Searchable Encryption. Nuttiiya Seekhao
|
|
- Lawrence Flowers
- 6 years ago
- Views:
Transcription
1 Searchable Encryption Nuttiiya Seekhao
2 Overview Motivation Literature Background Solutions Scheme I, II, III, IV Discussion Runtime Possible Extensions Conclusion
3 Motivation
4 Motivation
5 Motivation
6 Searchable Encryption!
7 Practical techniques for searches on encrypted data By Dawn Xiaodong Song, David Wagner, and Adrian Perrig in 2000 Main idea: Embed information in the cipher text Sequential Scan Not scalable
8 Practical techniques for searches on encrypted data The techniques provide: Provable secrecy Controlled searching Hidden queries Query isolation
9 Related Work Prior to This Paper (1) Providing secrecy and integrity on untrusted file server [2, 11, 1, 3] Secure multi-party computation and oblivious functions [13, 5] Requires high overhead e.g. multiple servers
10 Related Work Prior to This Paper (2) Private Information Retrieval (PIR) Problem [9, 15, 12, 8, 4] Have at least one of the following limitations: Requires multiple non-colluding servers Consume large amounts of bandwidth Do not guarantee the confidentiality of the data Do not support private keyword searching Do not support controlled searching or query isolation
11 Background and Definitions Let n = block length (or word length, assuming fixed length words) Let m = system parameter G G : K G S Pseudorandom generator,
12 Background and Definitions F F : K F X Y Pseudorandom function,, Pseudorandom permutation,, E : K E Z Z Pseudorandom function,, f : K f {0,1}* K f f E
13 Scheme I The Basic Scheme W 1 W 2 W 3 S 1 S 2 S 3 T 1 T 2 T 3 k 1 k 2 k 3 W l -1 W l T l -1 T l S l -1 S l k l -1 k l
14 Scheme I The Basic Scheme W 1 W 2 W 3 T 1 T 2 T 3 C 1 C 2 C 3 C i = W i T i W l -1 W l C l -1 C l T l -1 T l
15 Scheme I The Basic Scheme To encrypt: T i = S i, F ki (S i ) C i = W i T i Plaintext Stream Cipher W i S i F ki (S i ) + Ciphertext Alice generates a sequence F ki of random nonce S 1, S 2,..., S l Alice computes T i for each location in the document where T i = S i, F ki (S i )
16 Scheme I The Basic Scheme To search: Alice gives W i, k i to Bob Plaintext Stream Cipher W i S i F ki (S i ) + Ciphertext F ki
17 Scheme I Problem? Alice wants Bob to search for a word W, either: Alice reveal all k i to Bob Horrible security scheme! Alice must know in advance locations W may appear Horrible remote search scheme!
18 Scheme II Controlled Searching k i := f k' (W i ) To search: Alice gives W i, k i to Bob Plaintext Stream Cipher W i S i F ki (S i ) + Ciphertext F ki
19 Scheme II Problems? Does not support hidden queries Can we do better? Of course! Encryption!
20 Scheme III Support for Hidden Searches k := f Plaintext To search: i k' (Ek '' (Wi )) Alice gives Xi, ki to Bob Wi E Ek '' (Wi ) + Stream Cipher Si Fki Fki (Si ) Ciphertext
21 Scheme III Problems? How would Alice recover plaintext from ciphertext? Circular Dependency Need k i to decrypt C i Need W i to get k i Need to decrypt C i to get W i Need plaintext to decrypt plaintext?!?! Can we fix this?
22 Scheme IV The Final Scheme Plaintext To search: ki := fk ' (Li ) Alice gives Xi, ki to Bob Wi E Ek '' (Wi ) Li Ri + Stream Cipher Si Fki Fki (Si ) Ciphertext
23 Scheme IV The Final Scheme Plaintext To decrypt: Alice generates Si Computes Ti Si Get first n m bits = Li Compute ki := fk ' (Li ) ki := fk ' (Li ) Wi E Ek '' (Wi ) Li Ri + Stream Cipher Si Fki Fki (Si ) Ciphertext
24 Scheme IV Problems? Secure Encryption Scheme? Yes Secure Searchable Encryption Scheme? Statistical Attack? Periodically change the key, re-encrypt, and re-order ciphertexts Could decrease m to get more false matches
25 Discussion - Runtime For document of length n Search Algorithm: O(n) Encryption: O(n) Introduce almost no space and communication overhead Is search in O(n) really practical?
