Advertisement

Distributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance

  • Huafei ZhuEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9565)

Abstract

In this paper, a construction of distributed multi-user, multi-key searchable encryptions is proposed and analyzed. Our scheme leverages a combination of the Shamir’s threshold secret key sharing, the Pohlig-Hellman function and the ElGamal encryption scheme to provide high reliability with limited storage overhead. It achieves the semantic security in the context of the keyword hiding, the search token hiding and the data hiding under the joint assumptions that the decisional Diffie-Hellman problem is hard and the pseudo-random number generator deployed is cryptographically strong.

Keywords

ElGamal encryption scheme Pohlig-Hellman function Searchable encryptions Shamir’s threshold secret key sharing 

References

  1. 1.
    Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private query on encrypted data in multi-user settings. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 71–85. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  2. 2.
    Barak, B., Halevi, S.: A model and architecture for pseudo-random generation with applications to dev random. In: ACM Conference on Computer and Communications Security, pp. 203–212 (2005)Google Scholar
  3. 3.
    Bellare, M., Boldyreva, A., O’Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535–552. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  4. 4.
    Bethencourt, J., Song, D.X., Waters, B.: New techniques for private stream searching. ACM Trans. Inf. Syst. Secur. 12(3), 16 (2009)CrossRefGoogle Scholar
  5. 5.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  8. 8.
    Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965–981 (1998)MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Cao, N., Wang, C., Li, M., et al.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)CrossRefGoogle Scholar
  10. 10.
    Curtmola, R., Garay, J.A., Kamara, S.: Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM Conference on Computer and Communications Security, pp. 79–88 (2006)Google Scholar
  11. 11.
    Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60(3), 592–629 (2000)MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Gathegi, J.N.: Clouding big data: information privacy considerations. In: Gathegi, J.N., Tonta, Y., Kurbanoğlu, S., Al, U., Taşkin, Z. (eds.) Challenges of Information Management Beyond the Cloud. Springer, Heidelberg (2014)CrossRefGoogle Scholar
  13. 13.
    Goh, E.-J.: Secure indexes. IACR Cryptology ePrint Archive, p. 216 (2003)Google Scholar
  14. 14.
    Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267–288. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  15. 15.
    Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: ACM Conference on Computer and Communications Security, pp. 965–976 (2012)Google Scholar
  16. 16.
    Hahn, F., Kerschbaum, F.: Searchable encryption with secure, efficient updates. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer, Communications Security. ACM, pp. 310–320 (2014)Google Scholar
  17. 17.
    López-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: STOC, pp. 1219–1234 (2012)Google Scholar
  18. 18.
    Liu, J.K., Au, M.H., Huang, X., Susilo, W., Zhou, J., Yu, Y.: New insight to preserve online survey accuracy and privacy in big data era. In: Kutyłowski, M., Vaidya, J. (eds.) ICAIS 2014, Part II. LNCS, vol. 8713, pp. 182–199. Springer, Heidelberg (2014)Google Scholar
  19. 19.
    Malkin, T.: Secure computation for big data. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 355–355. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  20. 20.
    Ostrovsky, R., Skeith, W.E.: Private searching on streaming data. J. Cryptology 20(4), 397–430 (2007)MathSciNetCrossRefzbMATHGoogle Scholar
  21. 21.
    Pappas, V., Raykova, M., Vo, B., Bellovin, S.M., Malkin, T.: Private search in the real world. In: ACSAC, pp. 83–92 (2011)Google Scholar
  22. 22.
    Popa, R.A., Zeldovich, N.: Multi-key searchable encryption. IACR Cryptology ePrint Archive, p. 508 (2013)Google Scholar
  23. 23.
    Popa, R., Stark, E., Helfer, J., Valdez, S., Zeldovich, N., Kaashoek, M.F., Balakrishnan, H.: Building web applications on top of encrypted data using mylar. In: NSDI (USENIX Symposium of Networked Systems Design and Implementation) (2014)Google Scholar
  24. 24.
    Orencik, C., Selcuk, A., Savas, E., et al.: Multi-Keyword search over encrypted data with scoring, search pattern obfuscation. Int. J. Inf. Secur. 1–19 (2015)Google Scholar
  25. 25.
    Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical report TR-81, Aiken Computation Laboratory, Harvard University (1981)Google Scholar
  26. 26.
    Raykova, M., Cui, A., Vo, B., Liu, B., Malkin, T., Bellovin, S.M., Stolfo, S.J.: Usable, secure, private search. IEEE Secur. Privacy 10(5), 53–60 (2012)CrossRefGoogle Scholar
  27. 27.
    Raykova, M., Vo, B., Bellovin, S.M., Malkin, T.: Secure anonymous database search. In: CCSW, pp. 115–126 (2009)Google Scholar
  28. 28.
    Samanthula, B.K., Elmehdwi, Y., Howser, G., Madria, S.: A secure data sharing and query processing framework via federation of cloud computing. Inf. Syst. 48, 196–212 (2015)CrossRefGoogle Scholar
  29. 29.
    Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy, pp. 44–55 (2000)Google Scholar
  30. 30.
    Tang, Y., Liu, L.: Privacy-preserving multi-keyword search in information networks (2015)Google Scholar
  31. 31.
    Yang, Y.: Towards multi-user private keyword search for cloud computing. In: IEEE CLOUD, pp. 758–759 (2011)Google Scholar
  32. 32.
    Yang, J.J., Li, J.Q., Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener. Comput. Syst. 43, 74–86 (2015)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.School of Computer and Computing ScienceZhejaing University City CollegeHangzhouChina

Personalised recommendations