Efficient Private Conjunctive Query Protocol Over Encrypted Data

被引:1
|
作者
Saha, Tushar Kanti [1 ]
Koshiba, Takeshi [2 ]
机构
[1] Jatiya Kabi Kazi Nazrul Islam Univ, Dept Comp Sci & Engn, Trishal 2224, Mymensingh, Bangladesh
[2] Waseda Univ, Fac Educ & Integrated Arts & Sci, Tokyo 1698050, Japan
关键词
private conjunctive query; encrypted data; packing method; homomorphic encryption;
D O I
10.3390/cryptography5010002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conjunctive queries play a key role in retrieving data from a database. In a database, a query containing many conditions in its predicate, connected by an "and/&/Lambda" operator, is called a conjunctive query. Retrieving the outcome of a conjunctive query from thousands of records is a heavy computational task. Private data access to an outsourced database is required to keep the database secure from adversaries; thus, private conjunctive queries (PCQs) are indispensable. Cheon, Kim, and Kim (CKK) proposed a PCQ protocol using search-and-compute circuits in which they used somewhat homomorphic encryption (SwHE) for their protocol security. As their protocol is far from being able to be used practically, we propose a practical batch private conjunctive query (BPCQ) protocol by applying a batch technique for processing conjunctive queries over an outsourced database, in which both database and queries are encoded in binary format. As a main technique in our protocol, we develop a new data-packing method to pack many data into a single polynomial with the batch technique. We further enhance the performances of the binary-encoded BPCQ protocol by replacing the binary encoding with N-ary encoding. Finally, we compare the performance to assess the results obtained by the binary-encoded BPCQ protocol and the N-ary-encoded BPCQ protocol.
引用
收藏
页码:1 / 28
页数:28
相关论文
共 50 条
  • [1] Private Conjunctive Query over Encrypted Data
    Saha, Tushar Kanti
    Koshiba, Takeshi
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017, 2017, 10239 : 149 - 164
  • [2] ECQ: An Efficient Conjunctive Query Scheme over Encrypted Multidimensional Data in Smart Grid
    Wen, Mi
    Lu, Rongxing
    Lei, Jingshen
    Liang, Xiaohui
    Li, Hongwei
    Shen, Xuemin
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 796 - 801
  • [3] Adaptively Secure Conjunctive Query Processing over Encrypted Data for Cloud Computing
    Li, Rui
    Liu, Alex X.
    2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), 2017, : 697 - 708
  • [4] Achieving efficient conjunctive keyword searches over encrypted data
    Ballard, L
    Kamara, S
    Monrose, F
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 414 - 426
  • [5] POSTER: Efficient Method for Disjunctive and Conjunctive Keyword Search over Encrypted Data
    Zhang, Yu
    Lu, Songfeng
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1535 - 1537
  • [6] Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud
    Shao, Jun
    Lu, Rongxing
    Guan, Yunguo
    Wei, Guiyi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 124 - 137
  • [7] Private Key Based Query on Encrypted Data
    Afzali, Hammad
    Nemati, Hamed
    Azmi, Reza
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 4 (01): : 41 - 50
  • [8] Private Boolean Query Processing on Encrypted Data
    Do, Hoang Giang
    Ng, Wee Keong
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 321 - 332
  • [9] Efficient and Privacy-Preserving Eclipse Query over Encrypted Data
    Song, Weiyu
    Zhang, Yonggang
    Sun, Lili
    Zheng, Yandong
    Lu, Rongxing
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 1 - 6
  • [10] On query execution over encrypted data
    Baby, Tinu
    Cherukuri, Aswani Kumar
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (02) : 321 - 331