Efficient Private Conjunctive Query Protocol Over Encrypted Data

被引:1
|
作者
Saha, Tushar Kanti [1 ]
Koshiba, Takeshi [2 ]
机构
[1] Jatiya Kabi Kazi Nazrul Islam Univ, Dept Comp Sci & Engn, Trishal 2224, Mymensingh, Bangladesh
[2] Waseda Univ, Fac Educ & Integrated Arts & Sci, Tokyo 1698050, Japan
关键词
private conjunctive query; encrypted data; packing method; homomorphic encryption;
D O I
10.3390/cryptography5010002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conjunctive queries play a key role in retrieving data from a database. In a database, a query containing many conditions in its predicate, connected by an "and/&/Lambda" operator, is called a conjunctive query. Retrieving the outcome of a conjunctive query from thousands of records is a heavy computational task. Private data access to an outsourced database is required to keep the database secure from adversaries; thus, private conjunctive queries (PCQs) are indispensable. Cheon, Kim, and Kim (CKK) proposed a PCQ protocol using search-and-compute circuits in which they used somewhat homomorphic encryption (SwHE) for their protocol security. As their protocol is far from being able to be used practically, we propose a practical batch private conjunctive query (BPCQ) protocol by applying a batch technique for processing conjunctive queries over an outsourced database, in which both database and queries are encoded in binary format. As a main technique in our protocol, we develop a new data-packing method to pack many data into a single polynomial with the batch technique. We further enhance the performances of the binary-encoded BPCQ protocol by replacing the binary encoding with N-ary encoding. Finally, we compare the performance to assess the results obtained by the binary-encoded BPCQ protocol and the N-ary-encoded BPCQ protocol.
引用
收藏
页码:1 / 28
页数:28
相关论文
共 50 条
  • [31] Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud
    Li, Meng
    Gao, Jianbo
    Zhu, Liehuang
    Zhang, Zijian
    Lal, Chhagan
    Conti, Mauro
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (03) : 1239 - 1251
  • [32] Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data
    Zhang, Songnian
    Ray, Suprio
    Lu, Rongxing
    Guan, Yunguo
    Zheng, Yandong
    Shao, Jun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3770 - 3786
  • [33] PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Guan, Yunguo
    Wang, Fengwei
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4387 - 4402
  • [34] Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud
    Cheng, Xiang
    Su, Sen
    Teng, Yiping
    Xiao, Ke
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3205 - 3218
  • [35] Efficient and Secure Spatial Range Query over Large-scale Encrypted Data
    Miao, Yinbin
    Xu, Chao
    Zheng, Yifeng
    Liu, Ximeng
    Meng, Xiangdong
    Deng, Robert H.
    2023 IEEE 43RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS, 2023, : 271 - 281
  • [36] Efficient multi-keyword ranked query over encrypted data in cloud computing
    Li, Ruixuan
    Xu, Zhiyong
    Kang, Wanshang
    Yow, Kin Choong
    Xu, Cheng-Zhong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 179 - 190
  • [37] Efficient conjunctive keyword search over encrypted electronic medical records
    Zhang L.-L.
    Zhang Y.-Q.
    Liu X.-F.
    Quan H.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 (06): : 1577 - 1591
  • [38] Efficient Conjunctive Keywords Search over Encrypted E-Mail Data in Public Key Setting
    Zhang, Yu
    Li, Yin
    Wang, Yifan
    APPLIED SCIENCES-BASEL, 2019, 9 (18):
  • [39] Fast query over encrypted character data in database
    Wang, ZF
    Dai, J
    Wang, W
    Shi, BL
    COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 1027 - 1033
  • [40] A novel approach for query over encrypted data in database
    Al-Saraireh J.
    International Journal of Information and Computer Security, 2019, 11 (06) : 621 - 636