server memory accesses create a throughput-bottleneck on very large databases. Our lower bound shows that this is due to the security notion and not a defect of the constructions. An upper bound is also given in the form of a new SSE construction with an O(N logN) size encrypted index that performs O(log N) reads during a search.
引用
收藏
页码:351 / 368
页数:18
相关论文
共 50 条
  • [1] Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem
    Duan, Gangqiang
    Li, Shuai
    ELECTRONICS, 2023, 12 (18)
  • [2] Analysis of Searchable Encryption Mechanism in Medical Cloud Environment
    Huang, Meidong
    Xie, Weixin
    Jing, Xiu-Li
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2018, 8 (02) : 331 - 336
  • [3] Searchable encryption : A survey
    Sharma, Dhruti
    INFORMATION SECURITY JOURNAL, 2023, 32 (02): : 76 - 119
  • [4] Character-based symmetric searchable encryption and its implementation and experiment on mobile devices
    Suga, Takanori
    Nishide, Takashi
    Sakurai, Kouichi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1717 - 1725
  • [5] Searchable Encryption Taxonomy: Survey
    Noorallahzadeh, M. H.
    Alimoradi, R.
    Gholami, A.
    JOURNAL OF APPLIED SECURITY RESEARCH, 2022, : 880 - 924
  • [6] Verifiable dynamic searchable encryption
    Etemad, Mohammad
    Kupcu, Alptekin
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 27 (04) : 2606 - 2623
  • [7] Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases
    Kerschbaum, Florian
    Harterich, Martin
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 325 - 336
  • [8] Biometric-Authenticated Searchable Encryption
    Gardham, Daniel
    Manulis, Mark
    Dragan, Constantin Catalin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 40 - 61
  • [9] Password-authenticated searchable encryption
    Chen, Liqun
    Huang, Kaibin
    Manulis, Mark
    Sekar, Venkkatesh
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (05) : 675 - 693
  • [10] Framework for Searchable Encryption with SQL Databases
    Azraoui, Monir
    Onen, Melek
    Molva, Refik
    CLOSER: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2018, : 57 - 67