TY - GEN
T1 - Searchable symmetric encryption
T2 - 48th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2016
AU - Asharov, Gilad
AU - Naor, Moni
AU - Segev, Gil
AU - Shahaf, Ido
N1 - Publisher Copyright: © 2016 ACM. 978-1-4503-4132-5/16/06...$15.00.
PY - 2016/6/19
Y1 - 2016/6/19
N2 - Searchable symmetric encryption (SSE) enables a client to store a database on an untrusted server while supporting keyword search in a secure manner. Despite the rapidly increasing interest in SSE technology, experiments indicate that the performance of the known schemes scales badly to large databases. Somewhat surprisingly, this is not due to their usage of cryptographic tools, but rather due to their poor locality (where locality is defined as the number of noncontiguous memory locations the server accesses with each query). The only known schemes that do not suffer from poor locality suffer either from an impractical space overhead or from an impractical read efficiency (where read efficiency is defined as the ratio between the number of bits the server reads with each query and the actual size of the answer). We construct the first SSE schemes that simultaneously enjoy optimal locality, optimal space overhead, and nearlyoptimal read efficiency. Specifically, for a database of size N, under the modest assumption that no keyword appears in more than N1-1/log log N documents, we construct a scheme with read efficiency Õ(log log N). This essentially matches the lower bound of Cash and Tessaro (EUROCRYPT'14) showing that any SSE scheme must be sub-optimal in either its locality, its space overhead, or its read efficiency. In addition, even without making any assumptions on the structure of the database, we construct a scheme with read efficiency Õ(log N). Our schemes are obtained via a two-dimensional generalization of the classic balanced allocations ("balls and bins") problem that we put forward. We construct nearly-optimal two-dimensional balanced allocation schemes, and then combine their algorithmic structure with subtle cryptographic techniques.
AB - Searchable symmetric encryption (SSE) enables a client to store a database on an untrusted server while supporting keyword search in a secure manner. Despite the rapidly increasing interest in SSE technology, experiments indicate that the performance of the known schemes scales badly to large databases. Somewhat surprisingly, this is not due to their usage of cryptographic tools, but rather due to their poor locality (where locality is defined as the number of noncontiguous memory locations the server accesses with each query). The only known schemes that do not suffer from poor locality suffer either from an impractical space overhead or from an impractical read efficiency (where read efficiency is defined as the ratio between the number of bits the server reads with each query and the actual size of the answer). We construct the first SSE schemes that simultaneously enjoy optimal locality, optimal space overhead, and nearlyoptimal read efficiency. Specifically, for a database of size N, under the modest assumption that no keyword appears in more than N1-1/log log N documents, we construct a scheme with read efficiency Õ(log log N). This essentially matches the lower bound of Cash and Tessaro (EUROCRYPT'14) showing that any SSE scheme must be sub-optimal in either its locality, its space overhead, or its read efficiency. In addition, even without making any assumptions on the structure of the database, we construct a scheme with read efficiency Õ(log N). Our schemes are obtained via a two-dimensional generalization of the classic balanced allocations ("balls and bins") problem that we put forward. We construct nearly-optimal two-dimensional balanced allocation schemes, and then combine their algorithmic structure with subtle cryptographic techniques.
KW - Balanced allocations
KW - Cryptography
KW - Searchable encryption
UR - http://www.scopus.com/inward/record.url?scp=84979261577&partnerID=8YFLogxK
U2 - https://doi.org/10.1145/2897518.2897562
DO - https://doi.org/10.1145/2897518.2897562
M3 - منشور من مؤتمر
T3 - Proceedings of the Annual ACM Symposium on Theory of Computing
SP - 1101
EP - 1114
BT - STOC 2016 - Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing
A2 - Mansour, Yishay
A2 - Wichs, Daniel
Y2 - 19 June 2016 through 21 June 2016
ER -