SSE-2 Step1: keygen(1 k ):s {0,1} k,output K=s Step2:Buildindex(K,D): 建立 table T, p=word bit+max bit R 假設 w 1 出現在 D 1,D 3 T[π s (w 1 ||1)]=D 1 T[π s (w.

Slides:



Advertisements
Similar presentations
Problems and Their Classes
Advertisements

Computational Privacy. Overview Goal: Allow n-private computation of arbitrary funcs. –Impossible in information-theoretic setting Computational setting:
Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
An Ω(n 1/3 ) Lower Bound for Bilinear Group Based Private Information Retrieval Alexander Razborov Sergey Yekhanin.
Foundations of Cryptography Lecture 11 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
Introduction to Practical Cryptography Lecture 9 Searchable Encryption.
1 Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions Reza Curtmola Juan Garay Seny Kamara Rafail Ostrovsky Johns Hopkins.
Searchable Symmetric Encryption :Improved Definitions and Efficient Constructions Reza Curtmola Juan Garay Seny Kamara Rafail Ostrovsky.
Foundations of Cryptography Lecture 12 Lecturer: Moni Naor.
Models and Security Requirements for IDS. Overview The system and attack model Security requirements for IDS –Sensitivity –Detection Analysis methodology.
1 Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
Perfect and Statistical Secrecy, probabilistic algorithms, Definitions of Easy and Hard, 1-Way FN -- formal definition.
Private Information Retrieval Benny Chor, Oded Goldreich, Eyal Kushilevitz and Madhu Sudan Journal of ACM Vol.45 No Reporter : Chen, Chun-Hua Date.
Daniel Moran & Marina Yatsina. Access control through encryption.
ACT1 Slides by Vera Asodi & Tomer Naveh. Updated by : Avi Ben-Aroya & Alon Brook Adapted from Oded Goldreich’s course lecture notes by Sergey Benditkis,
Introduction to Modern Cryptography, Lecture ?, 2005 Broadcast Encryption, Traitor Tracing, Watermarking.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
Reza Curtmola Juan Garay Seny Kamara Rafail Ostrovsky
1 How to securely outsource cryptographic computations Susan Hohenberger and Anna Lysyanskaya TCC2005.
On The Cryptographic Applications of Random Functions Oded Goldreich Shafi Goldwasser Silvio Micali Advances in Cryptology-CRYPTO ‘ 84 報告人 : 陳昱升.
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
Practical Techniques for Searches on Encrypted Data Author:Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀汶承.
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
1 Secure Indexes Author : Eu-Jin Goh Presented by Yi Cheng Lin.
1 Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor Weizmann Institute Omer Reingold AT&T Research.
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Foundations of Cryptography Lecture 10: Pseudo-Random Permutations and the Security of Encryption Schemes Lecturer: Moni Naor Announce home )deadline.
Public Key Encryption that Allows PIR Queries Dan Boneh 、 Eyal Kushilevitz 、 Rafail Ostrovsky and William E. Skeith Crypto 2007.
Cramer-Shoup is Plaintext Aware in the Standard Model Alexander W. Dent Information Security Group Royal Holloway, University of London.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
Foundations of Cryptography Rahul Jain CS6209, Jan – April 2011
Modeling (Chap. 2) Modern Information Retrieval Spring 2000.
Cryptography Lecture 8 Stefan Dziembowski
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
1 2. Independence and Bernoulli Trials Independence: Events A and B are independent if It is easy to show that A, B independent implies are all independent.
Fall 2004/Lecture 201 Cryptography CS 555 Lecture 20-b Zero-Knowledge Proof.
How to Update Documents Verifiably in Searchable Symmetric Encryption Kaoru Kurosawa and Yasuhiro Ohtaki Ibaraki University, Japan.
Foundations of Cryptography Lecture 6 Lecturer: Moni Naor.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Secure Computation (Lecture 5) Arpita Patra. Recap >> Scope of MPC > models of computation > network models > modelling distrust (centralized/decentralized.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
Game-based composition for key exchange Cristina Brzuska, Marc Fischlin (University of Darmstadt) Nigel Smart, Bogdan Warinschi, Steve Williams (University.
UC/Garbled Searchable Symmetric Encryption Kaoru Kurosawa Ibaraki University, Japan.
Ravello, Settembre 2003Indexing Structures for Approximate String Matching Alessandra Gabriele Filippo Mignosi Antonio Restivo Marinella Sciortino.
Public Key Encryption with Keyword Search
Presented By Amarjit Datta
CS555Spring 2012/Topic 71 Cryptography CS 555 Topic 7: Stream Ciphers and CPA Security.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
CS555Spring 2012/Topic 81 Cryptography CS 555 Topic 8: Pseudorandom Functions and CPA Security.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Topic 36: Zero-Knowledge Proofs
Cryptography Lecture 5 Arpita Patra © Arpita Patra.
Modern symmetric-key Encryption
based on slides by Debra Cook
B504/I538: Introduction to Cryptography
Topic 5: Constructing Secure Encryption Schemes
Topic 7: Pseudorandom Functions and CPA-Security
Soundness of Formal Encryption in the Presence of Key Cycles
Cryptography Lecture 5 Arpita Patra © Arpita Patra.
Cryptography Lecture 5.
Presentation transcript:

