Using secret sharing for searching in encrypted data

Richard Brinkman, J.M. Doumen

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

97 Downloads (Pure)

Abstract

When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server. We present a method, inspired by secure multi-party computation, to search efficiently in encrypted data. XML elements are translated to polynomials. A polynomial is split into two parts: a random polynomial for the client and the difference between the original polynomial and the client polynomial for the server. Since the client polynomials are generated by a random sequence generator only the seed has to be stored on the client. In a combined effort of both the server and the client a query can be evaluated without traversing the whole tree and without the server learning anything about the data or the query.
Original languageEnglish
Title of host publicationWorkshop on Secure Data Management in a Connected World (SDM)
EditorsWillem Jonker, W. Jonker, M. Petkovic
Place of PublicationBerlin
PublisherSpringer
Pages18-27
Number of pages10
ISBN (Print)3-540-22983-3
DOIs
Publication statusPublished - 30 Aug 2004
Event1st VLDB Workshop on Secure Data Management, SDM 2004 - Toronto, Canada
Duration: 30 Aug 200430 Aug 2004
Conference number: 1

Publication series

NameLecture Notes in Computer Science
PublisherSpringer-Verlag
Volume3178
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Workshop

Workshop1st VLDB Workshop on Secure Data Management, SDM 2004
Abbreviated titleSDM
CountryCanada
CityToronto
Period30/08/0430/08/04

Keywords

  • EWI-7442
  • DB-SDM: SECURE DATA MANAGEMENT
  • IR-48636
  • METIS-220264
  • SCS-Cybersecurity

Fingerprint Dive into the research topics of 'Using secret sharing for searching in encrypted data'. Together they form a unique fingerprint.

  • Cite this

    Brinkman, R., & Doumen, J. M. (2004). Using secret sharing for searching in encrypted data. In W. Jonker, W. Jonker, & M. Petkovic (Eds.), Workshop on Secure Data Management in a Connected World (SDM) (pp. 18-27). (Lecture Notes in Computer Science; Vol. 3178). Berlin: Springer. https://doi.org/10.1007/b99822, https://doi.org/10.1007/978-3-540-30073-1_2