Efficient Private Conjunctive Query Protocol Over Encrypted Data

被引:1
|
作者
Saha, Tushar Kanti [1 ]
Koshiba, Takeshi [2 ]
机构
[1] Jatiya Kabi Kazi Nazrul Islam Univ, Dept Comp Sci & Engn, Trishal 2224, Mymensingh, Bangladesh
[2] Waseda Univ, Fac Educ & Integrated Arts & Sci, Tokyo 1698050, Japan
关键词
private conjunctive query; encrypted data; packing method; homomorphic encryption;
D O I
10.3390/cryptography5010002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conjunctive queries play a key role in retrieving data from a database. In a database, a query containing many conditions in its predicate, connected by an "and/&/Lambda" operator, is called a conjunctive query. Retrieving the outcome of a conjunctive query from thousands of records is a heavy computational task. Private data access to an outsourced database is required to keep the database secure from adversaries; thus, private conjunctive queries (PCQs) are indispensable. Cheon, Kim, and Kim (CKK) proposed a PCQ protocol using search-and-compute circuits in which they used somewhat homomorphic encryption (SwHE) for their protocol security. As their protocol is far from being able to be used practically, we propose a practical batch private conjunctive query (BPCQ) protocol by applying a batch technique for processing conjunctive queries over an outsourced database, in which both database and queries are encoded in binary format. As a main technique in our protocol, we develop a new data-packing method to pack many data into a single polynomial with the batch technique. We further enhance the performances of the binary-encoded BPCQ protocol by replacing the binary encoding with N-ary encoding. Finally, we compare the performance to assess the results obtained by the binary-encoded BPCQ protocol and the N-ary-encoded BPCQ protocol.
引用
收藏
页码:1 / 28
页数:28
相关论文
共 50 条
  • [41] Adaptively Secure and Fast Processing of Conjunctive Queries Over Encrypted Data
    Li, Rui
    Liu, Alex X.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (04) : 1588 - 1602
  • [42] Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query
    Guo, Cheng
    Li, Wenfeng
    Tang, Xinyu
    Choo, Kim-Kwang Raymond
    Liu, Yining
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 746 - 763
  • [43] PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud
    Zheng, Yandong
    Zhu, Hui
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Wang, Fengwei
    Shao, Jun
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2030 - 2045
  • [44] EPSet: Efficient and Privacy-Preserving Set Similarity Range Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Shao, Jun
    Wang, Fengwei
    Zhu, Hui
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (02) : 524 - 536
  • [45] Efficient and secure multi-dimensional geometric range query over encrypted data in cloud
    Li, Xingxin
    Zhu, Youwen
    Wang, Jian
    Zhang, Ji
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 131 : 44 - 54
  • [46] Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2501 - 2516
  • [47] Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
    Jiang, Shunrong
    Zhu, Xiaoyan
    Guo, Linke
    Liu, Jianqing
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [48] A k-NN Query Method Over Encrypted Data
    Zhang, Zhiqiang
    Xin, Lijie
    Xie, Xiaoqin
    Pan, Haiwei
    PROCEEDINGS OF THE 2018 IEEE 22ND INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN ((CSCWD)), 2018, : 164 - 171
  • [49] Multi-dimensional range query over encrypted data
    Shi, Elaine
    Bethencourt, John
    Chan, T-H. Hubert
    Song, Dawn
    Perrig, Adrian
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 350 - +
  • [50] Query-Biased Preview over Outsourced and Encrypted Data
    Peng, Ningduo
    Luo, Guangchun
    Qin, Ke
    Chen, Aiguo
    SCIENTIFIC WORLD JOURNAL, 2013,