SlideShare a Scribd company logo
Searchable Encryption
Nagendra Posani
Georgia Institute of Technology
December 12, 2016
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 1 / 24
Data breaches
Become the norm rather than the exception!
Data breaches
Become the norm rather than the exception!
Data breaches
Become the norm rather than the exception!
Data breaches
Become the norm rather than the exception!
Data breaches
Become the norm rather than the exception!
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 2 / 24
Motivation
Data can be sensitive.
Server may be untrusted or subject to attacks.
Obvious solution is encryption
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 3 / 24
Goals
Search Functionality
Efficiency
Security
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 4 / 24
How to encrypt data?
Encrypting with ”good” encryption schemes solves privacy, but
functionality?
Search query becomes problematic since good encryption schemes
encrypt plaintext differently (randomize ciphertexts)
Figure: Searchable Database
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 5 / 24
Literature
Order Preserving Encryption (OPE) [1], [2]
Variants of OPE [3]
Partical Order Preserving Encryption (POPE) [4]
Order Revealing Encryption (ORE) [5], [6]
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 6 / 24
Order Preserving Encryption
A symmetric encryption scheme is order preserving if encryption
maintains order relations
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 7 / 24
Range Queries in OPE
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 8 / 24
Security Notion for OPE
Provable security notions: IND-CPA?
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 9 / 24
Security Notion for OPE
Provable security notions: IND-CPA? No
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 10 / 24
Security Notion for OPE
Provable security notions: IND-CPA? No
IND-OrderedCPA?
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 11 / 24
Security Notion for OPE
Provable security notions: IND-CPA? No
IND-OrderedCPA? No
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 12 / 24
Alternative Security Notions for OPE
Provable security notions: IND-CPA? No
IND-OCPA? No
POPF Secure? PRF style definition
No, reveals half of the plaintext bits.
ROPF - (r,z) Window One-Wayness Secure?
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 13 / 24
Alternative Security Notions for OPE
Provable security notions: IND-CPA? No
IND-OCPA? No
POPF Secure? PRF style definition
No, reveals half of the plaintext bits.
ROPF - (r,z) Window One-Wayness Secure
Secure for small r, and insecure for large r (Corresponding lower
boundaries and upper boundaries are defined)
Similarly, (r, z) Distance Window One-Wayness Secure.
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 14 / 24
Order Revealing Encryption
Generalized form of OPE
Lets define for small domain messages {0,1,2,...,N}
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 15 / 24
How to encrypt in ORE?
Defined for small plaintext space, keys k1, K2, ...KN are derived from
PRF.
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 16 / 24
Encryption in ORE
Encrypt with the keys
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 17 / 24
Encryption in ORE
For comparison we give the key, but security?
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 18 / 24
Encryption in ORE
Solution: apply random permutation π (part of the secret key) to the
slots
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 19 / 24
Encryption in ORE
Extending it to large domain plaintext space.
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 20 / 24
Partial Order Preserving Encryption (POPE)
Server stores a partially ordered B-tree
Every node contains an unordered buffer of key/value pairs
Non-leaf nodes also have a small ordered list of ciphertexts
Encryption uses any (randomized) symmetric cipher
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 21 / 24
Landscape comparision
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 22 / 24
References I
Y. Lee A. Boldyreva, N. Chenette and A. O’Neill.
Order-preserving symmetric encryption.
EUROCRYPT 2009, volume 5479, 2009.
N. Chenette A. Boldyreva and A. O’Neill.
Order-preserving encryption revisited: Improved security analysis and
alternative solutions.
CRYPTO 2011.
David Cash F. Betl Durak, Thomas M. DuBuisson.
What else is revealed by order-revealing encryption?
ACM CCS, 2016.
Seung Geol Choi Daniel S. Roche, Daniel Apon.
Pope: Partial order preserving encoding.
ACM CCS, 2016.
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 23 / 24
References II
M. Raykova A. Sahai M. Zhandry D. Boneh, K. Lewi and
J. Zimmerman.
Semantically secure order-revealing encryption: Multi-input functional
encryption without obfuscation.
EUROCRYPT 2015.
Kevin Lewi and David J. Wu.
Order-revealing encryption: New constructions, applications, and
lower bounds.
ACM CCS, 2016.
Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 24 / 24

More Related Content

PPTX
Homomorphic encryption
PPT
Data dictionaries
PDF
Dataflow Analysis
PPTX
Digital watermarking
PPTX
Paillier Cryptosystem
PPTX
Cryptography
PDF
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-2 notes(15...
Homomorphic encryption
Data dictionaries
Dataflow Analysis
Digital watermarking
Paillier Cryptosystem
Cryptography
VTU E&C,TCE CBCS[NEW] 5th Sem Information Theory and Coding Module-2 notes(15...