26 Possible Extensions (1) More Advanced Search Queries Boolean e.g. W and W Regular expression e.g. ab[a-z] Generates 26 search queries in the form: {aba, abb,, abz} Retrieve list of documents containing word of interest Store each word occurrence with a count e.g. <0, puppy>, <1, puppy>, Hides location information Could search for documents containing n or more occurrences of W by searching <n-1, W>
27 Possible Extensions (2) Variable-Length Words Pad to a fixed-size blocks Inefficient storage Store word length with the word itself How to search? Scan for a match at each possible bit boundary Inefficient search
28 Possible Extensions (3) Searching with Encrypted Index Index contains a list of key words List of pointers to documents containing itself with each word Each proposed extension assumes fixed size of documents pointer data Updates would not be pretty!
29 Related Work Revisited Searchable symmetric encryption: Improved definitions and efficient constructions (2006) [10] Work performed by server per returned document is constant Requires O(# of files) to search 2 nd construction achieves adaptive SSE security Privacy preserving keyword searches on remote encrypted data (2005) [6] Works with existing file encryption scheme Works with compressed files Dynamic searchable symmetric encryption (2012) [14] Search in O(# of files containing the word) Adaptive SSE secure Dynamic Highly-scalable searchable symmetric encryption with support for Boolean queries (2013) [7] Supports conjunctive searches and general Boolean queries More
30 Conclusion At the time, new techniques for Searchable Encryption Advantages: Provably secure Supports controlled and hidden search and query isolation Simple Introduce almost no space and communication overhead Disadvantages: O(n) Search algorithm Vulnerable to statistical attacks
31 References [1] Amato, Nancy M., and Michael C. Loui. "Checking linked data structures."fault-tolerant Computing, FTCS-24. Digest of Papers., Twenty-Fourth International Symposium on. IEEE, [2] Blaze, Matt. "A cryptographic file system for UNIX." Proceedings of the 1st ACM conference on Computer and communications security. ACM, [3] Blum, Manuel, et al. "Checking the correctness of memories." Algorithmica (1994): [4] Cachin, Christian, Silvio Micali, and Markus Stadler. "Computationally private information retrieval with polylogarithmic communication." Advances in Cryptology EUROCRYPT 99. Springer Berlin Heidelberg, [5] Canetti, Ran. Studies in secure multiparty computation and applications. Diss. The Weizmann Institute of Science, [6] Chang, Yan-Cheng, and Michael Mitzenmacher. "Privacy preserving keyword searches on remote encrypted data." Applied Cryptography and Network Security. Springer Berlin Heidelberg, [7] Cash, David, et al. "Highly-scalable searchable symmetric encryption with support for boolean queries." Advances in Cryptology CRYPTO Springer Berlin Heidelberg, [8] Chor, Benny, et al. "Private information retrieval." Journal of the ACM (JACM)45.6 (1998): [9] Chor, Benny, Niv Gilboa, and Moni Naor. Private information retrieval by keywords. Technion-IIT, Department of Computer Science, [10] Curtmola, Reza, et al. "Searchable symmetric encryption: improved definitions and efficient constructions." Proceedings of the 13th ACM conference on Computer and communications security. ACM, [11] Devanbu, Premkumar T., and Stuart G. Stubblebine. "Stack and queue integrity on hostile platforms." Software Engineering, IEEE Transactions on 28.1 (2002): [12] Gertner, Yael, et al. "Protecting data privacy in private information retrieval schemes." Proceedings of the thirtieth annual ACM symposium on Theory of computing. ACM, [13] Goldreich, Oded. "Secure multi-party computation." Manuscript. Preliminary version (1998). [14] Kamara, Seny, Charalampos Papamanthou, and Tom Roeder. "Dynamic searchable symmetric encryption." Proceedings of the 2012 ACM conference on Computer and communications security. ACM, [15] Kushilevitz, Eyal, and Rafail Ostrovsky. "Replication is not needed: Single database, computationally-private information retrieval." focs. Vol [16] Song, Dawn Xiaodong, David Wagner, and Adrian Perrig. "Practical techniques for searches on encrypted data." Security and Privacy, S&P Proceedings IEEE Symposium on. IEEE, 2000.
