Searchable Encryption
Prepared for 600.624 February 9, 2006
Searchable Encryption Prepared for 600.624 February 9, 2006 - - PowerPoint PPT Presentation
Searchable Encryption Prepared for 600.624 February 9, 2006 Outline Motivation of Searchable Encryption Searchable Encryption Constructions of Song, Wagner and Perrig Discussion Related Work Conjunctive Keyword
Prepared for 600.624 February 9, 2006
different machines
Untrusted
Untrusted
trapdoors to allow server to search...
Keyword
Untrusted
Index
Encryption
ciphertext
F : K × {0, 1}n−m → {0, 1}m n m G : K → Sl, |Si| = n − m
E : K × {0, 1}n → {0, 1}n f : K × {0, 1}∗ → K
test for this structure
Wi Si Fki(Si) ⊕ − → Ci Fki ki ← fk(Wi) Gk − →
Si Fki(Si) ⊕ − → Ci Fki Gk − → Ek(Wi) ki ← fk(Ek(Wi))
know!
plaintext that we can actually derive!
Si Fki(Si) ⊕ − → Ci Fki Gk − → Ek(Wi) Ri Li ki ← fk(Li)
and knowledge of the word
false-positive rate?
information
proportional to ... is this the only factor?
n m 2−m n n m m n
Gutenberg
loads
n = 32 bits, m = 8 bits
partitions in a document of partitions has a false positive rate of ( + 1 − k)/28k
knowledge of plaintext distribution
matches
8 16 24 32 40 48 56 64 n/8 2n/8 10 20 30 40 50 60 70 80 90 100 Accuracy n (bits) m (%n)
constructions
[BdCOP04]
machines
to do their job
created by TTP
corresponding to any keyword to any auditor
conjunct
combination to the index
W1
Untrusted
W2 ... Wn
Index
W1
Untrusted
W2 ... Wn
Index
W1
Untrusted
W2 ... Wn
Index
(2004)
keywords
construction known to date
share(S) → p1, . . . , pn recover(p1, . . . , pk) → S P
R
← Zp[x], deg = k − 1 S ∈ Zp p1 p2 p3 p4 S
Generate Index (for each document ID)
BuildIndex(w1, w2, w3) → p1, p2, p3
p1 p2 p3
Untrusted
p1 p3 p1 p1 p2 p3 p3
Generate Trapdoor (for each document ID)
p
3
p
2
p
1
w
1 ∧ w 2 ∧ w 3
p1 p3 p1 p1 p2 p3 p3
Generate Trapdoor (for each document ID)
p
3
p
2
p
1
S
Trapdoor(w
1, w 2, w 3) → S
w
1 ∧ w 2 ∧ w 3
Untrusted
p1 p3 p1 p1 p2 p3 p3 p1 p3 p1 p1 p2 p3 p3
Successful search (for each document)
p3 p2 p1 S
=
p
3
p
2
=
p
1
=
p1 p3 p1 p1 p2 p3 p3
p3 p2 p1 S p
2
= =
p
3
Failed search
p1 p3 p1 p1 p2 p3 p3
Linear Trapdoors Constant Trapdoors GSW-1 SCKS-SS GSW-2 SCKS-XDH Search 2m exp, m hash
m interpolations
m(2n+1) Pairings 2m Pairings m: number of documents n: number of keywords
keywords each
2 4 6 8 10 12 14 16 1 2 3 4 5 6 7 8 9 10 Time (sec) Keywords BuildIndex Trapdoor SearchIndex
Computation 10 000 documents 10 Keywords Index: 3.1 MB Trap: 156 KB Storage
momentum
Neven, P. Paillier, H. Shi, “Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions,” CRYPTO 2005.
Searches over Encrypted Data,” ICICS 2005.
Keyword Search,” EUROCRYPT 2004.
Encrypted Data,” ACNS 2005.
FOCS 1995.
ICICS 2004.
Encrypted Data,” ACNS 2004.
Computationally-Private Information Retrieval,” FOCS 1997.
Search,” WISA 2004.
Data,’’ S&P 2000.
Audit Log,” NDSS 2004.