Searchable Symmetric Encryption Seny Kamara Advanced Topics in - - PowerPoint PPT Presentation

searchable symmetric encryption
SMART_READER_LITE
LIVE PREVIEW

Searchable Symmetric Encryption Seny Kamara Advanced Topics in - - PowerPoint PPT Presentation

Searchable Symmetric Encryption Seny Kamara Advanced Topics in Network Security Spring 2006 1 Yesterday Motivation for searchable encryption First SSE scheme [SWP00] Attacks on [SWP00] Conjunctive SSE [GSW04,PKL04,BKM05] 2


slide-1
SLIDE 1

Searchable Symmetric Encryption

Seny Kamara Advanced Topics in Network Security Spring 2006

1

slide-2
SLIDE 2

Yesterday

  • Motivation for searchable encryption
  • First SSE scheme [SWP00]
  • Attacks on [SWP00]
  • Conjunctive SSE [GSW04,PKL04,BKM05]

2

slide-3
SLIDE 3

Today

  • Limitations of Song et al.’s security model
  • More formal work on SSE [Goh03,CM05]
  • New definitions

3

slide-4
SLIDE 4

Practical Techniques[SWP00]

  • Song et al. provide proofs of security
  • “Our techniques are provably secure” (p. 1)
  • Yet
  • there are statistical attacks
  • leaks location of words

4

slide-5
SLIDE 5

What’s Going on?

  • Are the proofs wrong?
  • What are they proving?
  • Is it meaningful?

5

slide-6
SLIDE 6

What are they Proving?

6

pseudo-random (OTP)

Si Fki(Si) ⊕ − → Ci Fki Gk − → Ek(Wi) Ri Li ki ← fk(Li)

slide-7
SLIDE 7

Is it Meaningful?

  • Is proving that the key stream is pseudo-random useful?
  • Depends on the adversarial model!

7

slide-8
SLIDE 8

Adversarial Model

  • Who are we protecting

against?

  • What are its goal?
  • How much power does

it have?

8

Keyword

Index

Adversary

the server

  • info. about documents

and keywords it can search!

Search

  • utcome

HBC

slide-9
SLIDE 9

What are they Proving?

9

pseudo-random (OTP)

Si Fki(Si) ⊕ − → Ci Fki Gk − → Ek(Wi) Ri Li ki ← fk(Li)

slide-10
SLIDE 10

Is it Meaningful?

10

Ideal model [SWP00] Adversary server server Adv.’s Goal

recovering documents & keywords recovering documents & keywords

Adv.’s Power

it can search

none Meaning

documents and keywords are secure against server that can search documents are secure against server that cannot search

slide-11
SLIDE 11

Secure Indexes [Goh03]

  • Introduces a stronger (better) security model
  • IND2-CKA: security against chosen-keyword attacks
  • Provides provably secure and efficient construction
  • separates index from ciphertext
  • one index per document
  • based on pseudo-random functions & Bloom filters

11

slide-12
SLIDE 12

Adversarial Model

  • Who are we protecting

against?

  • What are its goals?
  • How much power does

it have?

12

Keyword

Index

Adversary

the server

  • info. about documents

and keywords it can search!

Search

  • utcome
slide-13
SLIDE 13

Formalizing the Adversarial Model

  • How exactly do we capture the adversarial model

formally?

13

slide-14
SLIDE 14

Adversarial Model

  • Who are we protecting

against?

  • What are its goals?
  • How much power does

it have?

14

the server

  • info. about documents

and keywords it can search! Probabilistic polynomial-time (PPT) algorithm indistinguishability allow adversary to generate and search many documents and keywords

slide-15
SLIDE 15

15

KW1 KW2 KW3 KW1 KW2 KW3

IND2-CKA ?

Adversary Challenger

slide-16
SLIDE 16

Is it Meaningful?

16

Ideal model [SWP00] IND2-CKA Adversary server server server Adv.’s Goal

recovering documents & keywords recovering documents & keywords recovering documents

Adv.’s Power

it can search

none

it can search

Meaning

documents and keywords are secure against server that can search documents are secure against server that cannot search documents are secure against server that can search

slide-17
SLIDE 17

Secure Indexes [Goh03]

  • Limitations:
  • IND2-CKA says nothing about trapdoors
  • One has to prove IND2-CKA + security of trapdoors

17

slide-18
SLIDE 18

Privacy Preserving [CM05]

  • Introduces a stronger security model than IND2-CKA
  • CM: security of index and trapdoors against chosen-

keyword attacks

  • Provides provably secure constructions
  • separates index from ciphertext
  • one index per document
  • Pseudo-random functions

18

slide-19
SLIDE 19

CM Security [CM05]

  • History: documents

and words queried

  • View: what the server

sees

  • Trace: minimum

information leaked

19

Keyword

Index

Adversary

Keyword

History View Trace

slide-20
SLIDE 20

CM Security [CM05]

  • for all q, for all adversaries, for any function f, there exists a

simulator such that for all histories

20

  • Pr
  • A(Viewq) =

f(Historyq)

  • − Pr
  • S(Traceq) =

f(Historyq)

  • ≤ negl(k)

Keyword

Index

Adversary

Keyword

History View Trace Adversary

Keyword

History Trace

slide-21
SLIDE 21

CM Security [CM05]

  • Intuition: anything the adversary can recover about the

history from the view, can be recovered from the trace

  • Implication: no adversary can recover any information

about the documents or word queries that he is not supposed to

21

slide-22
SLIDE 22

Is it Meaningful?

22

Ideal model [SWP00]

IND2-CKA

CM Adversary server server server server Adv.’s Goal

recovering documents & keywords recovering documents & keywords recovering documents recovering documents & keywords

Adv.’s Power

it can search

none

it can search it can search

Meaning

documents and keywords are secure against server that can search documents are secure against server that cannot search documents are secure against server that can search documents and keywords are secure against server that can search

slide-23
SLIDE 23

Is it Meaningful?

  • So did Chang and Mitzenmacher finally get it right?
  • Not exactly...

23

slide-24
SLIDE 24

Is it Meaningful?

24

Ideal model [SWP00]

IND2-CKA

CM Adversary server server server server Adv.’s Goal

recovering documents & keywords recovering documents & keywords recovering documents recovering documents & keywords

Adv.’s Power

it can search

none

it can search it can search

Meaning

documents and keywords are secure against server that can search documents are secure against server that cannot search documents are secure against server that can search documents and keywords are secure against server that can search