32 Questions?
SEARCHABLE SYMMETRIC ENCRYPTION
SEARCHABLE SYMMETRIC ENCRYPTION Er. Hariom Rathore 1 Dr. Amit Sharma 2 1 M.Tech Scholar, 2 Associate Professor, Department of Computer Science & Engineering, Vedant College of Engineering & Technology,Bundi,Rajasthan,(India)
More informationSecure Indexes. Eu-Jin Goh May 5, 2004
Secure Indexes Eu-Jin Goh eujin@cs.stanford.edu May 5, 2004 Abstract A secure index is a data structure that allows a querier with a trapdoor for a word x to test in O(1) time only if the index contains
More informationInternational Journal of Advance Engineering and Research Development. Secure and dynamic Multi-keyword Ranked Search Over Cloud Data
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 5, May -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Secure and
More informationInternational Journal of Modern Electronics and Communication Engineering (IJMECE) ISSN: Volume No.-4, Issue No.
A Review on Multi-Keyword Based Image Retrieval System for Encrypted Image Data Stored On Cloud Pawandeep 1, Hardeep Singh 2 1 Student, CSE department, CGC-COE Landran, Pawandeep.saini@gmail.com 2 Asst.
More informationRational Oblivious Transfer
Rational Oblivious Transfer Xiong Fan xfan@cs.umd.edu Kartik Nayak kartik1507@gmail.com May 14, 2014 Abstract Oblivious transfer is widely used in secure multiparty computation. In this paper, we propose
More informationYale University Department of Computer Science
Yale University Department of Computer Science Java Implementation of a Single-Database Computationally Symmetric Private Information Retrieval (cspir) protocol Felipe Saint-Jean 1 YALEU/DCS/TR-1333 July
More informationENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2,
ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2, DEPARTMENT OF CSE SAHAJA INSTITUTE OF TECHNOLOGY & SCIENCES FOR WOMEN, KARIMNAGAR ABSTRACT: The
More informationConstant-Time Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption. Prof. Dr. Sebastian Gajek NEC Research Labs and FUAS
Constant-Time Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption Prof. Dr. Sebastian Gajek NEC Research Labs and FUAS is a game changer 2 Searchable Encryption (SENC) Search
More informationOptimal Search Results Over Cloud with a Novel Ranking Approach
Optimal Search Results Over Cloud with a Novel Ranking Approach 1 Movva Kalpana, 2 JayanthiRao Madina 1 Final MTech student, 2 Assistant professor 1 Department of Software Engineering, SISTAM college,
More informationk Anonymous Private Query Based on Blind Signature and Oblivious Transfer
Edith Cowan University Research Online International Cyber Resilience conference Conferences, Symposia and Campus Events 2011 k Anonymous Private Query Based on Blind Signature and Oblivious Transfer Russell
More informationEXECUTION OF PRIVACY - PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER CLOUD INFORMATION
EXECUTION OF PRIVACY - PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER CLOUD INFORMATION Sunitha. N 1 and Prof. B. Sakthivel 2 sunithank.dvg@gmail.com and everrock17@gmail.com 1PG Student and 2 Professor
More informationSearchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations
Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Gilad Asharov Cornell-Tech Moni Naor Gil Segev Ido Shahaf (Hebrew University) Weizmann Hebrew
More informationDistributed ID-based Signature Using Tamper-Resistant Module
, pp.13-18 http://dx.doi.org/10.14257/astl.2013.29.03 Distributed ID-based Signature Using Tamper-Resistant Module Shinsaku Kiyomoto, Tsukasa Ishiguro, and Yutaka Miyake KDDI R & D Laboratories Inc., 2-1-15,
More informationSome Stuff About Crypto
Some Stuff About Crypto Adrian Frith Laboratory of Foundational Aspects of Computer Science Department of Mathematics and Applied Mathematics University of Cape Town This work is licensed under a Creative
More informationInternational Journal of Science Engineering and Advance Technology, IJSEAT,Vol.3,Issue 8
Multi-keyword Ranked Search over Encrypted Cloud Data Using RSA Algorithm KandiKattu Balaji Swamy 1, K.KISHORE RAJU 2 1 M.Tech (Information Technology), S.R.K.R ENGINEERING COLLEGE, A.P., India. 2 ASSISTANT
More informationPractical Private Regular Expression Matching
Practical Private Regular Expression Matching Florian Kerschbaum SAP Research Karlsruhe, Germany Florian.Kerschbaum@sap.com Abstract. Regular expressions are a frequently used tool to search in large texts.
