searchable symmetric encryption
play

Searchable Symmetric Encryption Seny Kamara Advanced Topics in - PowerPoint PPT Presentation

Searchable Symmetric Encryption Seny Kamara Advanced Topics in Network Security Spring 2006 1 Yesterday Motivation for searchable encryption First SSE scheme [SWP00] Attacks on [SWP00] Conjunctive SSE [GSW04,PKL04,BKM05] 2


  1. Searchable Symmetric Encryption Seny Kamara Advanced Topics in Network Security Spring 2006 1

  2. Yesterday • Motivation for searchable encryption • First SSE scheme [SWP00] • Attacks on [SWP00] • Conjunctive SSE [GSW04,PKL04,BKM05] 2

  3. Today • Limitations of Song et al.’s security model • More formal work on SSE [Goh03,CM05] • New definitions 3

  4. Practical Techniques [SWP00] • Song et al. provide proofs of security • “Our techniques are provably secure” (p. 1) • Yet • there are statistical attacks • leaks location of words 4

  5. What’s Going on? • Are the proofs wrong? • What are they proving? • Is it meaningful? 5

  6. What are they Proving? k i ← f k � ( L i ) E k �� ( W i ) L i R i → C i ⊕ − F k i ( S i ) G k − S i → pseudo-random (OTP) F k i 6

  7. Is it Meaningful? • Is proving that the key stream is pseudo-random useful? • Depends on the adversarial model! 7

  8. Adversarial Model • Who are we protecting against? HBC Adversary the server Index • What are its goal? Keyword info. about documents and keywords Search • How much power does outcome it have? it can search! 8

  9. What are they Proving? k i ← f k � ( L i ) E k �� ( W i ) L i R i → C i ⊕ − F k i ( S i ) G k − S i → pseudo-random (OTP) F k i 9

  10. Is it Meaningful? Ideal model [SWP00] Adversary server server recovering documents & recovering documents & Adv.’s Goal keywords keywords Adv.’s Power none it can search documents and keywords documents are secure Meaning are secure against server against server that cannot that can search search 10

  11. Secure Indexes [Goh03] • Introduces a stronger (better) security model • IND2-CKA : security against chosen-keyword attacks • Provides provably secure and efficient construction • separates index from ciphertext • one index per document • based on pseudo-random functions & Bloom filters 11

  12. Adversarial Model • Who are we protecting against? Adversary the server Index • What are its goals? Keyword info. about documents and keywords Search • How much power does outcome it have? it can search! 12

  13. Formalizing the Adversarial Model • How exactly do we capture the adversarial model formally? 13

  14. Adversarial Model • Who are we protecting against? Probabilistic polynomial-time the server (PPT) algorithm • What are its goals? info. about documents indistinguishability and keywords • How much power does it have? allow adversary to generate and it can search! search many documents and keywords 14

  15. IND2-CKA KW1 KW2 KW3 Challenger Adversary KW1 KW2 KW3 ? 15

  16. Is it Meaningful? Ideal model [SWP00] IND2-CKA Adversary server server server recovering recovering recovering Adv.’s Goal documents & documents & documents keywords keywords Adv.’s Power none it can search it can search documents and documents are secure documents are secure keywords are secure Meaning against server that against server that can against server that can cannot search search search 16

  17. Secure Indexes [Goh03] • Limitations: • IND2-CKA says nothing about trapdoors • One has to prove IND2-CKA + security of trapdoors 17

  18. Privacy Preserving [CM05] • Introduces a stronger security model than IND2-CKA • CM: security of index and trapdoors against chosen- keyword attacks • Provides provably secure constructions • separates index from ciphertext • one index per document • Pseudo-random functions 18

  19. CM Security [CM05] View • History : documents and words queried Adversary Index • View : what the server Keyword sees • Trace : minimum information leaked Trace Keyword History 19

  20. CM Security [CM05] • for all q, for all adversaries, for any function f, there exists a simulator such that for all histories � �� � � � A ( View q ) = S ( Trace q ) = � � � Pr − Pr � ≤ negl ( k ) � � f ( History q ) f ( History q ) View Adversary Adversary Index Keyword Trace Trace Keyword Keyword History History 20

  21. CM Security [CM05] • Intuition : anything the adversary can recover about the history from the view, can be recovered from the trace • Implication : no adversary can recover any information about the documents or word queries that he is not supposed to 21

  22. Is it Meaningful? Ideal [SWP00] CM IND2-CKA model Adversary server server server server Adv.’s recovering recovering recovering recovering documents & documents & documents & Goal documents keywords keywords keywords Adv.’s none it can search it can search it can search Power documents and documents and documents are documents are keywords are secure Meaning keywords are secure secure against server secure against server against server that against server that that cannot search that can search can search can search 22

  23. Is it Meaningful? • So did Chang and Mitzenmacher finally get it right? • Not exactly... 23

  24. Is it Meaningful? Ideal [SWP00] CM IND2-CKA model Adversary server server server server Adv.’s recovering recovering recovering recovering documents & documents & documents & Goal documents keywords keywords keywords Adv.’s none it can search it can search it can search Power documents and documents and documents are documents are keywords are secure Meaning keywords are secure secure against server secure against server against server that against server that that cannot search that can search can search can search 24

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend