The Locality of Searchable Symmetric Encryption

被引:0
|
作者
Cash, David [1 ]
Tessaro, Stefano [2 ]
机构
[1] Rutgers State Univ, Dept Comp Sci, Piscataway, NJ 08855 USA
[2] Univ Calif Santa Barbara, Dept Comp Sci, Santa Barbara, CA 93106 USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014 | 2014年 / 8441卷
关键词
Symmetric Encryption; Lower Bound; DETERMINISTIC ENCRYPTION; CONSISTENCY PROPERTIES; ANONYMOUS IBE; CONSTRUCTIONS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proves a lower bound on the trade-off between server storage size and the locality of memory accesses in searchable symmetric encryption (SSE). Namely, when encrypting an index of N identifier/keyword pairs, the encrypted index must have size omega(N) or the scheme must perform searching with omega(1) non-contiguous reads to memory or the scheme must read many more bits than is necessary to compute the results. Recent implementations have shown that nonlocality of server memory accesses create a throughput-bottleneck on very large databases. Our lower bound shows that this is due to the security notion and not a defect of the constructions. An upper bound is also given in the form of a new SSE construction with an O(N logN) size encrypted index that performs O(log N) reads during a search.
引用
收藏
页码:351 / 368
页数:18
相关论文
共 50 条
  • [41] Efficient and secure searchable encryption protocol for cloud-based Internet of Things
    Wu, Libing
    Chen, Biwen
    Choo, Kim-Kwang Raymond
    He, Debiao
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 111 : 152 - 161
  • [42] THREE-FACTOR AUTHENTICATION SCHEME BASED ON SEARCHABLE ENCRYPTION AND BIOMETRIC FINGERPRINT
    Mihailescu, Marius Iulian
    Nita, Stefania Loredana
    2020 13TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2020, : 139 - 144
  • [43] Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage
    Zhou, Yuyang
    Hu, Zhebin
    Li, Fagen
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 383 - 396
  • [44] Searchable encryption: A survey on privacy-preserving search schemes on encrypted outsourced data
    Handa, Rohit
    Krishna, C. Rama
    Aggarwal, Naveen
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (17)
  • [45] Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption
    Wang, Yunling
    Wang, Jianfeng
    Sun, Shi-Feng
    Liu, Joseph K.
    Susilo, Willy
    Chen, Xiaofeng
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 24 - 38
  • [46] VCLPKES: Verifiable Certificateless Public Key Searchable Encryption Scheme for Industrial Internet of Things
    Zhang, Yulei
    Liu, Xiangzhen
    Lang, Xiaoli
    Zhang, Yongjie
    Wang, Caifen
    IEEE ACCESS, 2020, 8 (08): : 20849 - 20861
  • [47] Multi-user Boolean searchable encryption supporting fast ranking in mobile clouds
    Chen, Zehong
    Zhang, Fangguo
    Zhang, Peng
    Zhao, Hanbang
    COMPUTER COMMUNICATIONS, 2020, 164 (164) : 100 - 113
  • [48] Multi-keyword ranked searchable encryption scheme with access control for cloud storage
    Zarezadeh, Maryam
    Mala, Hamid
    Ashouri-Talouki, Maede
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 207 - 218
  • [49] A New Symmetric Digital Video Encryption Model
    Kordov, Krasimir
    Dimitrov, Georgi
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, 21 (01) : 50 - 61
  • [50] Symmetric keyring encryption scheme for biometric cryptosystem
    Lai, Yen-Lung
    Hwang, Jung Yeon
    Jin, Zhe
    Kim, Soohyong
    Cho, Sangrae
    Teoh, Andrew Beng Jin
    INFORMATION SCIENCES, 2019, 502 : 492 - 509