Download presentation
Presentation is loading. Please wait.
1
Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍
2
Outline Motivating Scenario and model of document Conjunctive Keyword Searchable Encryption (CKSE) Definition Assumption Construction Reference
3
Motivating Scenario Alice has a large amount of data Which is private Which she wants to access any time and from anywhere Example: emails Alice stores her data on a remote server Good connectivity Low administration overhead Cheaper cost of storage But untrusted
4
Alice may not trust the server Data must be stored encrypted Alice wants ability to search her data Keyword search: “All emails from Bob” Alice wants powerful, efficient search She wants to ask conjunctive queries E.g. ask for “All emails from Bob AND received last Sunday”
5
Single keyword search Limited to queries for a single keyword Can’t do boolean combinations of queries Example: “emails from Bob AND (received last week OR urgent)” We focus on conjunctive queries Documents D i which contains keywords W 1 and W 2 … and W n More restrictive than full boolean combinations
6
Model of Documents We assume structured documents where keywords are organized by fields AliceBob06/01/2004Urgent AliceCharlie05/28/2004Secret ………… DaveAlice06/04/2004Non-urgent From To Date Status m fields n docs D1D1 D2D2 DnDn The documents are the rows of the matrix D i = (W i, 1, …, W i, m ) J i
7
Outline Motivating Scenario and model of document Conjunctive Keyword Searchable Encryption (CKSE) Definition Assumption Construction
8
Definition Bilinear Map a map is a bilinear map if the following conditions hold : (1) and are cyclic groups of the same prime order p and is effocoently computable; (2) For all and then (3) is non-degenerate. That is, if generates and generates, the generates
9
Assumptions There is m keyword fields for each document. There never exists the same keyword in two different keyword fields. This is fulfilled by adding each keyword with its field name. example: ”From:Bob”&”To:Bob” Every keyword field is defined for every document. A simple way for requirement is to associate a NULL keyword with each empty field. example: “Status:NULL”
10
CKSE algorithm: keyGen run by the user to setup the scheme take a security parameter group and of a prime order p, where is kept in private. return a secret key
11
Search on Encrypted Data Alice Storage Server D 1, D 2, …, D n C 1,C 2,…C i Encryption(K,D i ) Later, Alice wants to retrieve only some of documents containing some specific keywords. Trapdoor(K,{j1,..},{W1,…}) Test(T, C i ) = True if Ci contains W Test(T,C i ) = False otherwise Alice decrypts Ci
12
Enc run by the user to generate searchable ciphertxts take a secret key and a document. Let for Let be a value chosen uniformly at random from return a ciphertext
13
Trapdoor run by the user to generate a trapdoor take a secret key,keyword field Indices and keywords as inputs.Let be a value chosen uniformly at random from return a trapdoor vale
14
Test run by the server in order to search for the documents containing some specific keywords take a Trapdoor and a ciphertext Let and For all,the algorithm checks if the following equality holds: If so, it return true. Otherwise, it return false
15
Example AliceBob06/01/2004Urgent AliceCharlie05/28/2004Secret ………… DaveAlice06/04/2004Non-urgent FROM To DataStatues 假設 找 “Alice” “Bob” User 使用 Trapdoor
16
return 又......
17
假設 令 a+b=c 又 所以 return document D1
18
References Efficient Conjunctive Keyword-Searchable Encryption Secure Conjunctive Keyword Search Over Encrypted Data
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.