Browse > Article
http://dx.doi.org/10.5909/JBE.2008.13.1.43

Efficient Oblivious Search on Encrypted Data  

Rhee, Hyun-Sook (Graduate School of Information Security Korea University)
Park, Jong-Hwan (Graduate School of Information Security Korea University)
Lee, Dong-Hoon (Graduate School of Information Security Korea University)
Publication Information
Journal of Broadcast Engineering / v.13, no.1, 2008 , pp. 43-52 More about this Journal
Abstract
We study the problem of search in which a server contains various multimedia contents and a user wishes to retrieve some multimedia items containing a specific without revealing to the server which items they are. Recently, Ogata and Kurosawa introduced a search scheme by using the notion of oblivious transfer. In their scheme, a user must inefficiently search and compare all the data stored in the seuer for each search query. In this paper, we propose an efficient oblivious search by using the oblivious transfer, in which a user needs not to search and compare all the data. We formally prove that the proposed scheme is secure under the hardness of RSA known target inversion problem.
Keywords
Keyword Search; Oblivious Transfer;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Ogata, K. Kurosawa, 'Oblivious Keyword Search', Journal of complexity'04, Vol 20. April/Jun 2004
2 M. Rabin, 'How to exchange secrets by oblivious transfer', Technical Report TR 81, Aiken computation Lab, Harvard University
3 B. R. Waters, D. Balfanz, G. Durfee and D. K. Smetters, 'Building an Encrypted and Searchable Audit Log', 11th Annual Network and Distributed Security Symposium (NDSS '04); 2004
4 P. Golle, J. Staddon and B. Waters, 'Secure Conjunctive Keyword Search Over Encrypted Data', Proceedings of the Second International Conference on ACNS:Applied Cryptography and Network Security, 2004
5 Y. C. Chang , M. Mitzenmacher, 'privacy preserving keyword searches on remote encrypted data', ePrint, October 7th 2003
6 E. J. Goh, 'secure index', Cryptology ePrint Archive, October 7th 2003
7 D. Song, D. Wagner, and A. Perrige, 'Practical Techniques for searches on Encrypted Data', In Proc. of the 2000 IEEE Security and Privacy Symposium, May 2000
8 D. Park, K. Kim and P. Lee, 'Public key Encryption with Conjunctive Field Keyword Search', WISA'04, LNCS 3325, pp73-86, 2004
9 D. Boneh, G. D. Crescenzo, R. Ostrovsky and G. Persiano, 'Public key Encryption with Keyword Search', EUROCRYPT'04, 2004
10 M. Bellare, C. Namprempre, D. Pioncheval, 'The Power of RSA Onversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme', Proc. of Finandcial Cryptography 2001, LNCS vol. 2339, pp. 319-338
11 M. Noar and B. Pinkas, 'Efficient Oblivious trnasfer protocols', 12th Annual Symposium on Discrete Algorithms(SODA), pp 448-457(2001)