EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


24788 A Survey of Provably Secure Searchable Encryption
Home Policy Brochure Browse Search User Area Contact Help

Bösch, C.T. and Hartel, P.H. and Jonker, W. and Peter, A. (2014) A Survey of Provably Secure Searchable Encryption. ACM computing surveys, 47 (2). 18:1-18:51. ISSN 0360-0300 *** ISI Impact 5,243 ***

Full text available as:

PDF

1308 Kb
Open Access



Official URL: http://dx.doi.org/10.1145/2636328

Exported to Metis

Abstract

We survey the notion of provably secure Searchable Encryption (SE) by giving a complete and comprehensive overview of the two main SE techniques: Searchable Symmetric Encryption (SSE) and Public Key Encryption with Keyword Search (PEKS). Since the pioneering work of Song, Wagner and Perrig (IEEE S&P ’00), the field of provably secure SE has expanded to the point where we felt that taking stock would provide benefit to the community.
The survey has been written primarily for the non-specialist who has a basic information security background. Thus, we sacrifice full details and proofs of individual constructions in favor of an overview of the underlying key techniques. We categorize and compare the different SE schemes in terms of their security, efficiency, and functionality. For the experienced researcher we point out connections between the many approaches to SE and identify open research problems.
Two major conclusions can be drawn from our work. While the so-called IND-CKA2 security notion becomes prevalent in the literature and efficient (sub-linear) SE schemes meeting this notion exist in the symmetric setting, achieving this strong form of security efficiently in the asymmetric setting remains an open problem. We observe that in multi-recipient SE schemes, regardless of their efficiency drawbacks, there is a noticeable lack of query expressiveness which hinders deployment in practice.

Item Type:Article
Research Group:EWI-DB: Databases, EWI-SCS: Services, Cyber security and Safety
Research Program:CTIT-ISTRICE: Integrated Security and Privacy in a Networked World
Research Project:COMMIT/THeCS: Trusted Healthcare Systems
ID Code:24788
Status:Published
Deposited On:12 June 2014
Refereed:Yes
International:Yes
ISI Impact Factor:5,243
More Information:statisticsmetis

Export this item as:

To correct this item please ask your editor

Repository Staff Only: edit this item