Secure conjunctive keyword search over encrypted data

被引:463
作者
Golle, P
Staddon, J
Waters, B
机构
[1] Xerox Corp, Palo Alto Res Ctr, Palo Alto, CA 94304 USA
[2] Princeton Univ, Princeton, NJ 08544 USA
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS | 2004年 / 3089卷
关键词
searching on encrypted data;
D O I
10.1007/978-3-540-24852-1_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterion, the user gives the server a capability that allows the server to identify exactly those documents. Work in this area has largely focused on search criteria consisting of a single keyword. If the user is actually interested in documents containing each of several keywords (conjunctive keyword search) the user must either give the server capabilities for each of the keywords individually and rely on an intersection calculation (by either the server or the user) to determine the correct set of documents, or alternatively, the user may store additional information on the server to facilitate such searches. Neither solution is desirable; the former enables the server to learn which documents match each individual keyword of the conjunctive search and the latter results in exponential storage if the user allows for searches on every set of keywords. We define a security model for conjunctive keyword search over encrypted data and present the first schemes for conducting such searches securely. We propose first a scheme for which the communication cost is linear in the number of documents, but that cost can be incurred "offline" before the conjunctive query is asked. The security of this scheme relies on the Decisional Diffie-Hellman (DDH) assumption. We propose a second scheme whose communication cost is on the order of the number of keyword fields and whose security relies on a new hardness assumption.
引用
收藏
页码:31 / 45
页数:15
相关论文
共 17 条
  • [1] BENNETT K, 2002, P ACISP
  • [2] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [3] Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
  • [4] BONEH D, 2003, IN PRESS ADV CRYPTOL
  • [5] CACHIN C, ADV CRYPTOLOGY EUROC
  • [6] CHOR B, P FOCS 95
  • [7] CHOR T, 1997, CS0917 TR DEP COMP S
  • [8] DODIS Y, 2003, P WORKSH PUBL KEY CR
  • [9] Goh E, 2004, CRYPTOLOGY EPRINT AR
  • [10] Software protection and simulation on oblivious RAMs
    Goldreich, O
    Ostrovsky, R
    [J]. JOURNAL OF THE ACM, 1996, 43 (03) : 431 - 473