Public Key Encryption that Allows PIR Queries Dan Boneh 、 Eyal Kushilevitz 、 Rafail Ostrovsky and William E. Skeith Crypto 2007.

Slides:



Advertisements
Similar presentations
Constant-Round Private Database Queries Nenad Dedic and Payman Mohassel Boston UniversityUC Davis.
Advertisements

Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Multi-Query Computationally-Private Information Retrieval with Constant Communication Rate Jens Groth, University College London Aggelos Kiayias, University.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Improved Efficiency for Private Stable Matching Matthew Franklin, Mark Gondree, and Payman Mohassel University of California, Davis 02/07/07 - Session.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Lecture 15 Private Information Retrieval Stefan Dziembowski MIM UW ver 1.0.
Peer-to-Peer Distributed Search. Peer-to-Peer Networks A pure peer-to-peer network is a collection of nodes or peers that: 1.Are autonomous: participants.
1 Introduction to Computability Theory Lecture15: Reductions Prof. Amos Israeli.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
How to compile searching software so that it is impossible to reverse-engineer. (Private Keyword Search on Streaming Data)
Public Key Encryption That Allows PIR Queries Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III Presenter: 紀汶承.
BTrees & Bitmap Indexes
1 Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
Private Information Retrieval Benny Chor, Oded Goldreich, Eyal Kushilevitz and Madhu Sudan Journal of ACM Vol.45 No Reporter : Chen, Chun-Hua Date.
Elliptic Curve. p2. Outline EC over Z p EC over GF(2 n )
Identity Based Encryption
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
How to compile searching software so that it is impossible to reverse-engineer. (Private Keyword Search on Streaming Data)
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
1 Secure Indexes Author : Eu-Jin Goh Presented by Yi Cheng Lin.
Spring 2004 ECE569 Lecture ECE 569 Database System Engineering Spring 2004 Yanyong Zhang
Private Information Retrieval Amos Beimel – Ben-Gurion University Tel-Hai, June 4, 2003 This talk is based on talks by:
1Bloom Filters Lookup questions: Does item “ x ” exist in a set or multiset? Data set may be very big or expensive to access. Filter lookup questions with.
Codes with local decoding procedures Sergey Yekhanin Microsoft Research.
1 The Mystery of Cooperative Web Caching 2 b b Web caching : is a process implemented by a caching proxy to improve the efficiency of the web. It reduces.
Efficient Consistency Proofs for Generalized Queries on a Committed Database R. Ostrovsky C. Rackoff A. Smith UCLA Toronto.
Introduction - The Need for Data Structures Data structures organize data –This gives more efficient programs. More powerful computers encourage more complex.
Create Forms Lesson 5. Software Orientation Creating Forms A form is a database object –enter, edit, or display data from a table or query Providing.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Privacy Preserving Query Processing in Cloud Computing Wen Jie
Cryptography Lecture 8 Stefan Dziembowski
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Secure Incremental Maintenance of Distributed Association Rules.
CS212: DATA STRUCTURES Lecture 10:Hashing 1. Outline 2  Map Abstract Data type  Map Abstract Data type methods  What is hash  Hash tables  Bucket.
A Linear Lower Bound on the Communication Complexity of Single-Server PIR Weizmann Institute of Science Israel Iftach HaitnerJonathan HochGil Segev.
On the Practical Feasibility of Secure Distributed Computing A Case Study Gregory Neven, Frank Piessens, Bart De Decker Dept. of Computer Science, K.U.Leuven.
Private Keyword Search on Streaming Data Rafail Ostrovsky William Skeith UCLA (patent pending)
How to Update Documents Verifiably in Searchable Symmetric Encryption Kaoru Kurosawa and Yasuhiro Ohtaki Ibaraki University, Japan.
CH1. Hardware: CPU: Ex: compute server (executes processor-intensive applications for clients), Other servers, such as file servers, do some computation.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Spatial Issues in DBGlobe Dieter Pfoser. Location Parameter in Services Entering the harbor (x,y position)… …triggers information request.
Chapter 10 Hashing. The search time of each algorithm depend on the number n of elements of the collection S of the data. A searching technique called.
Algebraic Lower Bounds for Computing on Encrypted Data Rafail Ostrovsky William E. Skeith III.
多媒體網路安全實驗室 Practical Searching Over Encrypted Data By Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: GLOBECOM 2010, 2010 IEEE.
Public Key Encryption with Keyword Search
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
JORGE DIAZ PORRAS,FRANCISCO GARZA,NESTOR DOMINGUEZ.
Presented By Amarjit Datta
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Private Information Retrieval Based on the talk by Yuval Ishai, Eyal Kushilevitz, Tal Malkin.
CSCI 6962: Server-side Design and Programming Shopping Carts and Databases.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Second Price Auctions A Case Study of Secure Distributed Computing Bart De Decker Gregory Neven Frank Piessens Erik Van Hoeymissen.
Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System Source: Pairing 2007, LNCS 4575, pp.2-22, 2007 Author: Yong.
K. Salah1 Security Protocols in the Internet IPSec.
CHAPTER 51 LINKED LISTS. Introduction link list is a linear array collection of data elements called nodes, where the linear order is given by means of.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
SSE-2 Step1: keygen(1 k ):s {0,1} k,output K=s Step2:Buildindex(K,D): 建立 table T, p=word bit+max bit R 假設 w 1 出現在 D 1,D 3 T[π s (w 1 ||1)]=D 1 T[π s (w.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Searchable Encryption in Cloud
OUTLINE Basic ideas of traditional retrieval systems
Presentation transcript:

Public Key Encryption that Allows PIR Queries Dan Boneh 、 Eyal Kushilevitz 、 Rafail Ostrovsky and William E. Skeith Crypto 2007

Private Information Retrieval (PIR) x=x 1,x 2,..., x n {0,1} n SERVER i {1,…n} xixi USER ij ? n

PIR allows a user to retrieve an item from a server in possession of a database without revealing which item she is retrieving. existing PIR solutions –retrieving a (plain or encrypted) record of the database by address –search by keyword in a non-encrypted data

Query Answer

Outline Introduction Tools: –Bloom Filter –Modifying Encrypted Data in a Communication Efficient Way Definition Main Construction

Introduction Interesting in: –communication-efficient –complete privacy. Technique: –Receiver: creates a public key. –Sender: message M is accompanied by an “encoded” list of keywords.

Bloom Filters Basic idea: h 1 (a) h 2 (a) h 3 (a) h k (a) T … … … … … 23456m … 011 Suppose

Bloom Filters (cont.) What to store : –certain element is in a set – value which are associated to the element in the set. Definition. As same to above. But together with a collection of sets,,where. Then to insert a pair (a, v) into this structure, v is added to for all. The set of values associated with is simply.

h 1 (a 1 ) h 2 (a 2 ) h k (a k ) Insert (a 1, v 1 ) then (a 2, v 2 ) … check V1V1 V1 B1B1 B2B2 B3B3 BmBm ……. V 1, V 2 V1V1 V2V2 V3V3 V 2, V 3 V 1, V 3 h 1 (a 1 ) h 2 (a 2 ) h k (a k ) ……. {V 1, V 2 } {V 1 } {V 1, V 3 } ∩ ∩ || V1V1

Modifying Encrypted Data in a Communication Efficient Way Based on group homomorphic encryption with communication O(√n). Technique : – : database (not encrypted) –(i*,j*): the position of particular element –α: the value we want to add. –v, w: two vector of length √n where –Here δ kl = 1 when k=l and 0 otherwise –Then

Modifying Encrypted Data in a Communication Efficient Way (cont.) Parameters: –(K, E, D): a CPA-secure public-key encryption – : an array of ciphertexts which is held by a party S. –Define F(X, Y, Z)=X+YZ. By our assumption, there exists some such that

Modifying Encrypted Data in a Communication Efficient Way (cont.) Protocol: Modify U,S (l, α) where l and α are private input to U. 1.U compute i *, j * as the coordinates of l (i.e., i * and j * are quotient and remainder of l/n, respectively) 2.U sends to S where all values are encrypted under A public. 3.S computes for all, and replaces each c ij with the corresponding resulting ciphertext.

Definition Parameters: –X: message sending parties. –Y: message receiving party. –S: server/storage provider. Definition 1:probabilistic polynomial time algorithms and protocols: –KeyGen(1 S ) –Send X,S (M, K, A public ) –Retrieve Y,S (w, A private )

Main Construction S maintains in its storage space encryptions of the buffers, denote these encryptions For, we defined KeyGen(k) :Run K(1 s ), generate A public and A private.

Send X,S (M, K, A public ) Storage ProviderSender Message Buffer Bloom Filter Buffer ρ ρ γ copies of the address ρ ρ ρ ρ ρ Modify X,S (x, α)

Retrieve Y,S (w, A private ) ReceiverStorage Provider PIR Query Message Buffer Bloom Filter Buffer PIR Query Modify y,S (x, α)