Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2018-10-26

AUTHORS

Cédric Van Rompay , Refik Molva , Melek Önen

ABSTRACT

A recent paper showed that most Multi-User Searchable Encryption protocols do not provide any privacy without the assumption that all users can be trusted, an assumption too strong to be realistic for a MUSE system. As to the few MUSE protocols that are not affected, they all suffer from some scalability issues. We present the first MUSE protocol that does protect against user-server collusions, and yet scales very well. The protocol is also very simple. We prove that the leakage of the protocol is limited to the access pattern of queries and we report on performance measurements from a proof-of-concept implementation. More... »

PAGES

393-408

Book

TITLE

Information and Communications Security

ISBN

978-3-030-01949-5
978-3-030-01950-1

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-030-01950-1_23

DOI

http://dx.doi.org/10.1007/978-3-030-01950-1_23

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1107848326


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "EURECOM, Biot, France", 
          "id": "http://www.grid.ac/institutes/grid.28848.3e", 
          "name": [
            "EURECOM, Biot, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Van Rompay", 
        "givenName": "C\u00e9dric", 
        "id": "sg:person.013046335225.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013046335225.52"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "EURECOM, Biot, France", 
          "id": "http://www.grid.ac/institutes/grid.28848.3e", 
          "name": [
            "EURECOM, Biot, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Molva", 
        "givenName": "Refik", 
        "id": "sg:person.015760300237.27", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015760300237.27"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "EURECOM, Biot, France", 
          "id": "http://www.grid.ac/institutes/grid.28848.3e", 
          "name": [
            "EURECOM, Biot, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "\u00d6nen", 
        "givenName": "Melek", 
        "id": "sg:person.010016772466.14", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010016772466.14"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2018-10-26", 
    "datePublishedReg": "2018-10-26", 
    "description": "A recent paper showed that most Multi-User Searchable Encryption protocols do not provide any privacy without the assumption that all users can be trusted, an assumption too strong to be realistic for a MUSE system. As to the few MUSE protocols that are not affected, they all suffer from some scalability issues. We present the first MUSE protocol that does protect against user-server collusions, and yet scales very well. The protocol is also very simple. We prove that the leakage of the protocol is limited to the access pattern of queries and we report on performance measurements from a proof-of-concept implementation.", 
    "editor": [
      {
        "familyName": "Naccache", 
        "givenName": "David", 
        "type": "Person"
      }, 
      {
        "familyName": "Xu", 
        "givenName": "Shouhuai", 
        "type": "Person"
      }, 
      {
        "familyName": "Qing", 
        "givenName": "Sihan", 
        "type": "Person"
      }, 
      {
        "familyName": "Samarati", 
        "givenName": "Pierangela", 
        "type": "Person"
      }, 
      {
        "familyName": "Blanc", 
        "givenName": "Gregory", 
        "type": "Person"
      }, 
      {
        "familyName": "Lu", 
        "givenName": "Rongxing", 
        "type": "Person"
      }, 
      {
        "familyName": "Zhang", 
        "givenName": "Zonghua", 
        "type": "Person"
      }, 
      {
        "familyName": "Meddahi", 
        "givenName": "Ahmed", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-030-01950-1_23", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-030-01949-5", 
        "978-3-030-01950-1"
      ], 
      "name": "Information and Communications Security", 
      "type": "Book"
    }, 
    "keywords": [
      "searchable encryption protocol", 
      "access pattern leakage", 
      "searchable encryption", 
      "encryption protocol", 
      "concept implementation", 
      "scalability issues", 
      "access patterns", 
      "performance measurement", 
      "MUSE system", 
      "protocol", 
      "encryption", 
      "queries", 
      "privacy", 
      "users", 
      "Multi", 
      "implementation", 
      "collusion", 
      "proof", 
      "system", 
      "issues", 
      "fast", 
      "assumption", 
      "recent paper", 
      "leakage", 
      "patterns", 
      "measurements", 
      "paper", 
      "User Searchable Encryption protocols", 
      "MUSE protocols", 
      "first MUSE protocol", 
      "user-server collusions", 
      "Two-Server Multi", 
      "User Searchable Encryption", 
      "Strict Access Pattern Leakage", 
      "Pattern Leakage"
    ], 
    "name": "Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage", 
    "pagination": "393-408", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1107848326"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-030-01950-1_23"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-030-01950-1_23", 
      "https://app.dimensions.ai/details/publication/pub.1107848326"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2021-12-01T20:06", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20211201/entities/gbq_results/chapter/chapter_331.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-030-01950-1_23"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-01950-1_23'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-01950-1_23'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-01950-1_23'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-01950-1_23'


 

This table displays all metadata directly associated to this object as RDF triples.

144 TRIPLES      23 PREDICATES      60 URIs      53 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-030-01950-1_23 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N02a8037b388440cf8a0a529839ba9c46
4 schema:datePublished 2018-10-26
5 schema:datePublishedReg 2018-10-26
6 schema:description A recent paper showed that most Multi-User Searchable Encryption protocols do not provide any privacy without the assumption that all users can be trusted, an assumption too strong to be realistic for a MUSE system. As to the few MUSE protocols that are not affected, they all suffer from some scalability issues. We present the first MUSE protocol that does protect against user-server collusions, and yet scales very well. The protocol is also very simple. We prove that the leakage of the protocol is limited to the access pattern of queries and we report on performance measurements from a proof-of-concept implementation.
7 schema:editor N454a284a61974187b8d488cb04937b47
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Nfd9f0c64272f41e3977f1e4ec0895c20
12 schema:keywords MUSE protocols
13 MUSE system
14 Multi
15 Pattern Leakage
16 Strict Access Pattern Leakage
17 Two-Server Multi
18 User Searchable Encryption
19 User Searchable Encryption protocols
20 access pattern leakage
21 access patterns
22 assumption
23 collusion
24 concept implementation
25 encryption
26 encryption protocol
27 fast
28 first MUSE protocol
29 implementation
30 issues
31 leakage
32 measurements
33 paper
34 patterns
35 performance measurement
36 privacy
37 proof
38 protocol
39 queries
40 recent paper
41 scalability issues
42 searchable encryption
43 searchable encryption protocol
44 system
45 user-server collusions
46 users
47 schema:name Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage
48 schema:pagination 393-408
49 schema:productId N8b28f1466e1f44748e1f4dea9c7b1ccd
50 Neba6c9b005cd40d5aa240e4ac615ae11
51 schema:publisher N450721fc2c0c4322ab00a4ed4db8a7e4
52 schema:sameAs https://app.dimensions.ai/details/publication/pub.1107848326
53 https://doi.org/10.1007/978-3-030-01950-1_23
54 schema:sdDatePublished 2021-12-01T20:06
55 schema:sdLicense https://scigraph.springernature.com/explorer/license/
56 schema:sdPublisher N555a64eb532f422d8f56e8bd5322f19b
57 schema:url https://doi.org/10.1007/978-3-030-01950-1_23
58 sgo:license sg:explorer/license/
59 sgo:sdDataset chapters
60 rdf:type schema:Chapter
61 N02a8037b388440cf8a0a529839ba9c46 rdf:first sg:person.013046335225.52
62 rdf:rest N224c039e3b334054a59bade5e3a58fa0
63 N224c039e3b334054a59bade5e3a58fa0 rdf:first sg:person.015760300237.27
64 rdf:rest N2358db1c7a6a4cc882733554ee3b6a79
65 N2358db1c7a6a4cc882733554ee3b6a79 rdf:first sg:person.010016772466.14
66 rdf:rest rdf:nil
67 N2d3f1d6617a44aeb915bee13feaf8506 rdf:first Na62224517581440d8a0da383971939bf
68 rdf:rest Ncedb391dee3b479fbfacaf06e4085803
69 N345e006ce0f74eb495d216f9d260cbd7 rdf:first N93b27a81f60c474abe1f5cbd54ec60b5
70 rdf:rest N98084c620883412faf5bc096e616dcc0
71 N3a85134d91dc403b89a141086abfe797 schema:familyName Zhang
72 schema:givenName Zonghua
73 rdf:type schema:Person
74 N450721fc2c0c4322ab00a4ed4db8a7e4 schema:name Springer Nature
75 rdf:type schema:Organisation
