2019
DOI: 10.2478/popets-2019-0062
|View full text |Cite
|
Sign up to set email alerts
|

Security-Efficiency Tradeoffs in Searchable Encryption

Abstract: Besides their security, the efficiency of searchable encryption schemes is a major criteria when it comes to their adoption: in order to replace an unencrypted database by a more secure construction, it must scale to the systems which rely on it. Unfortunately, the relationship between the efficiency and the security of searchable encryption has not been widely studied, and the minimum cost of some crucial security properties is still unclear. In this paper, we present new lower bounds on the trade-offs betwee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 40 publications
0
7
0
Order By: Relevance
“…decrypting the results obtained from the server. Algorithm 3, specifically lines (25)(26)(27), is employed for the decryption process. Subsequently, the client generates a filter line (25)(26)(27) to identify and retain the values that were added, ensuring that only those additions and not the deleted values persist within the designated group ID 1 .…”
Section: Plos Onementioning
confidence: 99%
See 2 more Smart Citations
“…decrypting the results obtained from the server. Algorithm 3, specifically lines (25)(26)(27), is employed for the decryption process. Subsequently, the client generates a filter line (25)(26)(27) to identify and retain the values that were added, ensuring that only those additions and not the deleted values persist within the designated group ID 1 .…”
Section: Plos Onementioning
confidence: 99%
“…Algorithm 3, specifically lines (25)(26)(27), is employed for the decryption process. Subsequently, the client generates a filter line (25)(26)(27) to identify and retain the values that were added, ensuring that only those additions and not the deleted values persist within the designated group ID 1 . After decryption, the plaintext data and current Con are returned to the server for storage in the hash table S r .…”
Section: Plos Onementioning
confidence: 99%
See 1 more Smart Citation
“…For now, we note that it involves buffering O (W ) updates on the client side before pushing them to the server, where W is an upper bound on the number of searchable keywords. It was proved in [10] that single-round forward-secure SSE requires Ω(W ) client storage. As a consequence, the new buffer does not increase client storage beyond a constant factor 3 .…”
Section: Our Contributionsmentioning
confidence: 99%
“…Recall that our scheme uses W bins, each of capacity one page. As noted in the introduction, single-round forward-secure SSE requires Ω(W ) client storage [10]. If we buffer W updates on the client before pushing them to the server, we can afford to scan all W bins.…”
Section: Technical Overviewmentioning
confidence: 99%