Searchable Symmetric Encryption :Improved Definitions and Efficient Constructions Reza Curtmola Juan Garay Seny Kamara Rafail Ostrovsky.

Slides:



Advertisements
Similar presentations
Algorithms Chapter 15 Dynamic Programming - Rod
Advertisements

Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Efficient Group Signatures from Bilinear Pairing Author: Xiangguo Cheng, Huafei Zhu, Ying Qiu, and Xinmei Wang Presenter: 紀汶承.
Order Analysis of Algorithms Debdeep Mukhopadhyay IIT Madras.
Seny Kamara & Kristin Lauter Micorsoft Reaserch B 廖以圻 B 陳育旋.
Structured Encryption and Controlled Disclosure Melissa Chase Seny Kamara Microsoft Research Asiacrypt '10 1.
Introduction to Practical Cryptography Lecture 9 Searchable Encryption.
1 Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions Reza Curtmola Juan Garay Seny Kamara Rafail Ostrovsky Johns Hopkins.
New Efficient Searchable Encryption Schemes from Bilinear Pairings Author:Chunxiang Gu and Yuefei Zhu International Journal of Network Security, 2007 Presenter:
INTRODUCTION PROBLEM FORMULATION FRAMEWORK AND PRIVACY REQUIREMENTS FOR MRSE PRIVACY-PRESERVING AND EFFICIENT MRSE PERFORMANCE ANALYSIS RELATED WORK CONCLUSION.
Public Key Encryption That Allows PIR Queries Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III Presenter: 紀汶承.
1 Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
1 Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy Author : Radu Sion Bogdan Carbunar Presentered by Chia Jui Hsu.
Identity Based Encryption
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
: Happy Number ★ ? 題組: Problem Set Archive with Online Judge 題號: 10591: Happy Number 解題者:陳瀅文 解題日期: 2006 年 6 月 6 日 題意:判斷一個正整數 N 是否為 Happy Number.
Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
Reza Curtmola Juan Garay Seny Kamara Rafail Ostrovsky
On The Cryptographic Applications of Random Functions Oded Goldreich Shafi Goldwasser Silvio Micali Advances in Cryptology-CRYPTO ‘ 84 報告人 : 陳昱升.
1 Pseudorandom-Permutation Index. 2 Outline Introduction Goh’s Z-IDX PRP-Index Secure game.
Lecture Note of 12/29 jinnjy. Outline Decidiability Definition and operations of Turing Machine.
Practical Techniques for Searches on Encrypted Data Author:Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀汶承.
845: Gas Station Numbers ★★★ 題組: Problem Set Archive with Online Judge 題號: 845: Gas Station Numbers. 解題者:張維珊 解題日期: 2006 年 2 月 題意: 將輸入的數字,經過重新排列組合或旋轉數字,得到比原先的數字大,
1 Secure Indexes Author : Eu-Jin Goh Presented by Yi Cheng Lin.
1 Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor Weizmann Institute Omer Reingold AT&T Research.
Improved Searchable Public Key Encryption with Designated Tester Author : Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee Presenter: Li-Tzu.
Efficient Search on Encrypted Data. Outline SWP Linear Scan SWP encrypted index Goh Bloom Filter Hybird scheme Discussion.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Building an Encrypted and Searchable Audit Log 11th Annual Network and Distributed Security Symposium (NDSS '04); 2004 February 5-6; San Diego; CA. Presented.
Public Key Encryption that Allows PIR Queries Dan Boneh 、 Eyal Kushilevitz 、 Rafail Ostrovsky and William E. Skeith Crypto 2007.
Black-Box Garbled RAM Sanjam Garg UC Berkeley Based on join works with
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
(Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min Goi
CS212: DATA STRUCTURES Lecture 10:Hashing 1. Outline 2  Map Abstract Data type  Map Abstract Data type methods  What is hash  Hash tables  Bucket.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
Cryptography for Cloud Storage Service Kaoru Kurosawa Ibaraki University, Japan CRYPTOLOGY 2012, 4-6 June, Langkawi, Malaysia.
How to Update Documents Verifiably in Searchable Symmetric Encryption Kaoru Kurosawa and Yasuhiro Ohtaki Ibaraki University, Japan.
Managing and querying encrypted data Trần Mỹ Giao Huỳnh Mai Thúy.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
An efficient password authenticated key exchange protocol for imbalanced wireless Authors: Ya-Fen Chang, Chin-Chen Chang and Jen-Ho Yang Source: Computer.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
UC/Garbled Searchable Symmetric Encryption Kaoru Kurosawa Ibaraki University, Japan.
Computer System Design Lab 1 Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee Bing Wang * Wei Song *†
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
A New Provably Secure Certificateless Signature Scheme Date: Reporter:Chien-Wen Huang 出處 :2008 IEEE International Conference on Communications.
Public Key Encryption with Keyword Search
BlindLocation: Supporting User Location Privacy in Mobile Database Using Blind Signature Source: Journal of Computer Science and Technology, reviewing.
Presented By Amarjit Datta
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
Higher Computing Science 2016 Prelim Revision. Topics to revise Computational Constructs parameter passing (value and reference, formal and actual) sub-programs/routines,
Searching Over Encrypted Data Charalampos Papamanthou ECE and UMIACS University of Maryland, College Park Research Supported By.
CS555Spring 2012/Topic 81 Cryptography CS 555 Topic 8: Pseudorandom Functions and CPA Security.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System Source: Pairing 2007, LNCS 4575, pp.2-22, 2007 Author: Yong.
All Your Queries are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou University.
SSE-2 Step1: keygen(1 k ):s {0,1} k,output K=s Step2:Buildindex(K,D): 建立 table T, p=word bit+max bit R 假設 w 1 出現在 D 1,D 3 T[π s (w 1 ||1)]=D 1 T[π s (w.
Searchable Encryption in Cloud
A Concrete Certificateless Signature Scheme without Pairings
Privacy Preserving Ranked Multi-Keyword
based on slides by Debra Cook
Searchable Symmetric Encryption:
J. Byun et al. In Secure Data Management, LNCS 4165,
Path Oram An Extremely Simple Oblivious RAM Protocol
Presentation transcript:

