[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-540-30576-7_17guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Keyword search and oblivious pseudorandom functions

Published: 10 February 2005 Publication History

Abstract

We study the problem of privacy-preserving access to a database. Particularly, we consider the problem of privacy-preserving keyword search (KS), where records in the database are accessed according to their associated keywords and where we care for the privacy of both the client and the server. We provide efficient solutions for various settings of KS, based either on specific assumptions or on general primitives (mainly oblivious transfer). Our general solutions rely on a new connection between KS and the oblivious evaluation of pseudorandom functions (OPRFs). We therefore study both the definition and construction of OPRFs and, as a corollary, give improved constructions of OPRFs that may be of independent interest.

References

[1]
Bill Aiello, Yuval Ishai, and Omer Reingold. Priced oblivious transfer: How to sell digital goods. In EUROCRYPT, Innsbruck, Austria, May 2001.
[2]
Amos Beimel, Yuval Ishai, and Tal Malkin. Reducing the servers' computation in private information retrieval: Pir with preprocessing. In CRYPTO, Santa Barbara, CA, August 2000.
[3]
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. Public key encryption with keyword search. In EUROCRYPT, Interlaken, Switzerland, May 2004.
[4]
Christian Cachin, Silvio Micali, and Markus Stadler. Computationally private information retrieval with polylogarithmic communication. In EUROCRYPT, Prague, Czech Republic, May 1999.
[5]
Ran Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143-202, 2000.
[6]
Yan-Cheng Chang. Single database private information retrieval with logarithmic communication. In Proc. 9th ACISP, Sydney, Australia, July 2004.
[7]
Benny Chor, Niv Gilboa, and Moni Naor. Private information retrieval by keywords. Technical Report TR-CS0917, Dept. of Computer Science, Technion, 1997.
[8]
Benny Chor, Oded Goldreich, Eyal Kushilevitz, and Madhu Sudan. Private information retrieval. In Proc. 36th FOCS, Milwaukee, WI, 23-25 October 1995.
[9]
Shimon Even, Oded Goldreich, and Abraham Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
[10]
Michael J. Freedman, Kobbi Nissim, and Benny Pinkas. Efficient private matching and set intersection. In EUROCRYPT, Interlaken, Switzerland, May 2004.
[11]
Yael Gertner, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. Protecting data privacy in private information retrieval schemes. In Proc. 30th ACM STOC, Dallas, TX, May 1998.
[12]
Niv Gilboa. Topics in Private Information Retrieval. PhD thesis, Technion - Israel Institute of Technology, 2000.
[13]
Oded Goldreich. Foundations of Cryptography: Basic Tools. Cambridge University Press, 2001.
[14]
Oded Goldreich, Shafi Goldwasser, and Silvio Micali. How to construct random functions. Journal of the ACM, 33(4):792-807, October 1986.
[15]
Johan Håstad, Russell Impagliazzo, Leonid A. Levin, and Michael Luby. Construction of pseudorandom generator from any one-way function. SIAM Journal on Computing, 28(4):1364-1396, 1999.
[16]
Russell Impagliazzo and Michael Luby. One-way functions are essential for complexity based cryptography. In Proc. 30th FOCS, Research Triangle Park, NC, October-November 1989.
[17]
Yuval Ishai, Joe Kilian, Kobbi Nissim, and Erez Petrank. Extending oblivious transfers efficiently. In CRYPTO, Santa Barbara, CA, August 2003.
[18]
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, and Amit Sahai. Batch codes and their applications. In Proc. 36th ACM STOC, Chicago, IL, June 2004.
[19]
Joe Kilian. Founding cryptography on oblivious transfer. In Proc. 20th ACM STOC, Chicago, IL, May 1988.
[20]
Eyal Kushilevitz and Rafail Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In Proc. 38th FOCS, Miami Beach, FL, October 1997.
[21]
Helger Lipmaa. An oblivious transfer protocol with log-squared communication. Crypto ePrint Archive, Report 2004/063, 2004.
[22]
Silvio Micali, Michael Rabin, and Joe Kilian. Zero-knowledge sets. In Proc. 44th FOCS, Cambridge, MA, October 2003.
[23]
Moni Naor and Benny Pinkas. Oblivious transfer and polynomial evaluation. In Proc. 31st ACM STOC, Atlanta, GA, May 1999.
[24]
Moni Naor and Benny Pinkas. Oblivious transfer with adaptive queries. In CRYPTO, Santa Barbara, CA, August 1999.
[25]
Moni Naor and Benny Pinkas. Efficient oblivious transfer protocols. In Proc. 12th SIAM SODA, Washington, DC, January 2001.
[26]
Moni Naor and Omer Reingold. Number-theoretic constructions of efficient pseudorandom functions. In Proc. 38th FOCS, Miami Beach, FL, October 1997.
[27]
Wakaha Ogata and Kaoru Kurosawa. Oblivious keyword search. Crypto ePrint Archive, Report 2002/182, 2002.
[28]
Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, Prague, Czech Republic, May 1999.
[29]
Michael O. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory, 1981.
[30]
Dawn Xiaodong Song, David Wagner, and Adrian Perrig. Practical techniques for searches on encrypted data. In Proc. IEEE Symposium on Security and Privacy, Berkeley, CA, May 2000.

