TY - JOUR
T1 - Efficient private database queries using ring-LWE somewhat homomorphic encryption
AU - Saha, Tushar Kanti
AU - Rathee, Mayank
AU - Koshiba, Takeshi
N1 - Funding Information:
This work is supported in part by JSPS Grant-in-Aids for Scientific Research (A) JP16H01705 and for Scientific Research (B) JP17H01695 .
Publisher Copyright:
© 2019 Elsevier Ltd
PY - 2019/12
Y1 - 2019/12
N2 - We study the problem of private database queries over any outsourced encrypted database. In 2016, Kim et al. [IEEE Trans. on Dependable and Secure Comput.] showed three private query processing protocols for conjunctive, disjunctive, and threshold queries respectively over an encrypted database. First, we propose two more efficient protocols of processing conjunctive and disjunctive queries with a lower-depth equality circuit than Kim et al.’s one. To get the lower-depth circuit, we modify the packing methods of Saha and Koshiba [APWConCSE 2016] to support an efficient batch computation of our protocols within a few multiplications using binary encoded data. Secondly, we propose another efficient protocol engaging a batch technique for threshold query processing in which many inequality comparisons are indispensable. Finally, we propose the packing methods to support batch computation of many inequality circuits. In addition, our theoretical analysis along with practical experiments show that our protocols are more efficient than any other existing method. We further enhance the performance of conjunctive and disjunctive query protocols using a base-N fixed-length encoding.
AB - We study the problem of private database queries over any outsourced encrypted database. In 2016, Kim et al. [IEEE Trans. on Dependable and Secure Comput.] showed three private query processing protocols for conjunctive, disjunctive, and threshold queries respectively over an encrypted database. First, we propose two more efficient protocols of processing conjunctive and disjunctive queries with a lower-depth equality circuit than Kim et al.’s one. To get the lower-depth circuit, we modify the packing methods of Saha and Koshiba [APWConCSE 2016] to support an efficient batch computation of our protocols within a few multiplications using binary encoded data. Secondly, we propose another efficient protocol engaging a batch technique for threshold query processing in which many inequality comparisons are indispensable. Finally, we propose the packing methods to support batch computation of many inequality circuits. In addition, our theoretical analysis along with practical experiments show that our protocols are more efficient than any other existing method. We further enhance the performance of conjunctive and disjunctive query protocols using a base-N fixed-length encoding.
KW - Batch technique
KW - Conjunctive queries
KW - Disjunctive queries
KW - Homomorphic encryption
KW - Packing method
KW - Private database queries
KW - Threshold queries
UR - http://www.scopus.com/inward/record.url?scp=85074682098&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85074682098&partnerID=8YFLogxK
U2 - 10.1016/j.jisa.2019.102406
DO - 10.1016/j.jisa.2019.102406
M3 - Article
AN - SCOPUS:85074682098
SN - 2214-2134
VL - 49
JO - Journal of Information Security and Applications
JF - Journal of Information Security and Applications
M1 - 102406
ER -