• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Parallel and Dynamic Searchable Symmetric Encryption

Cached

  • Download as a PDF

Download Links

  • [www.research.microsoft.com]
  • [research.microsoft.com]
  • [eprint.iacr.org]
  • [research.microsoft.com]
  • [eprint.iacr.org]
  • [eprint.iacr.org]
  • [eprint.iacr.org]
  • [www.ece.umd.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Seny Kamara , Charalampos Papamanthou
Citations:51 - 4 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Kamara_paralleland,
    author = {Seny Kamara and Charalampos Papamanthou},
    title = {Parallel and Dynamic Searchable Symmetric Encryption},
    year = {}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Abstract. Searchable symmetric encryption (SSE) enables a client to outsource a collection of encrypted documents in the cloud and retain the ability to perform keyword searches without revealing information about the contents of the documents and queries. Although efficient SSE constructions are known, previous solutions are highly sequential. This is mainly due to the fact that, currently, the only method for achieving sub-linear time search is the inverted index approach (Curtmola, Garay, Kamara and Ostrovsky, CCS ’06) which requires the search algorithm to access a sequence of memory locations, each of which is unpredictable and stored at the previous location in the sequence. Motivated by advances in multi-core architectures, we present a new method for constructing sub-linear SSE schemes. Our approach is highly parallelizable and dynamic. With roughly a logarithmic number of cores in place, searches for a keyword w in our scheme execute in o(r) parallel time, where r is the number of documents containing keyword w (with more cores, this bound can go down to O(log n), i.e., independent of the result size r). Such time complexity outperforms the optimal Θ(r) sequential search time—a similar bound holds for the updates. Our scheme also achieves the following important properties: (a) it enjoys a strong notion of security, namely security against adaptive chosen-keyword attacks; (b) compared to existing sub-linear dynamic SSE schemes (e.g., Kamara, Papamanthou, Roeder, CCS ’12), updates in our scheme do not leak any information, apart from information that can be inferred from previous search tokens; (c) it can be implemented efficiently in external memory (with logarithmic I/O overhead). Our technique is simple and uses a red-black tree data structure; its security is proven in the random oracle model. 1

Keyphrases

dynamic searchable symmetric encryption    random oracle model    strong notion    result size    similar bound    scheme execute    keyword search    time complexity    multi-core architecture    previous solution    logarithmic number    encrypted document    sub-linear sse scheme    memory location    efficient sse construction    red-black tree data structure    sub-linear time search    new method    previous search token    adaptive chosen-keyword attack    searchable symmetric encryption    previous location    search algorithm    sub-linear dynamic sse scheme    external memory    sequential search time    following important property    inverted index approach    parallel time   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University