What's hot (20)

PPTX
Digital water marking
PDF
Tableau file types
PDF
Linear time sorting algorithms
PPTX
hill cipher
PDF
GRAPH MATRIX APPLICATIONS.pdf
PPTX
Characteristics Schedule based on Recover-ability & Serial-ability
PDF
R Programming For Beginners | R Language Tutorial | R Tutorial For Beginners ...
PPT
Dbms ii mca-ch10-concurrency-control-2013
PPTX
Partial Homomorphic Encryption
PPTX
digital steganography
PPTX
Double Hashing.pptx
PDF
Database Consistency Models
PPTX
Multi-Tier Architecture or N Tier Architecture
PPT
Introduction to Digital signatures
PDF
Computer Organization and Architecture.pdf
PPT
4 informed-search
PDF
Tree and binary tree
PDF
Asymmetric Cryptography
PPTX
Bellmanford . montaser hamza.iraq
PDF
Graph Data Structure
Digital water marking
Tableau file types
Linear time sorting algorithms
hill cipher
GRAPH MATRIX APPLICATIONS.pdf
Characteristics Schedule based on Recover-ability & Serial-ability
R Programming For Beginners | R Language Tutorial | R Tutorial For Beginners ...
Dbms ii mca-ch10-concurrency-control-2013
Partial Homomorphic Encryption
digital steganography
Double Hashing.pptx
Database Consistency Models
Multi-Tier Architecture or N Tier Architecture
Introduction to Digital signatures
Computer Organization and Architecture.pdf
4 informed-search
Tree and binary tree
Asymmetric Cryptography
Bellmanford . montaser hamza.iraq
Graph Data Structure
Ad

Viewers also liked (14)

PDF
Searchable Encryption Systems
PDF
Search on encrypted data
PDF
PaaSword - Distributed Searchable Encryption Engine
PPTX
CipherCloud Technology Overview: Encryption
PDF
A Searchable Symmetric Key Cipher System
PDF
Attacking Turkish Texts Encrypted by Homophonic Cipher
PPTX
Gırgır sunum
PPT
Secure Data Sharing in Cloud (SDSC)
PDF
Analysis of Searchable Encryption
PDF
Node.js Introduction
PDF
Security Risks & Vulnerabilities in Skype
PDF
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
PPTX
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
PPTX
Cloud security ppt
Searchable Encryption Systems
Search on encrypted data
PaaSword - Distributed Searchable Encryption Engine
CipherCloud Technology Overview: Encryption
A Searchable Symmetric Key Cipher System
Attacking Turkish Texts Encrypted by Homophonic Cipher
Gırgır sunum
Secure Data Sharing in Cloud (SDSC)
Analysis of Searchable Encryption
Node.js Introduction
Security Risks & Vulnerabilities in Skype
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Cloud security ppt
Ad

Similar to Searchable Encryption (20)

PDF
PDF
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
PPTX
Daniel Crowley - Speaking with Cryptographic Oracles
PDF
Enhancing access privacy of range retrievals over b+trees
PDF
apidays LIVE New York 2021 - Solving API security through holistic obervabili...
PDF
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
PDF
Data integrity proof techniques in cloud storage
PDF
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
PDF
Cryptography for Penetration Testers (PDF version)
PDF
C017421624
PDF
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
PDF
A survey on encryption algorithms for data security
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
PPT
Privacy preserving queries on encrypted data
PDF
IRJET- Anchoring of Cloud Information under Key Presentation
PDF
A comparative study of secure search protocols in pay as-you-go clouds
PDF
CNIT 141: 1. Encryption
PDF
PDF
Searching Encrypted Cloud Data: Academia and Industry Done Right
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
Daniel Crowley - Speaking with Cryptographic Oracles
Enhancing access privacy of range retrievals over b+trees
apidays LIVE New York 2021 - Solving API security through holistic obervabili...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Data integrity proof techniques in cloud storage
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
Cryptography for Penetration Testers (PDF version)
C017421624
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
A survey on encryption algorithms for data security
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
Privacy preserving queries on encrypted data
IRJET- Anchoring of Cloud Information under Key Presentation
A comparative study of secure search protocols in pay as-you-go clouds
CNIT 141: 1. Encryption
Searching Encrypted Cloud Data: Academia and Industry Done Right

Recently uploaded (20)

PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
PPT on Performance Review to get promotions
PDF
Well-logging-methods_new................
PPT
Project quality management in manufacturing
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
DOCX
573137875-Attendance-Management-System-original
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
III.4.1.2_The_Space_Environment.p pdffdf
Model Code of Practice - Construction Work - 21102022 .pdf
Operating System & Kernel Study Guide-1 - converted.pdf
PPT on Performance Review to get promotions
Well-logging-methods_new................
Project quality management in manufacturing
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
573137875-Attendance-Management-System-original
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
bas. eng. economics group 4 presentation 1.pptx
Fundamentals of safety and accident prevention -final (1).pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Embodied AI: Ushering in the Next Era of Intelligent Systems
Mechanical Engineering MATERIALS Selection
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks

Searchable Encryption

  • 1. Searchable Encryption Nagendra Posani Georgia Institute of Technology December 12, 2016 Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 1 / 24
  • 2. Data breaches Become the norm rather than the exception!
  • 3. Data breaches Become the norm rather than the exception!
  • 4. Data breaches Become the norm rather than the exception!
  • 5. Data breaches Become the norm rather than the exception!
  • 6. Data breaches Become the norm rather than the exception! Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 2 / 24
  • 7. Motivation Data can be sensitive. Server may be untrusted or subject to attacks. Obvious solution is encryption Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 3 / 24
  • 8. Goals Search Functionality Efficiency Security Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 4 / 24
  • 9. How to encrypt data? Encrypting with ”good” encryption schemes solves privacy, but functionality? Search query becomes problematic since good encryption schemes encrypt plaintext differently (randomize ciphertexts) Figure: Searchable Database Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 5 / 24
  • 10. Literature Order Preserving Encryption (OPE) [1], [2] Variants of OPE [3] Partical Order Preserving Encryption (POPE) [4] Order Revealing Encryption (ORE) [5], [6] Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 6 / 24
  • 11. Order Preserving Encryption A symmetric encryption scheme is order preserving if encryption maintains order relations Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 7 / 24
  • 12. Range Queries in OPE Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 8 / 24
  • 13. Security Notion for OPE Provable security notions: IND-CPA? Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 9 / 24
  • 14. Security Notion for OPE Provable security notions: IND-CPA? No Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 10 / 24
  • 15. Security Notion for OPE Provable security notions: IND-CPA? No IND-OrderedCPA? Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 11 / 24
  • 16. Security Notion for OPE Provable security notions: IND-CPA? No IND-OrderedCPA? No Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 12 / 24
  • 17. Alternative Security Notions for OPE Provable security notions: IND-CPA? No IND-OCPA? No POPF Secure? PRF style definition No, reveals half of the plaintext bits. ROPF - (r,z) Window One-Wayness Secure? Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 13 / 24
  • 18. Alternative Security Notions for OPE Provable security notions: IND-CPA? No IND-OCPA? No POPF Secure? PRF style definition No, reveals half of the plaintext bits. ROPF - (r,z) Window One-Wayness Secure Secure for small r, and insecure for large r (Corresponding lower boundaries and upper boundaries are defined) Similarly, (r, z) Distance Window One-Wayness Secure. Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 14 / 24
  • 19. Order Revealing Encryption Generalized form of OPE Lets define for small domain messages {0,1,2,...,N} Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 15 / 24
  • 20. How to encrypt in ORE? Defined for small plaintext space, keys k1, K2, ...KN are derived from PRF. Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 16 / 24
  • 21. Encryption in ORE Encrypt with the keys Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 17 / 24
  • 22. Encryption in ORE For comparison we give the key, but security? Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 18 / 24
  • 23. Encryption in ORE Solution: apply random permutation π (part of the secret key) to the slots Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 19 / 24
  • 24. Encryption in ORE Extending it to large domain plaintext space. Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 20 / 24
  • 25. Partial Order Preserving Encryption (POPE) Server stores a partially ordered B-tree Every node contains an unordered buffer of key/value pairs Non-leaf nodes also have a small ordered list of ciphertexts Encryption uses any (randomized) symmetric cipher Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 21 / 24
  • 26. Landscape comparision Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 22 / 24
  • 27. References I Y. Lee A. Boldyreva, N. Chenette and A. O’Neill. Order-preserving symmetric encryption. EUROCRYPT 2009, volume 5479, 2009. N. Chenette A. Boldyreva and A. O’Neill. Order-preserving encryption revisited: Improved security analysis and alternative solutions. CRYPTO 2011. David Cash F. Betl Durak, Thomas M. DuBuisson. What else is revealed by order-revealing encryption? ACM CCS, 2016. Seung Geol Choi Daniel S. Roche, Daniel Apon. Pope: Partial order preserving encoding. ACM CCS, 2016. Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 23 / 24
  • 28. References II M. Raykova A. Sahai M. Zhandry D. Boneh, K. Lewi and J. Zimmerman. Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation. EUROCRYPT 2015. Kevin Lewi and David J. Wu. Order-revealing encryption: New constructions, applications, and lower bounds. ACM CCS, 2016. Nagendra Posani (GaTech) Searchable Encryption December 12, 2016 24 / 24