Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2013
DOI: 10.1007/978-3-642-40041-4_20
|View full text |Cite
|
Sign up to set email alerts
|

Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries

Abstract: Abstract. This work presents the design and analysis of the first searchable symmetric encryption (SSE) protocol that supports conjunctive search and general Boolean queries on outsourced symmetricallyencrypted data and that scales to very large databases and arbitrarilystructured data including free text search. To date, work in this area has focused mainly on single-keyword search. For the case of conjunctive search, prior SSE constructions required work linear in the total number of documents in the databas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
660
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 596 publications
(661 citation statements)
references
References 17 publications
(33 reference statements)
0
660
0
1
Order By: Relevance
“…Secure computations on binary decision trees were introduced in [8], yet they have long execution time due to the use of the IBM HElib library. Searching an encrypted database was previeously addressed by [4], [6], [7], [14]. One drawback in [4], [6] was the need for a special key to aid the server in performing the search request.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Secure computations on binary decision trees were introduced in [8], yet they have long execution time due to the use of the IBM HElib library. Searching an encrypted database was previeously addressed by [4], [6], [7], [14]. One drawback in [4], [6] was the need for a special key to aid the server in performing the search request.…”
Section: Related Workmentioning
confidence: 99%
“…Our data-classifier takes the idea of PIR one step forward, it homomorphically computes on the encrypted data retrieved by the PIR to obtain useful pieces of information. Other PIR constructions [2], [10], [19], [21], [31], [44] cannot implement data-classifiers the way we do because they either: (a) cannot compute with the PIR responses, or, (b) their plaintext field is only mod 2 (or modulo a small prime, for efficiency purposes) and thus they cannot do integer addition as required by (14). Our HE on the other hand has the advantage of being able to use the full modulo-q domain for plaintext additions.…”
Section: Homomorphic Spam Filtermentioning
confidence: 99%
“…Some notable examples of work along this direction is the CryptDB system of Popa et al [23], and recent works on searchable symmetric encryption due to Pappas et al [22] Cash et al [4], and Jarecki et al [17].…”
Section: Previous and Concurrent Workmentioning
confidence: 99%
“…When using the two-ORAM solution, we can often use plain ORAM for the data without the secure-computation layer above it. 4 The reason is that for many ORAM protocols (including path-ORAM), the entire view of the client during the access protocol is uniquely determined by the results of all queries to date, so nothing new is leaked to the client during access to the data ORAM.…”
Section: A Extending the Architecturementioning
confidence: 99%
“…Several works on multi-keyword search that enable conjunctive and disjunctive search options exist [11][12][13][14], but these schemes incur large overhead in computation and communication costs. A recent work by Cash et al [15] introduces a searchable encryption scheme that supports multi-keyword search operation over encrypted database. While due to scalability the scheme is suitable for big data applications, it does not allow to rank the responses based on their relevancy to a given query.…”
Section: Related Workmentioning
confidence: 99%