More informationResearch Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel.
Research Statement Yehuda Lindell Dept. of Computer Science Bar-Ilan University, Israel. lindell@cs.biu.ac.il www.cs.biu.ac.il/ lindell July 11, 2005 The main focus of my research is the theoretical foundations
More informationCO-RELATION TECHNIQUE FOR SEARCHING OF ENCRYPTED DATA OVER CLOUD 1
CO-RELATION TECHNIQUE FOR SEARCHING OF ENCRYPTED DATA OVER CLOUD 1 Vrushali R. Charde, 2 Prof. Nitin S. More 1,2 Dept. of Information Technology Smt. Kashibai Navale College of Engg. Pune, India 1 vrushali24692@gmail.com,
More informationParallel and Dynamic Searchable Symmetric Encryption
Parallel and Dynamic Searchable Symmetric Encryption Seny Kamara 1 and Charalampos Papamanthou 2 1 Microsoft Research, senyk@microsoft.com 2 UC Berkeley, cpap@cs.berkeley.edu Abstract. Searchable symmetric
More informationReceiver-deniable Public-Key Encryption
International Journal of Network Security, Vol.8, No.2, PP.159 165, Mar. 2009 159 eceiver-deniable Public-Key Encryption Maged H. Ibrahim Department of Electronics, Communications and Computers, Faculty
More informationOn Robust Combiners for Private Information Retrieval and Other Primitives
On Robust Combiners for Private Information Retrieval and Other Primitives Remo Meier and Bartosz Przydatek Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland remmeier@student.ethz.ch,
More informationComputing on Encrypted Data
Computing on Encrypted Data Extended Abstract) Amit Sahai University of California, Los Angeles sahai@cs.ucla.edu Abstract. Encryption secures our stored data but seems to make it inert. Can we process
More informationStructured Encryption and Controlled Disclosure
Structured Encryption and Controlled Disclosure Melissa Chase Seny Kamara Microsoft Research Cloud Storage Security for Cloud Storage o Main concern: will my data be safe? o it will be encrypted o it will
More informationCRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext
CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public
More informationSymmetric Searchable Encryption with Efficient Conjunctive Keyword Search
1328 Jho et. al: Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search Nam-Su Jho 1, and Dowon Hong 2 1 Electronics
More informationImproving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted Cloud Data
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 4 April 2015, Page No. 11385-11390 Improving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted
More informationFINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA
FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA 1 M MOUNIKA 1 M.Tech Student, Department of CSE, Jyothishmathi institute of Technology & science, karimnagar,
More informationA compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.
A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography
More informationEfficiency Optimisation Of Tor Using Diffie-Hellman Chain
Efficiency Optimisation Of Tor Using Diffie-Hellman Chain Kun Peng Institute for Infocomm Research, Singapore dr.kun.peng@gmail.com Abstract Onion routing is the most common anonymous communication channel.
More informationIntroduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell
Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering
More informationEfficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Qin Liu, Chiu C. Tan, Jie Wu, and Guojun Wang School of Information Science and Engineering, Central South University,
More informationEncrypted databases. Tom Ristenpart CS 6431
Encrypted databases Tom Ristenpart CS 6431 Outsourced storage settings Client wants to store data up on Dropbox High availability, synch across devices Server includes much value-add functionality Keyword
More informationCryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption
More informationSecure Multiparty Computation
CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationSearchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations
Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Gilad Asharov Moni Naor Gil Segev Ido Shahaf IBM Research Weizmann Hebrew University Hebrew University
More information9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis
More informationAlternative Protocols for Generalized Oblivious Transfer
Alternative Protocols for Generalized Oblivious Transfer Bhavani Shankar 1, Kannan Srinathan 1, and C. Pandu Rangan 2 1 Center for Security, Theory and Algorithmic Research (C-STAR), International Institute
More informationChapter 3 Traditional Symmetric-Key Ciphers 3.1
Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric
More informationLecture 22 - Oblivious Transfer (OT) and Private Information Retrieval (PIR)
Lecture 22 - Oblivious Transfer (OT) and Private Information Retrieval (PIR) Boaz Barak December 8, 2005 Oblivious Transfer We are thinking of the following situation: we have a server and a client (or
More informationProtection of Data on Multiple Storage Providers
Malaysian Journal of Mathematical Sciences 11(S) August: 89-102 (2017) Special Issue: The 5th International Cryptology and Information Security Conference (New Ideas in Cryptology) MALAYSIAN JOURNAL OF
More informationCryptographic Primitives A brief introduction. Ragesh Jaiswal CSE, IIT Delhi
Cryptographic Primitives A brief introduction Ragesh Jaiswal CSE, IIT Delhi Cryptography: Introduction Throughout most of history: Cryptography = art of secret writing Secure communication M M = D K (C)
More informationPrivacy Preserving (Outsourced) Data Share and Search
Privacy Preserving (Outsourced) Data Share and Search Surrey Centre for Cyber Security, Department of Computer Science, University of Surrey. December 13, 2017 Outline Introduction 1 Introduction 2 3 4
More informationPrivate Large-Scale Databases with Distributed Searchable Symmetric Encryption
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption Yuval Ishai 1, Eyal Kushilevitz 2, Steve Lu 3, and Rafail Ostrovsky 4 1 Technion and UCLA, yuvali@cs.technion.ac.il 2 Technion,
More informationTracing Insider Attacks in the Context of Predicate Encryption Schemes
Tracing Insider Attacks in the Context of Predicate Encryption Schemes Jonathan Katz and Dominique Schröder University of Maryland Email: {jkatz,schroder}@cs.umd.edu Abstract In a predicate encryption
More informationCryptography. Dr. Michael Schneider Chapter 10: Pseudorandom Bit Generators and Stream Ciphers
Cryptography Dr. Michael Schneider michael.schneider@h-da.de Chapter 10: Pseudorandom Bit Generators and Stream Ciphers December 12, 2017 h_da WS2017/18 Dr. Michael Schneider 1 1 Random and Pseudorandom
More informationPractical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation
Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation Keith B. Frikken Department of Computer Science and Systems Analysis Miami University, Oxford, OH 45056
More informationLecture 19 - Oblivious Transfer (OT) and Private Information Retrieval (PIR)
Lecture 19 - Oblivious Transfer (OT) and Private Information Retrieval (PIR) Boaz Barak November 29, 2007 Oblivious Transfer We are thinking of the following situation: we have a server and a client (or
More informationDifferentially Private Access Patterns for Searchable Symmetric Encryption
Differentially Private Access Patterns for Searchable Symmetric Encryption Guoxing Chen, Ten-Hwang Lai, Michael K. Reiter, Yinqian Zhang Department of Computer Science and Engineering, The Ohio State University,