Searchable Symmetric Encryption :Improved Definitions and Efficient Constructions Reza Curtmola Juan Garay Seny Kamara Rafail Ostrovsky

OUTLINE Searchable Symmetric Encryption Revisiting SSE security definitions SEE-1(non-adaptive) SEE-2(adaptive) Multi-user Searchable Encryption 證明

Revisiting SSE security definitions “ A secure SSE scheme should not leak anything beyond the outcome of a search ” – “ search outcome ” : memory addresses of documents that contain a hidden keyword – Important to note: different keyword requests may lead to the same search outcome – “ search pattern ” : whether two queries were for the same keyword or not A (slightly) better intuition – “ A secure SSE scheme should not leak anything beyond the outcome and the pattern of a search ”

SSE Algorithms Keygen(1 k ): outputs symmetric key K (by user) BuildIndex(K, {D 1,..., D n }): outputs secure index I (by user) Trapdoor(K, w): outputs a trapdoor T w (by user) Search(I, T w ): outputs identifiers of documents containing w (id 1,..., id m ) (by server)

SSE client can upload additional “ encrypted ” data structures to help search Index Keyword server

Our model History: documents and keywords View: encrypted documents, index, trapdoors Trace: length of documents, search outcomes, search pattern

Our intuition Previous intuition – “A secure SSE scheme should not leak anything beyond the outcome and the pattern of a search” A more “formal intuition” – “any function about the documents and the keywords that can be computed from the encrypted documents, the index and the trapdoors can be computed from the length of the documents, the search outcomes and the search pattern

What is adaptiveness? Non-adaptive :adversaries make search queries without seeing the outcome of previous searches Adaptive :adversaries can make search queries as a function of the outcome of previous searches (Note)The user may or may not generate its word queries depending on the outcome of previous searches We call queries that do depend on previous search outcomes adaptive

Non-Adaptive Adaptive (new) [SWP00,Goh03,CM05,...] SI w1w1 w2w2 w3w3 w4w4 w2w2 w1w1 w3w3

Non-adaptive SSE construction Server Index KeywordTrapdoor D id

Index 是由 2 種 data structure 製作 -Array A and look-up table T D id L i T |△||△| |D(w)|

一些符號定義 Let △ = {w 1,...,w d } be a dictionary of d words, and 2 △ be the set of all possible documents. let D ⊆ 2 △ be a collection of n documents D = (D 1,...,D n ) and 2 2 △ be the set of all possible document collections. Let id(D) be the identifier of document D D(w) (the set of identifiers of documents containing w) as the outcome of a search for w and to the sequence (D(w 1 ),...,D(w n )) as the access pattern of a client

Example D={D 1,D 2,D 3 },w={w 1,w 2, …,w 5 } 假設 D(w 1 )={D 1,D 3 },D(w 2 )={D 1,D 2 }, D(w 3 )={D 2,D 3 },D(w 4 )={D 1 },D(w 5 )={D 2 } 建立 index A: T: W 5 W 2 W 4 W 3 W D 3 ||null D 2 ||4 D 2 ||null D 2 ||null D 1 ||null D 1 ||2 D3||null D 1 ||7

Seaching: P: Pseudo Random Permutation F: Pseudo Random Function addr = P(w3) key = F(w3) Trapdoor = (addr, key)=(4,5) => D 2,D 3

Adaptive SSE construction

比較

Secure updates 新舊 document collection combine 後重新 建立 index, 因此得到新的 document collection and 新的 index

Multi-user Searchable Encryption 由 6 個 polynomial-time algorithms 組成 MKeygen(1 k ) is a probabilistic key generation algorithm that is run by the owner O to setup the scheme.It takes a security parameter k, and returns an owner secret key, K O. MBuildIndex(K O,D) is run by O to construct indexes. It takes the owner ’ s secret key K O and a document collection D as inputs, and returns an index I.

N:a set of users G  N:the set of users allowed to search AddUser(K O,U) is run by O whenever it wishes to add a user to the group G. It takes the owner ’ s secret key K O and a user U as inputs, and returns U ’ s secret key, K U RevokeUser(K O,U) is run by O whenever it wishes to revoke a user from G. It takes the owner ’ s secret key K O and a user U as inputs, and revokes the user ’ s searching privileges

MTrapdoor(K U,w) is run by a user (including O) in order to generate a trapdoor for a given word. It takes a user U ’ s secret key K U and a word w as inputs, and returns a trapdoor T U, w MSearch(ID, T U, w ) is run by the server S in order to search for the documents in D that contain word w. It takes the index ID for collection D and the trapdoor T U, w for word w as inputs, and returns D(w) if user U  G and  if user U  G

證明

proof: 由紀銘偉大大白板講解