The Locality of Searchable Symmetric Encryption

被引:0
|
作者
Cash, David [1 ]
Tessaro, Stefano [2 ]
机构
[1] Rutgers State Univ, Dept Comp Sci, Piscataway, NJ 08855 USA
[2] Univ Calif Santa Barbara, Dept Comp Sci, Santa Barbara, CA 93106 USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014 | 2014年 / 8441卷
关键词
Symmetric Encryption; Lower Bound; DETERMINISTIC ENCRYPTION; CONSISTENCY PROPERTIES; ANONYMOUS IBE; CONSTRUCTIONS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proves a lower bound on the trade-off between server storage size and the locality of memory accesses in searchable symmetric encryption (SSE). Namely, when encrypting an index of N identifier/keyword pairs, the encrypted index must have size omega(N) or the scheme must perform searching with omega(1) non-contiguous reads to memory or the scheme must read many more bits than is necessary to compute the results. Recent implementations have shown that nonlocality of server memory accesses create a throughput-bottleneck on very large databases. Our lower bound shows that this is due to the security notion and not a defect of the constructions. An upper bound is also given in the form of a new SSE construction with an O(N logN) size encrypted index that performs O(log N) reads during a search.
引用
收藏
页码:351 / 368
页数:18
相关论文
共 50 条
  • [31] Privacy-preserving Searchable Encryption Based on Anonymization and Differential privacy
    Ma, Caixia
    Jia, Chunfu
    Du, Ruizhong
    Ha, Guanxiong
    Li, Mingyue
    2024 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2024, 2024, : 371 - 382
  • [32] Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things
    Ma, Mimi
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    Chen, Jianhua
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (02) : 759 - 767
  • [33] Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems
    Liu, Xueqiao
    Yang, Guomin
    Susilo, Willy
    Tonien, Joseph
    Liu, Ximeng
    Shen, Jian
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (03) : 561 - 574
  • [34] Practical symmetric on-line encryption
    Fouque, PA
    Martinet, G
    Poupard, G
    FAST SOFTWARE ENCRYPTION, 2003, 2887 : 362 - 375
  • [35] Practical symmetric on-line encryption
    Fouque, Pierre-Alain
    Martinet, Gwenaëlle
    Poupard, Guillaume
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2003, 2887 : 362 - 375
  • [36] Nonce-based symmetric encryption
    Rogaway, P
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 348 - 358
  • [37] IXT: Improved searchable encryption for multi-word queries based on PSI
    Yang, Yunbo
    Dong, Xiaolei
    Cao, Zhenfu
    Shen, Jiachen
    Dou, Shangmin
    FRONTIERS OF COMPUTER SCIENCE, 2023, 17 (05)
  • [38] Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains
    Du, Ruizhong
    Ma, Caixia
    Li, Mingyue
    TSINGHUA SCIENCE AND TECHNOLOGY, 2023, 28 (01): : 13 - 26
  • [39] Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control
    Wang, Xiwen
    Zhang, Kai
    Li, Jinguo
    Wen, Mi
    Xu, Shengmin
    Ning, Jianting
    COMPUTER JOURNAL, 2024, 67 (01) : 179 - 194
  • [40] Searchable Encryption Scheme for Personalized Privacy in IoT-Based Big Data
    Li, Shuai
    Li, Miao
    Xu, Haitao
    Zhou, Xianwei
    SENSORS, 2019, 19 (05)