Skip to main content
Top

2017 | OriginalPaper | Chapter

Practical and Secure Searchable Symmetric Encryption with a Small Index

Authors : Ryuji Miyoshi, Hiroaki Yamamoto, Hiroshi Fujiwara, Takashi Miyazaki

Published in: Secure IT Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

From a view point of information security, researches on an encrypted search system have been done intensively. Such search systems are called searchable symmetric encryption (SSE). The main part of SSE is an encrypted index which affects security and efficiency. Until now many SSE schemes have been proposed, but most of them uses a random oracle to achieve both adaptive security and an optimal index size. The index size of adaptively secure SSE schemes without a random oracle can be much larger. In this paper, we propose a new SSE scheme which satisfies adaptive security in the standard model and has an optimal index size. Furthermore the index of our scheme consists of Bloom filters and simple arrays, that is, arrays of integers. Since Bloom filters are also implemented by an array of integers, the structure of the index is simple. Thus, unlike other SSE schemes with an optimal index size, the size does not depend on a security parameter.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Asharov, G., Naor, M., Segev, G., Shahaf, I.: Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations. In: Proceedings of STOC 2016, pp. 1101–1114 (2016) Asharov, G., Naor, M., Segev, G., Shahaf, I.: Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations. In: Proceedings of STOC 2016, pp. 1101–1114 (2016)
2.
go back to reference Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 422–426 (1970)CrossRefMATH Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 422–426 (1970)CrossRefMATH
5.
go back to reference Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 353–373. Springer, Heidelberg (2013). doi:10.1007/978-3-642-40041-4_20 CrossRef Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 353–373. Springer, Heidelberg (2013). doi:10.​1007/​978-3-642-40041-4_​20 CrossRef
6.
go back to reference Cash, D., Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H., Rosu, M.-C., Steiner, M.: Dynamic searchable encryption in very-large database: data structures and implementation. In: Proceedings of NDSS 2014 (2014) Cash, D., Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H., Rosu, M.-C., Steiner, M.: Dynamic searchable encryption in very-large database: data structures and implementation. In: Proceedings of NDSS 2014 (2014)
7.
go back to reference Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005). doi:10.1007/11496137_30 CrossRef Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005). doi:10.​1007/​11496137_​30 CrossRef
8.
go back to reference Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of INFOCOM 2011, pp. 829–837 (2011) Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of INFOCOM 2011, pp. 829–837 (2011)
10.
go back to reference Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)CrossRef Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)CrossRef
12.
go back to reference Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24852-1_3 CrossRef Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004). doi:10.​1007/​978-3-540-24852-1_​3 CrossRef
13.
go back to reference Hacigümüş, H., Hore, B., Iyer, B., Mehrotra, S.: Search on encrypted data. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems, vol. 33, pp. 383–425. Springer, Boston (2007). doi:10.1007/978-0-387-27696-0_12 CrossRef Hacigümüş, H., Hore, B., Iyer, B., Mehrotra, S.: Search on encrypted data. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems, vol. 33, pp. 383–425. Springer, Boston (2007). doi:10.​1007/​978-0-387-27696-0_​12 CrossRef
14.
go back to reference Hahn, F., Kerschbaum, F.: Searchable encryption with secure and efficient updates. In: Proceedings of ACM CCS 2014, pp. 310–320 (2014) Hahn, F., Kerschbaum, F.: Searchable encryption with secure and efficient updates. In: Proceedings of ACM CCS 2014, pp. 310–320 (2014)
15.
go back to reference Hirano, T., Hattori, M., Kawai, Y., Matsuda, N., Iwamoto, M., Ohta, K., Sakai, Y., Munaka, T.: Simple, secure, and efficient searchable symmetric encryption with multiple encrypted indexes. In: Ogawa, K., Yoshioka, K. (eds.) IWSEC 2016. LNCS, vol. 9836, pp. 91–110. Springer, Cham (2016). doi:10.1007/978-3-319-44524-3_6 CrossRef Hirano, T., Hattori, M., Kawai, Y., Matsuda, N., Iwamoto, M., Ohta, K., Sakai, Y., Munaka, T.: Simple, secure, and efficient searchable symmetric encryption with multiple encrypted indexes. In: Ogawa, K., Yoshioka, K. (eds.) IWSEC 2016. LNCS, vol. 9836, pp. 91–110. Springer, Cham (2016). doi:10.​1007/​978-3-319-44524-3_​6 CrossRef
16.
go back to reference Jho, N.-S., Hong, D.: Symmetric searchable encryption with efficient conjunctive keyword search. KSII Trans. Internet Inf. Syst. 7(5), 1328–1342 (2013)CrossRef Jho, N.-S., Hong, D.: Symmetric searchable encryption with efficient conjunctive keyword search. KSII Trans. Internet Inf. Syst. 7(5), 1328–1342 (2013)CrossRef
17.
