Dynamic Searchable Encryption with Small Client Storage
被引:52
作者:
Demertzis, Ioannis
论文数: 0引用数: 0
h-index: 0
机构:
Univ Maryland, College Pk, MD 20742 USAUniv Maryland, College Pk, MD 20742 USA
Demertzis, Ioannis
[1
]
Chamani, Javad Ghareh
论文数: 0引用数: 0
h-index: 0
机构:
Hong Kong Univ Sci & Technol, Hong Kong, Peoples R China
Sharif Univ Technol, Tehran, IranUniv Maryland, College Pk, MD 20742 USA
Chamani, Javad Ghareh
[2
,3
]
Papadopoulos, Dimitrios
论文数: 0引用数: 0
h-index: 0
机构:
Hong Kong Univ Sci & Technol, Hong Kong, Peoples R ChinaUniv Maryland, College Pk, MD 20742 USA
Papadopoulos, Dimitrios
[2
]
Papamanthou, Charalampos
论文数: 0引用数: 0
h-index: 0
机构:
Univ Maryland, College Pk, MD 20742 USAUniv Maryland, College Pk, MD 20742 USA
Papamanthou, Charalampos
[1
]
机构:
[1] Univ Maryland, College Pk, MD 20742 USA
[2] Hong Kong Univ Sci & Technol, Hong Kong, Peoples R China
[3] Sharif Univ Technol, Tehran, Iran
来源:
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020)
|
2020年
基金:
美国国家科学基金会;
关键词:
D O I:
10.14722/ndss.2020.24423
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
We study the problem of dynamic searchable encryption (DSE) with forward-and-backward privacy. Many DSE schemes have been proposed recently but the most efficient ones have one limitation: they require maintaining one operation counter for each unique keyword, either stored locally at the client or stored encrypted at the server and accessed obliviously (e.g., with an oblivious map) during every operation. We propose three new schemes that overcome the above limitation and achieve constant permanent client storage with improved performance, both asymptotically and experimentally, compared to prior state-of-the-art works. In particular, our first two schemes adopt a "static-to-dynamic" transformation which eliminates the need for oblivious accesses during searches. Due to this, they are the first practical schemes with minimal client storage and non-interactive search. Our third scheme is the first quasi-optimal forward-and-backward DSE scheme with only a logarithmic overhead for retrieving the query result (independently of previous deletions). While it does require an oblivious access during search in order to keep permanent client storage minimal, its practical performance is up to four orders of magnitude better than the best existing scheme with quasi-optimal search.
引用
收藏
页数:18
相关论文
共 51 条
[51]
Zhang YP, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P707