More informationCS Paul Krzyzanowski
Question 1 Explain why hypervisor rootkits are more difficult to detect than user-mode or kernel-mode rootkits. Computer Security 2018 Exam 2 Review Paul Krzyzanowski Rutgers University Spring 2018 The
More informationComputer Security Exam 2 Review. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 2018 Exam 2 Review Paul Krzyzanowski Rutgers University Spring 2018 April 16, 2018 CS 419 2018 Paul Krzyzanowski 1 Question 1 Explain why hypervisor rootkits are more difficult to detect
More informationEncrypted Data Deduplication in Cloud Storage
Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline
More informationMulti-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1
Multi-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1 M.Tech Student, Department of CSE, Narasaraopet Engineering College, Narasaraopet Guntur dist,
More informationCIS 6930/4930 Computer and Network Security. Project requirements
CIS 6930/4930 Computer and Network Security Project requirements Project Requirement Form a team of 3 people to complete the course project. The project has 100pts + 20pts (extra credit) Report requirement:
More informationCSE 127: Computer Security Cryptography. Kirill Levchenko
CSE 127: Computer Security Cryptography Kirill Levchenko October 24, 2017 Motivation Two parties want to communicate securely Secrecy: No one else can read messages Integrity: messages cannot be modified
More informationCS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong
CS573 Data Privacy and Security Cryptographic Primitives and Secure Multiparty Computation Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationBlock ciphers used to encode messages longer than block size Needs to be done correctly to preserve security Will look at five ways of doing this
Lecturers: Mark D. Ryan and David Galindo. Cryptography 2015. Slide: 74 Block ciphers used to encode messages longer than block size Needs to be done correctly to preserve security Will look at five ways
More informationOblivious Transfer with Adaptive Queries
Oblivious Transfer with Adaptive Queries Moni Naor and Benny Pinkas Dept. of Computer Science and Applied Mathematics Weizmann Institute of Science Rehovot 76100, Israel {naor,bennyp}@wisdom.weizmann.ac.il
More informationSecure Conjunctive Keyword Ranked Search over Encrypted Cloud Data
Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data Shruthishree M. K, Prasanna Kumar R.S Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.1 Introduction to Cryptography CSC 474/574 By Dr. Peng Ning 1 Cryptography Cryptography Original meaning: The art of secret writing Becoming a science that
More informationImprovement of Camenisch-Neven-Shelat Oblivious Transfer Scheme
Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme Zhengjun Cao and Hanyue Cao Department of Mathematics, Shanghai University, Shanghai, China caozhj@shu.edu.cn Abstract. In 2007, Camenisch,
More informationSecurity. Communication security. System Security
Security Communication security security of data channel typical assumption: adversary has access to the physical link over which data is transmitted cryptographic separation is necessary System Security
More informationZero-Knowledge Proof and Authentication Protocols
Zero-Knowledge Proof and Authentication Protocols Ben Lipton April 26, 2016 Outline Background Zero-Knowledge Proofs Zero-Knowledge Authentication History Example Protocols Guillou-Quisquater Non-zero-knowledge
More informationSearchable Encryption Using ORAM. Benny Pinkas
Searchable Encryption Using ORAM Benny Pinkas 1 Desiderata for Searchable Encryption Security No leakage about the query or the results Functionality Variety of queries that are supported Performance 2
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationPrivate Searching On Streaming Data
Private Searching On Streaming Data Rafail Ostrovsky 1 and William E. Skeith III 2 1 UCLA Computer Science Department, Email: rafail@cs.ucla.edu 2 UCLA Department of Mathematics, Email: wskeith@math.ucla.edu
More informationUsable PIR. Network Security and Applied. Cryptography Laboratory.
