Presentation is loading. Please wait.

Presentation is loading. Please wait.

Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.

Similar presentations


Presentation on theme: "Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍."— Presentation transcript:

1 Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍

2 Outline Motivating Scenario and model of document Conjunctive Keyword Searchable Encryption (CKSE)  Definition  Assumption  Construction Reference

3 Motivating Scenario Alice has a large amount of data  Which is private  Which she wants to access any time and from anywhere  Example: emails Alice stores her data on a remote server  Good connectivity  Low administration overhead  Cheaper cost of storage  But untrusted

4 Alice may not trust the server  Data must be stored encrypted Alice wants ability to search her data  Keyword search: “All emails from Bob” Alice wants powerful, efficient search  She wants to ask conjunctive queries  E.g. ask for “All emails from Bob AND received last Sunday”

5 Single keyword search  Limited to queries for a single keyword  Can’t do boolean combinations of queries Example: “emails from Bob AND (received last week OR urgent)” We focus on conjunctive queries  Documents D i which contains keywords W 1 and W 2 … and W n  More restrictive than full boolean combinations

6 Model of Documents We assume structured documents where keywords are organized by fields AliceBob06/01/2004Urgent AliceCharlie05/28/2004Secret ………… DaveAlice06/04/2004Non-urgent From To Date Status m fields n docs D1D1 D2D2 DnDn The documents are the rows of the matrix D i = (W i, 1, …, W i, m ) J i

7 Outline Motivating Scenario and model of document Conjunctive Keyword Searchable Encryption (CKSE)  Definition  Assumption  Construction

8 Definition Bilinear Map a map is a bilinear map if the following conditions hold : (1) and are cyclic groups of the same prime order p and is effocoently computable; (2) For all and then (3) is non-degenerate. That is, if generates and generates, the generates

9 Assumptions There is m keyword fields for each document. There never exists the same keyword in two different keyword fields. This is fulfilled by adding each keyword with its field name. example: ”From:Bob”&”To:Bob” Every keyword field is defined for every document. A simple way for requirement is to associate a NULL keyword with each empty field. example: “Status:NULL”

10 CKSE algorithm: keyGen  run by the user to setup the scheme  take a security parameter  group and of a prime order p, where is kept in private.  return a secret key

11 Search on Encrypted Data Alice Storage Server D 1, D 2, …, D n C 1,C 2,…C i Encryption(K,D i ) Later, Alice wants to retrieve only some of documents containing some specific keywords. Trapdoor(K,{j1,..},{W1,…}) Test(T, C i ) = True if Ci contains W Test(T,C i ) = False otherwise Alice decrypts Ci

12 Enc  run by the user to generate searchable ciphertxts  take a secret key and a document. Let for Let be a value chosen uniformly at random from  return a ciphertext

13 Trapdoor  run by the user to generate a trapdoor  take a secret key,keyword field Indices and keywords as inputs.Let be a value chosen uniformly at random from  return a trapdoor vale

14 Test  run by the server in order to search for the documents containing some specific keywords  take a Trapdoor and a ciphertext Let and For all,the algorithm checks if the following equality holds: If so, it return true. Otherwise, it return false

15 Example AliceBob06/01/2004Urgent AliceCharlie05/28/2004Secret ………… DaveAlice06/04/2004Non-urgent FROM To DataStatues 假設 找 “Alice” “Bob” User 使用 Trapdoor

16 return 又......

17 假設 令 a+b=c 又 所以 return document D1

18 References Efficient Conjunctive Keyword-Searchable Encryption Secure Conjunctive Keyword Search Over Encrypted Data


Download ppt "Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍."

Similar presentations


Ads by Google