Private conjunctive query over encrypted data

Tushar Kanti Saha, Takeshi Koshiba

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

In this paper, we propose an efficient protocol to process a private conjunctive query over encrypted data in the cloud using the somewhat homomorphic encryption (SwHE) scheme with a batch technique. In 2016, Cheon, Kim, and Kim (CKK) [IEEE Trans. Inf. Forensics Security] showed conjunctive query processing over encrypted data using search-and-compute circuits and an SwHE scheme and mentioned that their scheme should be improved in performance. To improve the performance of processing a private conjunctive query, we also propose a new packing method to support an efficient batch computation for our protocol using a few multiplications. Our implementation shows that our protocol works more than 50 times as fast as the CKK protocol for conjunctive query processing. In addition, the security level of our protocol is better than the security level of the CKK protocol.

Original languageEnglish
Title of host publicationProgress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Proceedings
EditorsAbderrahmane Nitaj, Marc Joye
PublisherSpringer Verlag
Pages149-164
Number of pages16
ISBN (Print)9783319573380
DOIs
Publication statusPublished - 2017
Event9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017 - Dakar, Senegal
Duration: 2017 May 242017 May 26

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10239 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017
CountrySenegal
CityDakar
Period17/5/2417/5/26

Keywords

  • Conjunctive
  • Data
  • Encrypted
  • Homomorphic encryption
  • Packing method
  • Private
  • Query processing

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Private conjunctive query over encrypted data'. Together they form a unique fingerprint.

Cite this