Cited By

View all
  • (2025)Machine Learning Meets Encrypted SearchInternational Journal of Intelligent Systems10.1155/int/24295772025Online publication date: 1-Jan-2025
  • (2024)Secret key recovery in a global-scale end-to-end encryption systemProceedings of the 18th USENIX Conference on Operating Systems Design and Implementation10.5555/3691938.3691976(703-719)Online publication date: 10-Jul-2024
  • (2024)End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud StorageACM Transactions on Privacy and Security10.1145/370746028:2(1-35)Online publication date: 6-Dec-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
TCC'05: Proceedings of the Second international conference on Theory of Cryptography
February 2005
620 pages
ISBN:3540245731
  • Editor:
  • Joe Kilian

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 10 February 2005

Author Tags

  1. oblivious pseudorandom functions
  2. privacy-preserving protocols
  3. private information retrieval
  4. secure keyword search
  5. secure two-party protocols

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Machine Learning Meets Encrypted SearchInternational Journal of Intelligent Systems10.1155/int/24295772025Online publication date: 1-Jan-2025
  • (2024)Secret key recovery in a global-scale end-to-end encryption systemProceedings of the 18th USENIX Conference on Operating Systems Design and Implementation10.5555/3691938.3691976(703-719)Online publication date: 10-Jul-2024
  • (2024)End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud StorageACM Transactions on Privacy and Security10.1145/370746028:2(1-35)Online publication date: 6-Dec-2024
  • (2024)Over-threshold multi-party private set operation protocols for lightweight clientsComputer Standards & Interfaces10.1016/j.csi.2023.10378188:COnline publication date: 1-Mar-2024
  • (2024)Verifiable Oblivious Pseudorandom Functions from Lattices: Practical-Ish and ThresholdisableAdvances in Cryptology – ASIACRYPT 202410.1007/978-981-96-0894-2_7(205-237)Online publication date: 10-Dec-2024
  • (2024)An Efficient Toolkit for Computing Third-Party Private Set IntersectionProgress in Cryptology – INDOCRYPT 202410.1007/978-3-031-80308-6_12(258-281)Online publication date: 18-Dec-2024
  • (2024)Review the Cuckoo Hash-Based Unbalanced Private Set Union: Leakage, Fix, and OptimizationComputer Security – ESORICS 202410.1007/978-3-031-70890-9_17(331-352)Online publication date: 16-Sep-2024
  • (2024)Improved Alternating-Moduli PRFs and Post-quantum SignaturesAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68397-8_9(274-308)Online publication date: 18-Aug-2024
  • (2024)A Formal Treatment of End-to-End Encrypted Cloud StorageAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68379-4_2(40-74)Online publication date: 18-Aug-2024
  • (2024)New Proof Systems and an OPRF from CSIDHPublic-Key Cryptography – PKC 202410.1007/978-3-031-57725-3_8(217-251)Online publication date: 15-Apr-2024
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media