Private conjunctive query over encrypted data

Tushar Kanti Saha, Takeshi Koshiba

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)

    Abstract

    In this paper, we propose an efficient protocol to process a private conjunctive query over encrypted data in the cloud using the somewhat homomorphic encryption (SwHE) scheme with a batch technique. In 2016, Cheon, Kim, and Kim (CKK) [IEEE Trans. Inf. Forensics Security] showed conjunctive query processing over encrypted data using search-and-compute circuits and an SwHE scheme and mentioned that their scheme should be improved in performance. To improve the performance of processing a private conjunctive query, we also propose a new packing method to support an efficient batch computation for our protocol using a few multiplications. Our implementation shows that our protocol works more than 50 times as fast as the CKK protocol for conjunctive query processing. In addition, the security level of our protocol is better than the security level of the CKK protocol.

    Original languageEnglish
    Title of host publicationProgress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Proceedings
    PublisherSpringer Verlag
    Pages149-164
    Number of pages16
    Volume10239 LNCS
    ISBN (Print)9783319573380
    DOIs
    Publication statusPublished - 2017
    Event9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017 - Dakar, Senegal
    Duration: 2017 May 242017 May 26

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume10239 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    Other9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017
    CountrySenegal
    CityDakar
    Period17/5/2417/5/26

    Fingerprint

    Query processing
    Cryptography
    Query
    Homomorphic Encryption
    Query Processing
    Batch
    Networks (circuits)
    Processing
    Packing
    Multiplication

    Keywords

    • Conjunctive
    • Data
    • Encrypted
    • Homomorphic encryption
    • Packing method
    • Private
    • Query processing

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • Computer Science(all)

    Cite this

    Saha, T. K., & Koshiba, T. (2017). Private conjunctive query over encrypted data. In Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Proceedings (Vol. 10239 LNCS, pp. 149-164). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10239 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-57339-7_9

    Private conjunctive query over encrypted data. / Saha, Tushar Kanti; Koshiba, Takeshi.

    Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Proceedings. Vol. 10239 LNCS Springer Verlag, 2017. p. 149-164 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Saha, TK & Koshiba, T 2017, Private conjunctive query over encrypted data. in Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Proceedings. vol. 10239 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10239 LNCS, Springer Verlag, pp. 149-164, 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, Dakar, Senegal, 17/5/24. https://doi.org/10.1007/978-3-319-57339-7_9
    Saha TK, Koshiba T. Private conjunctive query over encrypted data. In Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Proceedings. Vol. 10239 LNCS. Springer Verlag. 2017. p. 149-164. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-57339-7_9
    Saha, Tushar Kanti ; Koshiba, Takeshi. / Private conjunctive query over encrypted data. Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Proceedings. Vol. 10239 LNCS Springer Verlag, 2017. pp. 149-164 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
    @inproceedings{46f1f26de5cb4702ac6deab3d2093086,
    title = "Private conjunctive query over encrypted data",
    abstract = "In this paper, we propose an efficient protocol to process a private conjunctive query over encrypted data in the cloud using the somewhat homomorphic encryption (SwHE) scheme with a batch technique. In 2016, Cheon, Kim, and Kim (CKK) [IEEE Trans. Inf. Forensics Security] showed conjunctive query processing over encrypted data using search-and-compute circuits and an SwHE scheme and mentioned that their scheme should be improved in performance. To improve the performance of processing a private conjunctive query, we also propose a new packing method to support an efficient batch computation for our protocol using a few multiplications. Our implementation shows that our protocol works more than 50 times as fast as the CKK protocol for conjunctive query processing. In addition, the security level of our protocol is better than the security level of the CKK protocol.",
    keywords = "Conjunctive, Data, Encrypted, Homomorphic encryption, Packing method, Private, Query processing",
    author = "Saha, {Tushar Kanti} and Takeshi Koshiba",
    year = "2017",
    doi = "10.1007/978-3-319-57339-7_9",
    language = "English",
    isbn = "9783319573380",
    volume = "10239 LNCS",
    series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
    publisher = "Springer Verlag",
    pages = "149--164",
    booktitle = "Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Proceedings",
    address = "Germany",

    }

    TY - GEN

    T1 - Private conjunctive query over encrypted data

    AU - Saha, Tushar Kanti

    AU - Koshiba, Takeshi

    PY - 2017

    Y1 - 2017

    N2 - In this paper, we propose an efficient protocol to process a private conjunctive query over encrypted data in the cloud using the somewhat homomorphic encryption (SwHE) scheme with a batch technique. In 2016, Cheon, Kim, and Kim (CKK) [IEEE Trans. Inf. Forensics Security] showed conjunctive query processing over encrypted data using search-and-compute circuits and an SwHE scheme and mentioned that their scheme should be improved in performance. To improve the performance of processing a private conjunctive query, we also propose a new packing method to support an efficient batch computation for our protocol using a few multiplications. Our implementation shows that our protocol works more than 50 times as fast as the CKK protocol for conjunctive query processing. In addition, the security level of our protocol is better than the security level of the CKK protocol.

    AB - In this paper, we propose an efficient protocol to process a private conjunctive query over encrypted data in the cloud using the somewhat homomorphic encryption (SwHE) scheme with a batch technique. In 2016, Cheon, Kim, and Kim (CKK) [IEEE Trans. Inf. Forensics Security] showed conjunctive query processing over encrypted data using search-and-compute circuits and an SwHE scheme and mentioned that their scheme should be improved in performance. To improve the performance of processing a private conjunctive query, we also propose a new packing method to support an efficient batch computation for our protocol using a few multiplications. Our implementation shows that our protocol works more than 50 times as fast as the CKK protocol for conjunctive query processing. In addition, the security level of our protocol is better than the security level of the CKK protocol.

    KW - Conjunctive

    KW - Data

    KW - Encrypted

    KW - Homomorphic encryption

    KW - Packing method

    KW - Private

    KW - Query processing

    UR - http://www.scopus.com/inward/record.url?scp=85019569889&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=85019569889&partnerID=8YFLogxK

    U2 - 10.1007/978-3-319-57339-7_9

    DO - 10.1007/978-3-319-57339-7_9

    M3 - Conference contribution

    AN - SCOPUS:85019569889

    SN - 9783319573380

    VL - 10239 LNCS

    T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    SP - 149

    EP - 164

    BT - Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Proceedings

    PB - Springer Verlag

    ER -