Network Security and Applied Cryptography Laboratory http://crypto.cs.stonybrook.edu Usable PIR NDSS '08, San Diego, CA Peter Williams petertw@cs.stonybrook.edu Radu Sion sion@cs.stonybrook.edu ver. 2.1
More informationPrivacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Muzammil Ahmed 1, Asrarullah Khan 2 1M.E Dept. of CSE, Matoshri Pratishthan Group of Institutions, Khupsarwadi, Nanded, Maharashtra
More informationA Fast Multi-Server, Multi-Block Private Information Retrieval Protocol
A Fast Multi-Server, Multi-Block Private Information Retrieval Protocol Luqin Wang, Trishank Karthik Kuppusamy, Yong Liu and Justin Cappos Department of Computer Science and Engineering Department of Electrical
More informationContent of this part
UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 5 More About Block Ciphers Israel Koren ECE597/697 Koren Part.5.1 Content of this
More informationProtocols for Secure Remote Database Access with Approximate Matching
CERIAS Tech Report 2000-15 Protocols for Secure Remote Database Access with Approximate Matching Wenliang Du, Mikhail J. Atallah Center for Education and Research in Information Assurance and Security
More informationCSC 774 Network Security
CSC 774 Network Security Topic 2. Review of Cryptographic Techniques CSC 774 Dr. Peng Ning 1 Outline Encryption/Decryption Digital signatures Hash functions Pseudo random functions Key exchange/agreement/distribution
More informationOne-way Functions are Essential for Single-Server. Private Information Retrieval. then one-way functions exist. 1 Introduction
One-way Functions are Essential for Single-Server Private Information Retrieval Amos Beimel Yuval Ishai y Eyal Kushilevitz z Tal Malkin x Abstract Private Information Retrieval (PIR) protocols allow a
More informationMichael Zohner (TU Darmstadt)
ABY -A Framework for Efficient Mixed-Protocol Secure Two-Party Computation Michael Zohner (TU Darmstadt) Joint work with Daniel Demmler and Thomas Schneider 19.02.15 ABY: Mixed-Protocol Secure Two-Party
More informationEfficient Private Information Retrieval
Efficient Private Information Retrieval K O N S T A N T I N O S F. N I K O L O P O U L O S T H E G R A D U A T E C E N T E R, C I T Y U N I V E R S I T Y O F N E W Y O R K K N I K O L O P O U L O S @ G
More informationCSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L
CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any
More informationCIS 4360 Secure Computer Systems Applied Cryptography
CIS 4360 Secure Computer Systems Applied Cryptography Professor Qiang Zeng Spring 2017 Symmetric vs. Asymmetric Cryptography Symmetric cipher is much faster With asymmetric ciphers, you can post your Public
More informationUNIT - IV Cryptographic Hash Function 31.1
UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service
More informationDual-Server Public-key Encryption with Keyword Search for Secure Cloud Storage
Dual-Server Public-key Encryption with Keyword Search for Secure Cloud Storage A.VIJAYA DURGA 1, N. KOTESWARAMMA 2, B. LAKSHMI PRAVEENA 3 1,2 Dept. of MCA, VVIT, Guntur, AP 3 Dept. of IT, VVIT, Guntur,
More informationNetwork Security Essentials Chapter 2
Network Security Essentials Chapter 2 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Encryption What is encryption? Why do we need it? No, seriously, let's discuss this. Why do we need
More informationLecture 1 Applied Cryptography (Part 1)
Lecture 1 Applied Cryptography (Part 1) Patrick P. C. Lee Tsinghua Summer Course 2010 1-1 Roadmap Introduction to Security Introduction to Cryptography Symmetric key cryptography Hash and message authentication
More informationAbstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp
Vol.2, No.2, June 30 (2016), pp. 35-41 http://dx.doi.org/10.21742/apjcri.2016.06.05 1) 2) Abstract Cloud computing gives an adaptable and helpful route for information sharing, which brings different advantages
More informationInternational Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES
Performance Comparison of Cryptanalysis Techniques over DES Anupam Kumar 1, Aman Kumar 2, Sahil Jain 3, P Kiranmai 4 1,2,3,4 Dept. of Computer Science, MAIT, GGSIP University, Delhi, INDIA Abstract--The
More informationGoals of Modern Cryptography
