Abstract
Searchable encryption is a technique that allows a client to store data in encrypted form on a curious server, such that data can be retrieved while leaking a minimal amount of information to the server. Many searchable encryption schemes have been proposed and proved secure in their own computational model. In this paper we propose a generic model for the analysis of searchable encryptions. We then identify the security parameters of searchable encryption schemes and prove information theoretical bounds on the security of the parameters. We argue that perfectly secure searchable encryption schemes cannot be efficient. We classify the seminal schemes in two categories: the schemes that leak information upfront during the storage phase, and schemes that leak some information at every search. This helps designers to choose the right scheme for an application.
Original language | English |
---|---|
Title of host publication | 10th international conference on information and communication security |
Place of Publication | Berlin |
Publisher | Springer |
Pages | 345-360 |
Number of pages | 24 |
ISBN (Print) | 978-3-540-88624-2 |
DOIs | |
Publication status | Published - 22 Oct 2008 |
Event | 10th International Conference on Information and Communications Security, ICICS 2008 - Hyatt Regency, Birmingham, United Kingdom Duration: 20 Oct 2008 → 22 Oct 2008 Conference number: 10 http://events.cs.bham.ac.uk/icics08/ |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Number | 1 |
Volume | 5308 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 10th International Conference on Information and Communications Security, ICICS 2008 |
---|---|
Abbreviated title | ICICS |
Country/Territory | United Kingdom |
City | Birmingham |
Period | 20/10/08 → 22/10/08 |
Internet address |
Keywords
- EWI-13866
- IR-62495
- METIS-252082
- SCS-Cybersecurity