go back to reference Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. CRC Press, Boca Raton (2015)MATH Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. CRC Press, Boca Raton (2015)MATH
19.
go back to reference Kurosawa, K., Sasaki, K., Ohta, K., Yoneyama, K.: UC-secure dynamic searchable symmetric encryption scheme. In: Ogawa, K., Yoshioka, K. (eds.) IWSEC 2016. LNCS, vol. 9836, pp. 73–90. Springer, Cham (2016). doi:10.1007/978-3-319-44524-3_5 CrossRef Kurosawa, K., Sasaki, K., Ohta, K., Yoneyama, K.: UC-secure dynamic searchable symmetric encryption scheme. In: Ogawa, K., Yoshioka, K. (eds.) IWSEC 2016. LNCS, vol. 9836, pp. 73–90. Springer, Cham (2016). doi:10.​1007/​978-3-319-44524-3_​5 CrossRef
21.
go back to reference Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of ACM CCS 2012, pp. 965–976 (2012) Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of ACM CCS 2012, pp. 965–976 (2012)
22.
go back to reference Liu, L., Gai, J.: Bloom filter based index for query over encrypted character strings in database. In: Proceedings of CSIE 2009, pp. 303–307 (2009) Liu, L., Gai, J.: Bloom filter based index for query over encrypted character strings in database. In: Proceedings of CSIE 2009, pp. 303–307 (2009)
23.
go back to reference Liu, Q., Wang, G., Wu, J.: An efficient privacy preserving keyword search scheme in cloud computing. In: Proceedings of CSE 2009, pp. 715–720 (2009) Liu, Q., Wang, G., Wu, J.: An efficient privacy preserving keyword search scheme in cloud computing. In: Proceedings of CSE 2009, pp. 715–720 (2009)
24.
go back to reference Moataz, T., Shikfa, A.: Boolean symmetric searchable encryption. In: Proceedings of ACM ASIACCS 2013, pp. 265–276 (2013) Moataz, T., Shikfa, A.: Boolean symmetric searchable encryption. In: Proceedings of ACM ASIACCS 2013, pp. 265–276 (2013)
25.
go back to reference Naveed, M., Prabhakarn, M., Gunter, C.A.: Dynamic searchable encryption via blind storage. In: Proceedings of IEEE on Security and Privacy, pp. 639–654 (2014) Naveed, M., Prabhakarn, M., Gunter, C.A.: Dynamic searchable encryption via blind storage. In: Proceedings of IEEE on Security and Privacy, pp. 639–654 (2014)
26.
go back to reference Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: CryptDB: processing queries on an encrypted database. Commun. ACM 55(9), 103–111 (2012)CrossRef Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: CryptDB: processing queries on an encrypted database. Commun. ACM 55(9), 103–111 (2012)CrossRef
27.
go back to reference Suga, T., Nishide, T., Sakurai, K.: Secure keyword search using bloom filter with specified character positions. In: Takagi, T., Wang, G., Qin, Z., Jiang, S., Yu, Y. (eds.) ProvSec 2012. LNCS, vol. 7496, pp. 235–252. Springer, Heidelberg (2012). doi:10.1007/978-3-642-33272-2_15 CrossRef Suga, T., Nishide, T., Sakurai, K.: Secure keyword search using bloom filter with specified character positions. In: Takagi, T., Wang, G., Qin, Z., Jiang, S., Yu, Y. (eds.) ProvSec 2012. LNCS, vol. 7496, pp. 235–252. Springer, Heidelberg (2012). doi:10.​1007/​978-3-642-33272-2_​15 CrossRef
28.
go back to reference Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: Proceedings of NDSS 2014 (2014) Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: Proceedings of NDSS 2014 (2014)
29.
go back to reference Song, D.X., Wagner, D., Perrig, A.: Techniques for searchers on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 44–55 (2000) Song, D.X., Wagner, D., Perrig, A.: Techniques for searchers on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 44–55 (2000)
30.
go back to reference Xu, P., Liang, S., Wang, W., Susilo, W., Wu, Q., Jin, H.: Dynamic searchable symmetric encryption with physical deletion and small leakage. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10342, pp. 207–226. Springer, Cham (2017). doi:10.1007/978-3-319-60055-0_11 CrossRef Xu, P., Liang, S., Wang, W., Susilo, W., Wu, Q., Jin, H.: Dynamic searchable symmetric encryption with physical deletion and small leakage. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10342, pp. 207–226. Springer, Cham (2017). doi:10.​1007/​978-3-319-60055-0_​11 CrossRef
31.
go back to reference Yavuz, A.A., Guajardo, J.: Dynamic searchable symmetric encryption with minimal leakage and efficient updates on commodity hardware. In: Dunkelman, O., Keliher, L. (eds.) SAC 2015. LNCS, vol. 9566, pp. 241–259. Springer, Cham (2016). doi:10.1007/978-3-319-31301-6_15 CrossRef Yavuz, A.A., Guajardo, J.: Dynamic searchable symmetric encryption with minimal leakage and efficient updates on commodity hardware. In: Dunkelman, O., Keliher, L. (eds.) SAC 2015. LNCS, vol. 9566, pp. 241–259. Springer, Cham (2016). doi:10.​1007/​978-3-319-31301-6_​15 CrossRef
32.
go back to reference Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of ICDCS 2010, pp. 253–262 (2010) Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of ICDCS 2010, pp. 253–262 (2010)
Metadata
Title
Practical and Secure Searchable Symmetric Encryption with a Small Index
Authors
Ryuji Miyoshi
Hiroaki Yamamoto
Hiroshi Fujiwara
Takashi Miyazaki
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-70290-2_4

Premium Partner