SSE-2 Step1: keygen(1 k ):s {0,1} k,output K=s Step2:Buildindex(K,D): 建立 table T, p=word bit+max bit R 假設 w 1 出現在 D 1,D 3 T[π s (w 1 ||1)]=D 1 T[π s (w 1 ||2)]=D 3 ………………………… T[π s (w 1 ||max)]=random value Max:the size of the largest plaintext document in D T[π s (w 1 ||1)] T[π s (w 1 ||2)] D1D1 D3D3 2p2p ……. random value

m=max ‧ n, n is the number of document in D m'= ∑ w i  △ ' |D(w i )| if m'< m, set value for the (m-m') entries Output I = T Step3:Trapdoor(w):output T w =(T w 1 …T w max ) =(π s (w||1),…, π s (w||max)) Step4:Search(I,T w ): for 1≤i≤max:retrieve id=T[T w i ] and output id T 大小 :{0,1} p * {0,1} log 2 (n) * m ( 作者算法 ) (π:{0,1} k * {0,1} p {0,1} p )

SSE model History: documents and keywords View: encrypted documents, index, trapdoors Trace: length of documents, search outcomes, search pattern

一些符號定義 Let △ = {w 1,...,w d } be a dictionary of d words, and 2 △ be the set of all possible documents. let D ⊆ 2 △ be a collection of n documents D = (D 1,...,D n ) and 2 2 △ be the set of all possible document collections. Let id(D) be the identifier of document D D(w) (the set of identifiers of documents containing w) as the outcome of a search for w and to the sequence (D(w 1 ),...,D(w n )) as the access pattern of a client

SSE-2 證明 定義 1(History):Let △ be a dictionary. A history H q, H q  2 2 △ × △ q, is an interaction between a client and a server over q queries. The partial history H q t  2 2 △ × △ t of a given history H q = (D, w 1,...,w q ), is the sequence H q t = (D, w 1,...,w t ), where t ≤ q.

定義 2(View):Let D be a collection of n documents and H q = (D, w 1,...,w q ) be a history over q queries. An adversary ’ s view of H q under secret key K is defined as V K (H q ) =(id(D 1 ),...,id(D n ),ε(D 1 ),...,ε(D n ),I D,T 1,...,T q ). The partial view V K t (H q ) of a history H q under secret key K is the sequence V K t (H q )=(id(D 1 ),...,id(D n ),ε(D 1 ),...,ε(D n ), I D,T 1,...,T t ), where t ≤ q.

定義 3(Trace):Let D be a collection of n documents and H q = (D, w 1,...,w q ) be a history over q queries. The trace of H q is the sequence Tr(H q ) = (id(D 1 ),...,id(D n ), |D 1 |,...,|D n |,D(w 1 ),...,D(w q ), ∏ q ). Note:∏ q can be a symmetric binary matrix where ∏ q [i,j]=1 if w i= w j and ∏ q [i,j]=0 otherwise,for 1 ≤ i,j ≤ q

定義 3.9(Adaptive Semantic Security for SSE). A SSE scheme is adaptively semantically secure if for all q  N and for all (non-uniform) probabilistic polynomial-time adversaries A, there exists a (non-uniform) probabilistic polynomial- time algorithm (the simulator) S such that for all traces Tr q of length q, all polynomially samplable distributions  q over {H q  2 2 △ × △ q : Tr(H q ) = Tr q } (i.e., the set of histories with trace Tr q ), all functions f : {0, 1} m → {0, 1} l(m) (where m =|H q | and l(m) = poly(m)), all 0 ≤ t ≤ q and all polynomials p and sufficiently large k:

where H q  q, K←Keygen(1 k ), and the probabilities are taken over H q and the internal coins of Keygen, A, S and the underlying BuildIndex algorithm. 定理.SSE-2 is an adaptively secure SSE scheme. Proof:The idea behind the proof is to describe a simulator that can simulate the partial view of an adversary given only the trace of a partial history.

