Searchable Encryption

Slides:



Advertisements
Similar presentations
Computer Security Set of slides 4 Dr Alexei Vernitski.
Advertisements

Pairing Friendly Elliptic Curves of Prime Order with Embedding degree 12 Paulo Barreto and Michael Naehrig Presented by Mike Scott.
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Russell Martin August 9th, Contents Introduction to CPABE Bilinear Pairings Group Selection Key Management Key Insulated CPABE Conclusion & Future.
Building an Encrypted and Searchable Audit Log Brent Waters Dirk Balfanz Glenn Durfee D.K. Smetters.
SECURING THE CLOUDS Presented By: Dr. Mohammed Imtiaz Ahmed Librarian, Pt. Ravi Shankar Shukla University Raipur (C.G), Mohammed Bakhtawar Ahmed.
Implementing Cryptographic Pairings on Smartcards Mike Scott.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Project on fuzzy keyword search over encrypted data in cloud computing
Building an Encrypted and Searchable Audit Log 11th Annual Network and Distributed Security Symposium (NDSS '04); 2004 February 5-6; San Diego; CA. Presented.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Presented by Katherine Heller COSC 4765 University of Wyoming April 26, 2011 Image source: PC Dynamics, Inc.
CSC 386 – Computer Security Scott Heggen. Agenda Exploring that locked box thing from Friday?
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
Elliptic Curve Cryptography
Encryption CS110: Computer Science and the Internet.
Computer System Design Lab 1 Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee Bing Wang * Wei Song *†
DIGITAL SIGNATURE ALGORITHM. The National Institute of Standards and Technology (NIST) has published Federal Information Processing Standard FIPS 186,
Setting up a search engine KS 2 Search: appreciate how results are selected.
WEB Access of Library Content YooLib WEB Access of Library Content YooLib ….and what is Hyperbook? Michael Maxwell Director, Worldwide Sales Kirtas Technologies,
Tag File System in Cloud 林敬棋 NTU CSIE D Research Statement This project aims at adding tags to the files in the cloud storage. ◦ A tag is a keyword.
Cloud Computing ILAS project DONE BY:. Table of content INTRODUCTION. ◦ Cloud computing in general ◦ What are the things that worked during the implementation.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
1 Original Message Scrambled Message Public Key receiver Internet Scrambled+Signed Message Original Message Private Key receiver The Process of Sending.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Cryptography – Test Review
Searchable Encryption in Cloud
An Introduction to Pairing Based Cryptography
RSA Slides by Kent Seamons and Tim van der Horst
INTRODUCTION Enhanced Simplified Symmetric Key Encryption Algorithm by Mahendra kumar shrivas.
Public Key Encryption Systems
e-Health Platform End 2 End encryption
B. R. Chandavarkar CSE Dept., NITK Surathkal
0_kit End to End encryption in your app
Chapter 8 Network Security.
Chapters 14,15 Security.
Cryptography.
An Introduction to Pairing Based Cryptography
Digital Signatures Last Updated: Oct 14, 2017.
ICS 454 Principles of Cryptography
The Most Secure Cloud Storage Provider
MIRACL & PBC Yung-Hsiang Liu.
Rivest, Shamir and Adleman
Analysis of the RSA Encryption Algorithm
Elliptic Curve Cryptography (ECC)
ICS 454 Principles of Cryptography
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Building an Encrypted and Searchable Audit Log
Atelier Progress Report
Chapters 14,15 Security.
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Chapter -8 Digital Signatures
One Time Signature.
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Public Key Encryption Systems
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Blowfish Encryption Algorithm
Presentation transcript:

Searchable Encryption 陳榮傑 交通大學資工系 Cryptanalysis Lab 2012/03/29

Searchable Encryption kw : keyword Encrypt: Encrypted data PEKS(kw)s Alice Search kw: Trapdoor(kw’) Test: for each file tests PEKS (using pairing-based cryptography) Reply: Encrypted files which contains kw’ Server gains no knowledge about kw or the file content stored on the Cloud Storage

Searchable Encryption kw : keyword Encrypt: Encrypted data PEKS(kw)s A B C Alice Search kw: Trapdoor(kw’) C Test: for each file tests PEKS (using pairing-based cryptography) Test: for each file tests PEKS Reply: Encrypted files which contains kw’ Server gains no knowledge about kw or the file content stored on the Cloud Storage

Data Example

Data Example Keyword Lists (311.tags)

Public Key Encryption with Keyword Search (PEKS) (1/3) 311.pdf 311.pdf 311.tags Keyword Encryption ECIES key 311.cipher PEKS INDEX

Search Keyword Search kw: Trapdoor(author: Brent Waters, Alice’s private key) Alice Test: for each file tests PEKS in Reply: Encrypted files which contains kw PEKS INDEX 311.aes128 311.rsa

Search Keyword File 1: PEKS(id) PEKS(title) PEKS(author1) ⁞ File 2: PEKS(author) PEKS(keyword1) PEKS(keyword2) Trapdoor(author: Brent Waters) PEKS INDEX Trapdoor(author: Brent Waters) 𝑃𝐸𝐾𝑆= 𝑔 𝑟 , 𝐻 2 𝑡 , 𝑡=𝑒 𝐻 1 𝐾𝑊 , ℎ 𝑟 , ℎ= 𝑔 𝛼 𝑇𝑟𝑎𝑝𝑑𝑜𝑜𝑟= 𝐻 1 𝐾𝑊 𝛼 𝑆𝑒𝑟𝑣𝑒𝑟 𝑡𝑒𝑠𝑡𝑠 𝑒𝑎𝑐ℎ 𝑃𝐸𝐾𝑆 𝑤ℎ𝑒𝑡ℎ𝑒𝑟 𝐻 2 𝑒( 𝐻 1 𝐾𝑊 𝛼 , 𝑔 𝑟 = 𝐻 2 𝑡

Implementation PBC Library by Ben Lynn Tate Pairing supersingular curve: y2 = x3 + x over Fq embedding degree k = 2 q is a prime and q ≡ 3 mod 4 q is 1536-bit long group order r is 256-bit long Key Length:

Forthcoming Research To enhance search capability

Demo PEKS library

Questions? Thank you