Private conjunctive query over encrypted data

Tushar Kanti Saha, Takeshi Koshiba

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)

    Abstract

    In this paper, we propose an efficient protocol to process a private conjunctive query over encrypted data in the cloud using the somewhat homomorphic encryption (SwHE) scheme with a batch technique. In 2016, Cheon, Kim, and Kim (CKK) [IEEE Trans. Inf. Forensics Security] showed conjunctive query processing over encrypted data using search-and-compute circuits and an SwHE scheme and mentioned that their scheme should be improved in performance. To improve the performance of processing a private conjunctive query, we also propose a new packing method to support an efficient batch computation for our protocol using a few multiplications. Our implementation shows that our protocol works more than 50 times as fast as the CKK protocol for conjunctive query processing. In addition, the security level of our protocol is better than the security level of the CKK protocol.

    Original languageEnglish
    Title of host publicationProgress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Proceedings
    PublisherSpringer Verlag
    Pages149-164
    Number of pages16
    Volume10239 LNCS
    ISBN (Print)9783319573380
    DOIs
    Publication statusPublished - 2017
    Event9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017 - Dakar, Senegal
    Duration: 2017 May 242017 May 26

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume10239 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    Other9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017
    CountrySenegal
    CityDakar
    Period17/5/2417/5/26

    Keywords

    • Conjunctive
    • Data
    • Encrypted
    • Homomorphic encryption
    • Packing method
    • Private
    • Query processing

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • Computer Science(all)

    Fingerprint Dive into the research topics of 'Private conjunctive query over encrypted data'. Together they form a unique fingerprint.

  • Cite this

    Saha, T. K., & Koshiba, T. (2017). Private conjunctive query over encrypted data. In Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Proceedings (Vol. 10239 LNCS, pp. 149-164). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10239 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-57339-7_9