Following the simulation-based approach of Definition 3.9, we describe a probabilistic polynomial-time simulator S such that for all q  N, all probabilistic polynomial-time adversaries A, all polynomially- bounded functions f, all distributions  q, given Tr(H q t ), S can simulate A(V K t (H q )) for all 0 ≤ t ≤ q with probability negligibly close to 1,where H q  q, K←Keygen(1 k ). More precisely, we show that, for all 0 ≤ t ≤ q, S(Tr(H q t )) can generate a view (V q t ) * such that (V q t ) * is indistinguishable from V K t (H q ).

In the SSE-2 construction, for each word, the labels in the word ’ s family(ex:F w ={w || j:1 ≤ j≤|D(w)|})are inserted into the index and each label appears in only one document. Searching for a word consists of searching for max labels in its family. Before proceeding further, we recall that the parameters of the pseudo-random permutation used to instantiate the scheme are known to S. Also, recall the notions of a view and of a trace in the context of the SSE-2 construction:

For a given q, the simulator must commit to an index before any queries are made, i.e. at time t = 0 the simulator generates an index I * that will be included in all partial views (V q t ) * used to simulate A, for all 0 ≤ t ≤ q. Note that although at time t = 0 the simulator has no knowledge about future queries, the index I * must be indistinguishable from a real index I D in V K t (H q ), for all 0 ≤ t ≤ q.

Also, for all 0 ≤ t ≤ q, the simulator includes in the partial view (V q t ) * the document identifiers (which it knows from the trace of the partial history Tr(H q 0 )) and ciphertexts obtained by generating random values (of size known from Tr(H q 0 )). It follows trivially that the identifiers and ciphertexts in (V q t ) * are indistinguishable from those in V K t (H q ), for all 0 ≤ t ≤ q. It then remains to show how S constructs the other elements in the view, namely the index and the trapdoors.

For t = 0, the simulator ’ s trace on the partial history Tr(H q 0 ) contains among other things, the identifiers of each document in the collection. S constructs (and includes in (V q 0 ) * ) the index I * as a ({0, 1} p × {0, 1} log2(n) × m) look-up table T *, where m = max · n and T * contains max copies of each document ’ s identifier inserted at random locations. S keeps a copy of I * in order to be able to simulate future partial views for 1 ≤ t ≤ q. Given the algorithm used to construct a real index I included in the partial view V K 0 (H q ), it is clear that I * is indistinguishable from I, otherwise one could distinguish between the output of and a random string of size p. Thus, (V q 0 ) * is indistinguishable from V k 0 (H q ).For 1 ≤ t ≤ q, the simulator includes in the partial view (V q t ) * the index I * which was computed for t = 0 and which was established above to be indistinguishable from a real index I in a partial view V K t (H q ).Recall that I * consists of a look-up table T * and that Tr(H q t ) contains the search pattern matrix ∏ for the t queries in Tr(H q t ).

We describe how S constructs the trapdoors (T 1 *,..., T t * ) included in (V q t ) *. S reuses the trapdoors (T 1 *,..., T t−1 * ) that were included in (V q t−1 ) * (We assume that S remembers (V q t−1 ) * and can reuse the trapdoors in it; alternatively, S can reconstruct these trapdoors from Tr(H q t−1 ), one by one in the same manner we will show how to construct T t * from D(w t ) and ∏). To construct T t *, S first checks if H q t−1 contains w t (by checking if ∏ tj = 1 for any 1 ≤ j ≤ t − 1). If negative, then for each label w t ||i, with 1 ≤ i ≤ max, S randomly picks an address addr i from T * such that T * [addr i ] = D(w t ||i), and constructs trapdoor T t * = (addr 1,..., addr max ).Also, S remembers the association between T t * and w t. Otherwise, if H q t−1 contains w t, then S retrieves the trapdoor associated with w t and assigns it to T t *.

This ensures that if H q t contains repeated words, the corresponding trapdoors included in (V q t ) * are identical. It ’ s easy to see that the trapdoors (T 1 *,..., T t * ) in (V q t ) * are indistinguishable from the trapdoors (T 1,..., T t ) in V K t (H q ), otherwise one could distinguish between the output of and a random string of size p. Thus, (V q t ) * is indistinguishable from V K t (H q ), for all 0 ≤ t ≤ q.