[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-540-30576-7_17guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Keyword search and oblivious pseudorandom functions

Published: 10 February 2005 Publication History

Abstract

We study the problem of privacy-preserving access to a database. Particularly, we consider the problem of privacy-preserving keyword search (KS), where records in the database are accessed according to their associated keywords and where we care for the privacy of both the client and the server. We provide efficient solutions for various settings of KS, based either on specific assumptions or on general primitives (mainly oblivious transfer). Our general solutions rely on a new connection between KS and the oblivious evaluation of pseudorandom functions (OPRFs). We therefore study both the definition and construction of OPRFs and, as a corollary, give improved constructions of OPRFs that may be of independent interest.

References

[1]
Bill Aiello, Yuval Ishai, and Omer Reingold. Priced oblivious transfer: How to sell digital goods. In EUROCRYPT, Innsbruck, Austria, May 2001.
[2]
Amos Beimel, Yuval Ishai, and Tal Malkin. Reducing the servers' computation in private information retrieval: Pir with preprocessing. In CRYPTO, Santa Barbara, CA, August 2000.
[3]
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. Public key encryption with keyword search. In EUROCRYPT, Interlaken, Switzerland, May 2004.
[4]
Christian Cachin, Silvio Micali, and Markus Stadler. Computationally private information retrieval with polylogarithmic communication. In EUROCRYPT, Prague, Czech Republic, May 1999.
[5]
Ran Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143-202, 2000.
[6]
Yan-Cheng Chang. Single database private information retrieval with logarithmic communication. In Proc. 9th ACISP, Sydney, Australia, July 2004.
[7]
Benny Chor, Niv Gilboa, and Moni Naor. Private information retrieval by keywords. Technical Report TR-CS0917, Dept. of Computer Science, Technion, 1997.
[8]
Benny Chor, Oded Goldreich, Eyal Kushilevitz, and Madhu Sudan. Private information retrieval. In Proc. 36th FOCS, Milwaukee, WI, 23-25 October 1995.
[9]
Shimon Even, Oded Goldreich, and Abraham Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
[10]
Michael J. Freedman, Kobbi Nissim, and Benny Pinkas. Efficient private matching and set intersection. In EUROCRYPT, Interlaken, Switzerland, May 2004.
[11]
Yael Gertner, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. Protecting data privacy in private information retrieval schemes. In Proc. 30th ACM STOC, Dallas, TX, May 1998.
[12]
Niv Gilboa. Topics in Private Information Retrieval. PhD thesis, Technion - Israel Institute of Technology, 2000.
[13]
Oded Goldreich. Foundations of Cryptography: Basic Tools. Cambridge University Press, 2001.
[14]
Oded Goldreich, Shafi Goldwasser, and Silvio Micali. How to construct random functions. Journal of the ACM, 33(4):792-807, October 1986.
[15]
Johan Håstad, Russell Impagliazzo, Leonid A. Levin, and Michael Luby. Construction of pseudorandom generator from any one-way function. SIAM Journal on Computing, 28(4):1364-1396, 1999.
[16]
Russell Impagliazzo and Michael Luby. One-way functions are essential for complexity based cryptography. In Proc. 30th FOCS, Research Triangle Park, NC, October-November 1989.
[17]
Yuval Ishai, Joe Kilian, Kobbi Nissim, and Erez Petrank. Extending oblivious transfers efficiently. In CRYPTO, Santa Barbara, CA, August 2003.
[18]
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, and Amit Sahai. Batch codes and their applications. In Proc. 36th ACM STOC, Chicago, IL, June 2004.
[19]
Joe Kilian. Founding cryptography on oblivious transfer. In Proc. 20th ACM STOC, Chicago, IL, May 1988.
[20]
Eyal Kushilevitz and Rafail Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In Proc. 38th FOCS, Miami Beach, FL, October 1997.
[21]
Helger Lipmaa. An oblivious transfer protocol with log-squared communication. Crypto ePrint Archive, Report 2004/063, 2004.
[22]
Silvio Micali, Michael Rabin, and Joe Kilian. Zero-knowledge sets. In Proc. 44th FOCS, Cambridge, MA, October 2003.
[23]
Moni Naor and Benny Pinkas. Oblivious transfer and polynomial evaluation. In Proc. 31st ACM STOC, Atlanta, GA, May 1999.
[24]
Moni Naor and Benny Pinkas. Oblivious transfer with adaptive queries. In CRYPTO, Santa Barbara, CA, August 1999.
[25]
Moni Naor and Benny Pinkas. Efficient oblivious transfer protocols. In Proc. 12th SIAM SODA, Washington, DC, January 2001.
[26]
Moni Naor and Omer Reingold. Number-theoretic constructions of efficient pseudorandom functions. In Proc. 38th FOCS, Miami Beach, FL, October 1997.
[27]
Wakaha Ogata and Kaoru Kurosawa. Oblivious keyword search. Crypto ePrint Archive, Report 2002/182, 2002.
[28]
Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, Prague, Czech Republic, May 1999.
[29]
Michael O. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory, 1981.
[30]
Dawn Xiaodong Song, David Wagner, and Adrian Perrig. Practical techniques for searches on encrypted data. In Proc. IEEE Symposium on Security and Privacy, Berkeley, CA, May 2000.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
TCC'05: Proceedings of the Second international conference on Theory of Cryptography
February 2005
620 pages
ISBN:3540245731
  • Editor:
  • Joe Kilian

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 10 February 2005

Author Tags

  1. oblivious pseudorandom functions
  2. privacy-preserving protocols
  3. private information retrieval
  4. secure keyword search
  5. secure two-party protocols

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Over-threshold multi-party private set operation protocols for lightweight clientsComputer Standards & Interfaces10.1016/j.csi.2023.10378188:COnline publication date: 1-Mar-2024
  • (2024)Review the Cuckoo Hash-Based Unbalanced Private Set Union: Leakage, Fix, and OptimizationComputer Security – ESORICS 202410.1007/978-3-031-70890-9_17(331-352)Online publication date: 16-Sep-2024
  • (2024)Improved Alternating-Moduli PRFs and Post-quantum SignaturesAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68397-8_9(274-308)Online publication date: 18-Aug-2024
  • (2024)A Formal Treatment of End-to-End Encrypted Cloud StorageAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68379-4_2(40-74)Online publication date: 18-Aug-2024
  • (2024)New Proof Systems and an OPRF from CSIDHPublic-Key Cryptography – PKC 202410.1007/978-3-031-57725-3_8(217-251)Online publication date: 15-Apr-2024
  • (2024)Element Distinctness and Bounded Input Size in Private Set Intersection and Related ProtocolsApplied Cryptography and Network Security10.1007/978-3-031-54770-6_2(26-57)Online publication date: 5-Mar-2024
  • (2023)Information-Theoretically Secure and Highly Efficient Search and Row RetrievalProceedings of the VLDB Endowment10.14778/3603581.360358216:10(2391-2403)Online publication date: 1-Jun-2023
  • (2023)Efficient Multiparty Probabilistic Threshold Private Set IntersectionProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623158(2188-2201)Online publication date: 15-Nov-2023
  • (2023)Private set intersectionComputer Science Review10.1016/j.cosrev.2023.10056749:COnline publication date: 1-Aug-2023
  • (2023)Efficient Private Multiset ID ProtocolsInformation and Communications Security10.1007/978-981-99-7356-9_21(351-369)Online publication date: 18-Nov-2023
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media