scispace - formally typeset
Open AccessJournal ArticleDOI

Substring-Searchable Symmetric Encryption

Melissa Chase, +1 more
- Vol. 2015, Iss: 2, pp 263-281
Reads0
Chats0
TLDR
It is proved security of the substring-searchable encryption scheme against malicious adversaries, where the query protocol leaks limited information about memory access patterns through the suffix tree of the encrypted string.
Abstract
In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s. First, we formalize an encryption paradigm that we call queryable encryption, which generalizes searchable symmetric encryption (SSE) and structured encryption. Then, we construct a queryable encryption scheme for substring queries. Our construction uses suffix trees and achieves asymptotic efficiency comparable to that of unencrypted suffix trees. Encryption of a string of length n takes O(λn) time and produces a ciphertext of size O(λn), and querying for a substring of length m that occurs k times takes O(λm + k) time and three rounds of communication. Our security definition guarantees correctness of query results and privacy of data and queries against a malicious adversary. Following the line of work started by Curtmola et al. (ACM CCS 2006), in order to construct more efficient schemes we allow the query protocol to leak some limited information that is captured precisely in the definition. We prove security of our substring-searchable encryption scheme against malicious adversaries, where the query protocol leaks limited information about memory access patterns through the suffix tree of the encrypted string.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Searchable Symmetric Encryption: Designs and Challenges

TL;DR: This work seeks to address the gap in detail how SSE’s underlying structures are designed and how these result in the many properties of a SSE scheme, as well as presenting recent state-of-the-art advances on SSE.
Posted Content

SoK: Cryptographically Protected Database Search

TL;DR: In this paper, the authors identify the important primitive operations across database paradigms and evaluate the current state of protected search systems in implementing these base operations, and present a roadmap and tools for transforming a protected search system into a protected database.
Proceedings ArticleDOI

SoK: Cryptographically Protected Database Search

TL;DR: An evaluation of the current state of protected search systems and describes the main approaches and tradeoffs for each base operation, which puts protected search in the context of unprotected search, identifying key gaps in functionality.
Proceedings ArticleDOI

Privacy-preserving pattern matching over encrypted genetic data in cloud computing

TL;DR: This paper starts from a practical system model of the personalize medicine and presents a solution for the secure DNA sequence matching problem in cloud computing and proves that the scheme is secure under the well-defined cryptographic assumption, i.e., the sub-group decision assumption over a bilinear group.
Journal ArticleDOI

Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions

TL;DR: This paper surveys the state-of-the-art literature on cryptographic solutions designed to ensure the security and/or privacy in big data outsourcing and provides concrete examples to explain how these cryptographic solutions can be deployed.
References
More filters
Book ChapterDOI

Pseudorandom function tribe ensembles based on one-way permutations: improvements and applications

TL;DR: An alternative to the construction of pseudorandom function tribe ensembles based on oneway permutations given by Canetti, Micciancio and Reingold is presented and it is shown that the latter solution yields so-called committing private-key encryption schemes.
Book ChapterDOI

Text search protocols with simulation based security

TL;DR: This paper presents an efficient protocol for securely computing the fundamental problem of pattern matching in the two-party setting, where party P1 holds a pattern and party P2 holds a text, based on a novel protocol for secure oblivious automata evaluation.
Book ChapterDOI

Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation

TL;DR: This paper proposes a new protocol that requires only O (1) rounds and reduces the number of modular exponentiations to O (n ) without revealing any additional information, and has implemented both schemes.
Book ChapterDOI

How Efficient Can Memory Checking Be

TL;DR: This work shows that for checkers that access the remote storage in a deterministic and non-adaptive manner (as do all known memory checkers), their query complexity must be at least *** (logn /loglogn ).
Book ChapterDOI

An efficient protocol for oblivious DFA evaluation and applications

TL;DR: An efficient protocol for oblivious DFA evaluation between an input holder (client) and a DFA holder (server) and the most efficient version of this protocol only requires O(k) asymmetric operations by either party, where k is the security parameter.
Related Papers (5)