2019 38th Symposium on Reliable Distributed Systems (SRDS) 2019
DOI: 10.1109/srds47363.2019.00021
|View full text |Cite
|
Sign up to set email alerts
|

BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage

Abstract: The prevalence and availability of cloud infrastructures has made them the de facto solution for storing and archiving data, both for organizations and individual users. Nonetheless, the cloud's wide spread adoption is still hindered by dependability and security concerns, particularly in applications with large data collections where efficient search and retrieval services are also major requirements. This leads to an increased tension between security, efficiency, and search expressiveness, which current sta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…In the companion technical report to the first version of BISEN [21], we provide a full security proof of these statements in the real/ideal standard cryptographic model [29]. The proof of this design is very similar, which we omit to avoid redundancy.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In the companion technical report to the first version of BISEN [21], we provide a full security proof of these statements in the real/ideal standard cryptographic model [29]. The proof of this design is very similar, which we omit to avoid redundancy.…”
Section: Security Analysismentioning
confidence: 99%
“…The work presented in this paper was first introduced in [22]. In this version, we additionally propose to extend the traditional SSE model to support filter functions on conjunctive and disjunctive queries based on metadata created by the users.…”
Section: Introductionmentioning
confidence: 99%
“…Our scheme takes the advantages of both worlds and supports verifiability in dynamic settings. Recently, several papers have provided elegant solutions for verifiability and dynamism, with forward secrecy [27] and potentially via trusted hardware [28]. While the existing schemes perform modification as 'delete-then-add', our scheme supports it directly, thus more efficiently.…”
Section: Verifiable Ssementioning
confidence: 99%
“…However, it forces queries to be in Conjunctive Normal Form and not supporting negations. Bernardo's 11 method BISEN supports arbitrarily complex boolean queries, verifiability to malicious users, and minimal leakage. However, it uses the te chnology of trusted regions.…”
Section: Introductionmentioning
confidence: 99%