Goals of Modern Cryptography Providing information security: Data Privacy Data Integrity and Authenticity in various computational settings. Data Privacy M Alice Bob The goal is to ensure that the adversary
More informationHomework 2. Out: 09/23/16 Due: 09/30/16 11:59pm UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING
UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING ENEE 457 Computer Systems Security Instructor: Charalampos Papamanthou Homework 2 Out: 09/23/16 Due: 09/30/16 11:59pm Instructions
More informationInformation-Theoretic Private Information Retrieval: A Unified Construction (Extended Abstract)
Information-Theoretic Private Information Retrieval: A Unified Construction (Extended Abstract) Amos Beimel ½ and Yuval Ishai ¾ ¾ ½ Ben-Gurion University, Israel. beimel@cs.bgu.ac.il. DIMACS and AT&T Labs
More informationMultiple forgery attacks against Message Authentication Codes
Multiple forgery attacks against Message Authentication Codes David A. McGrew and Scott R. Fluhrer Cisco Systems, Inc. {mcgrew,sfluhrer}@cisco.com May 31, 2005 Abstract Some message authentication codes
More informationCryptography. Summer Term 2010
Cryptography Summer Term 2010 Harald Baier Chapter 3: Pseudo Random Bit Generators and Stream Ciphers Contents Random bits and pseudo random bits Stream ciphers Harald Baier Cryptography h_da, Summer Term
More informationRandomness Extractors. Secure Communication in Practice. Lecture 17
Randomness Extractors. Secure Communication in Practice Lecture 17 11:00-12:30 What is MPC? Manoj Monday 2:00-3:00 Zero Knowledge Muthu 3:30-5:00 Garbled Circuits Arpita Yuval Ishai Technion & UCLA 9:00-10:30
More informationEncryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message
More informationComputational Security, Stream and Block Cipher Functions
Computational Security, Stream and Block Cipher Functions 18 March 2019 Lecture 3 Most Slides Credits: Steve Zdancewic (UPenn) 18 March 2019 SE 425: Communication and Information Security 1 Topics for
More informationTOWARDS SECURE MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA
TOWARDS SECURE MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA Mrs.B.Jeeva, M.E., (CSE), Jay Shriram Group of Institutions, Tirupur. jeeva2mail@gmail.com Dr.S.Rajalakshmi, Associate Professor/CSE,
More information2.1 Basic Cryptography Concepts
ENEE739B Fall 2005 Part 2 Secure Media Communications 2.1 Basic Cryptography Concepts Min Wu Electrical and Computer Engineering University of Maryland, College Park Outline: Basic Security/Crypto Concepts
More informationCOMP4109 : Applied Cryptography
COMP4109 : Applied Cryptography Fall 2013 M. Jason Hinek Carleton University Applied Cryptography Day 4 (and 5 and maybe 6) secret-key primitives symmetric-key encryption security notions and types of
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Lecture 6 Michael J. Fischer Department of Computer Science Yale University January 27, 2010 Michael J. Fischer CPSC 467b, Lecture 6 1/36 1 Using block ciphers
More informationPrivacy Preserving Keyword Searches on Remote Encrypted Data
Privacy Preserving Keyword Searches on Remote Encrypted Data Yan-Cheng Chang and Michael Mitzenmacher Division of Engineering and Applied Sciences, Harvard University, Cambridge, MA 02138, USA {ycchang,michaelm}@eecs.harvard.edu
More informationVerifying Server Computation
Verifying Server Computation Lea Kissner 1 and Dawn Song 1 Carnegie Mellon University leak@cs.cmu.edu, dawnsong@cmu.edu Abstract. In many scenarios, clients receive the results of computation which has
More informationAttribute Based Encryption with Privacy Protection in Clouds
Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India
More informationCrypto: Symmetric-Key Cryptography
Computer Security Course. Song Crypto: Symmetric-Key Cryptography Slides credit: Dan Boneh, David Wagner, Doug Tygar Overview Cryptography: secure communication over insecure communication channels Three
More information0x1A Great Papers in Computer Security
CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,
More informationDECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE
DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE ABSTRACT We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority
More information