76 N454a284a61974187b8d488cb04937b47 rdf:first N47b0fc93b88a49eea6692cd639d0822d
77 rdf:rest N2d3f1d6617a44aeb915bee13feaf8506
78 N47b0fc93b88a49eea6692cd639d0822d schema:familyName Naccache
79 schema:givenName David
80 rdf:type schema:Person
81 N555a64eb532f422d8f56e8bd5322f19b schema:name Springer Nature - SN SciGraph project
82 rdf:type schema:Organization
83 N5bcd82f72de6487d99c632c7ecf4a37c schema:familyName Samarati
84 schema:givenName Pierangela
85 rdf:type schema:Person
86 N73dac4a8f6fe4cf0aab3c8df1453fffb rdf:first N3a85134d91dc403b89a141086abfe797
87 rdf:rest Nfd51f4c3c94942489c6c334bb9e06bb3
88 N8003a9acaca64bd08f5063c27058c6cd schema:familyName Lu
89 schema:givenName Rongxing
90 rdf:type schema:Person
91 N88fb31e378b44904aaa4a186a6291913 rdf:first N5bcd82f72de6487d99c632c7ecf4a37c
92 rdf:rest N345e006ce0f74eb495d216f9d260cbd7
93 N8b28f1466e1f44748e1f4dea9c7b1ccd schema:name dimensions_id
94 schema:value pub.1107848326
95 rdf:type schema:PropertyValue
96 N93b27a81f60c474abe1f5cbd54ec60b5 schema:familyName Blanc
97 schema:givenName Gregory
98 rdf:type schema:Person
99 N98084c620883412faf5bc096e616dcc0 rdf:first N8003a9acaca64bd08f5063c27058c6cd
100 rdf:rest N73dac4a8f6fe4cf0aab3c8df1453fffb
101 N9ce13ae2870f460d9236c0b76bcebdde schema:familyName Meddahi
102 schema:givenName Ahmed
103 rdf:type schema:Person
104 Na62224517581440d8a0da383971939bf schema:familyName Xu
105 schema:givenName Shouhuai
106 rdf:type schema:Person
107 Ncedb391dee3b479fbfacaf06e4085803 rdf:first Nd12f3eb43ce84c7e8d346a460043b613
108 rdf:rest N88fb31e378b44904aaa4a186a6291913
109 Nd12f3eb43ce84c7e8d346a460043b613 schema:familyName Qing
110 schema:givenName Sihan
111 rdf:type schema:Person
112 Neba6c9b005cd40d5aa240e4ac615ae11 schema:name doi
113 schema:value 10.1007/978-3-030-01950-1_23
114 rdf:type schema:PropertyValue
115 Nfd51f4c3c94942489c6c334bb9e06bb3 rdf:first N9ce13ae2870f460d9236c0b76bcebdde
116 rdf:rest rdf:nil
117 Nfd9f0c64272f41e3977f1e4ec0895c20 schema:isbn 978-3-030-01949-5
118 978-3-030-01950-1
119 schema:name Information and Communications Security
120 rdf:type schema:Book
121 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
122 schema:name Information and Computing Sciences
123 rdf:type schema:DefinedTerm
124 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
125 schema:name Data Format
126 rdf:type schema:DefinedTerm
127 sg:person.010016772466.14 schema:affiliation grid-institutes:grid.28848.3e
128 schema:familyName Önen
129 schema:givenName Melek
130 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010016772466.14
131 rdf:type schema:Person
132 sg:person.013046335225.52 schema:affiliation grid-institutes:grid.28848.3e
133 schema:familyName Van Rompay
134 schema:givenName Cédric
135 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013046335225.52
136 rdf:type schema:Person
137 sg:person.015760300237.27 schema:affiliation grid-institutes:grid.28848.3e
138 schema:familyName Molva
139 schema:givenName Refik
140 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015760300237.27
141 rdf:type schema:Person
142 grid-institutes:grid.28848.3e schema:alternateName EURECOM, Biot, France
143 schema:name EURECOM, Biot, France
144 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...