Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations

被引:66
|
作者
Asharov, Gilad [1 ]
Naor, Moni [2 ]
Segev, Gil [3 ]
Shahaf, Ido [3 ]
机构
[1] IBM TJ Watson Res Ctr, Yorktown Hts, NY 10598 USA
[2] Weizmann Inst Sci, Rehovot, Israel
[3] Hebrew Univ Jerusalem, Jerusalem, Israel
基金
美国国家科学基金会; 以色列科学基金会;
关键词
Cryptography; searchable encryption; balanced allocations;
D O I
10.1145/2897518.2897562
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Searchable symmetric encryption (SSE) enables a client to store a database on an untrusted server while supporting keyword search in a secure manner. Despite the rapidly increasing interest in SSE technology, experiments indicate that the performance of the known schemes scales badly to large databases. Somewhat surprisingly, this is not due to their usage of cryptographic tools, but rather due to their poor locality (where locality is defined as the number of noncontiguous memory locations the server accesses with each query). The only known schemes that do not suffer from poor locality suffer either from an impractical space overhead or from an impractical read efficiency (where read efficiency is defined as the ratio between the number of bits the server reads with each query and the actual size of the answer). We construct the first SSE schemes that simultaneously enjoy optimal locality, optimal space overhead, and nearly optimal read efficiency. Specifically, for a database of size N, under the modest assumption that no keyword appears in more than N1-1/log (logN) documents, we construct a scheme with read efficiency 0 (log log N). This essentially matches the lower bound of Cash and Tessaro (EUROCRYPT '14) showing that any SSE scheme must be sub-optimal in either its locality, its space overhead, or its read efficiency. In addition, even without making any assumptions on the structure of the database, we construct a scheme with read efficiency (O) over tilde (log N). Our schemes are obtained via a two-dimensional generalization of the classic balanced allocations ("balls and bins") problem that we put forward. We construct nearly-optimal two-dimensional balanced allocation schemes, and then combine their algorithmic structure with subtle cryptographic techniques.
引用
收藏
页码:1101 / 1114
页数:14
相关论文
共 50 条
  • [31] Two-dimensional antisymmetric linear phase filter bank construction using symmetric completion
    Lei, Zhang
    Makur, Anamitra
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2007, 54 (01) : 57 - 60
  • [32] Relativistic fermion in a spherically symmetric potential well of finite depth in a two-dimensional space
    V. Yu. Ananchenko
    A. V. Sushchevskii
    M. Sh. Pevzner
    D. V. Kholod
    Russian Physics Journal, 2012, 54 : 1256 - 1263
  • [33] RELATIVISTIC FERMION IN A SPHERICALLY SYMMETRIC POTENTIAL WELL OF FINITE DEPTH IN A TWO-DIMENSIONAL SPACE
    Ananchenko, V. Yu.
    Sushchevskii, A. V.
    Pevzner, M. Sh.
    Kholod, D. V.
    RUSSIAN PHYSICS JOURNAL, 2012, 54 (11) : 1256 - 1263
  • [34] Robust Two-Dimensional Linear Discriminant Analysis via Information Divergence
    Zhang, Lei
    Liang, Zhizheng
    NEURAL PROCESSING LETTERS, 2020, 52 (03) : 2513 - 2535
  • [35] Robust Two-Dimensional Linear Discriminant Analysis via Information Divergence
    Lei Zhang
    Zhizheng Liang
    Neural Processing Letters, 2020, 52 : 2513 - 2535
  • [36] On the stabilizability of two-dimensional linear systems via switched output feedback
    Santarelli, KR
    Megretski, A
    Dahleh, MA
    ACC: Proceedings of the 2005 American Control Conference, Vols 1-7, 2005, : 3778 - 3783
  • [37] Stabilizability of two-dimensional linear systems via switched output feedback
    Santarelli, K. R.
    Megretski, A.
    Dahleh, M. A.
    SYSTEMS & CONTROL LETTERS, 2008, 57 (03) : 228 - 235
  • [38] Fuzzing File Systems via Two-Dimensional Input Space Exploration
    Xu, Wen
    Moon, Hyungon
    Kashyap, Sanidhya
    Tseng, Po-Ning
    Kim, Taesoo
    2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 818 - 834
  • [39] Fuzzing SMT Solvers via Two-Dimensional Input Space Exploration
    Yao, Peisen
    Huang, Heqing
    Tang, Wensheng
    Shi, Qingkai
    Wu, Rongxin
    Zhang, Charles
    ISSTA '21: PROCEEDINGS OF THE 30TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, 2021, : 322 - 335
  • [40] A Novel Image Encryption Algorithm Based on Compressive Sensing and a Two-Dimensional Linear Canonical Transform
    Li, Yuan-Min
    Jiang, Mingjie
    Wei, Deyun
    Deng, Yang
    FRACTAL AND FRACTIONAL, 2024, 8 (02)