Projects per year
Abstract
Encrypted databases have been extensively studied with the increasing concern of data privacy in cloud services. For practical efficiency, most encrypted database systems are built under Dynamic Searchable Symmetric Encryption (DSSE) schemes to support fast query and update over encrypted data. However, DSSE schemes allow leakages in their security frameworks, especially access-pattern leakages (i.e., the search results corresponding to queried keywords), which lead to various attacks to infer sensitive information of queries and databases. Existing oblivious-access techniques, such as Oblivious RAM and differential privacy, suffer from excessive communication overhead and loss of query accuracy. In this paper, we propose a new DSSE scheme that enables access-pattern hiding keyword search and update operations. Servers can obliviously query and update databases within only a single communication round. Our building block is based on the Distributed Point Function (DPF), an advanced secret sharing technique that provides provable security guarantees against adversaries with arbitrary background knowledge. Moreover, we devise a novel update protocol that integrates DPF and Somewhat Homomorphic Encryption (SHE) such that servers can obliviously update their local data. We formally analyze the security and implement the prototype. The comprehensive experimental results demonstrate the security and efficiency of our scheme. © 1968-2012 IEEE.
Original language | English |
---|---|
Pages (from-to) | 1066-1078 |
Number of pages | 13 |
Journal | IEEE Transactions on Computers |
Volume | 74 |
Issue number | 3 |
Online published | 21 Nov 2024 |
DOIs | |
Publication status | Published - Mar 2025 |
Funding
This work was supported by the National Natural Science Foundation of China under Grant 62102035, and the Research Grants Council of Hong Kong under Project CityU 11211422 and R1012-21.
Research Keywords
- access-pattern hiding
- distributed point function
- Searchable encryption
Fingerprint
Dive into the research topics of 'Access-Pattern Hiding Search over Encrypted Databases by Using Distributed Point Functions'. Together they form a unique fingerprint.Projects
- 2 Active
-
GRF: Secure and Compressed Key-Value Store for Outsourced Data in Cloud Computing
JIA, X. (Principal Investigator / Project Coordinator)
1/01/23 → …
Project: Research
-
RIF: Secure and Incentivized Data Sharing with Enhanced Ownership for Decentralized Networks
JIA, X. (Principal Investigator / Project Coordinator), Li, B. (Co-Principal Investigator), PANG, Z. (Co-Principal Investigator), WANG, C. (Co-Principal Investigator), WANG, J. (Co-Principal Investigator) & Yiu, S. M. (Co-Principal Investigator)
30/06/22 → …
Project: Research