Visible to the public Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

TitleForward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
Publication TypeConference Paper
Year of Publication2017
AuthorsBost, Raphael, Minaud, Brice, Ohrimenko, Olga
Conference NameProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4946-8
Keywordsbackward privacy, composability, constrained prf, forward privacy, pubcrawl, puncturable encryption, Resiliency, Searchable encryption
AbstractUsing dynamic Searchable Symmetric Encryption, a user with limited storage resources can securely outsource a database to an untrusted server, in such a way that the database can still be searched and updated efficiently. For these schemes, it would be desirable that updates do not reveal any information a priori about the modifications they carry out, and that deleted results remain inaccessible to the server a posteriori. If the first property, called forward privacy, has been the main motivation of recent works, the second one, backward privacy, has been overlooked. In this paper, we study for the first time the notion of backward privacy for searchable encryption. After giving formal definitions for different flavors of backward privacy, we present several schemes achieving both forward and backward privacy, with various efficiency trade-offs. Our constructions crucially rely on primitives such as constrained pseudo-random functions and puncturable encryption schemes. Using these advanced cryptographic primitives allows for a fine-grained control of the power of the adversary, preventing her from evaluating functions on selected inputs, or decrypting specific ciphertexts. In turn, this high degree of control allows our SSE constructions to achieve the stronger forms of privacy outlined above. As an example, we present a framework to construct forward-private schemes from range-constrained pseudo-random functions. Finally, we provide experimental results for implementations of our schemes, and study their practical efficiency.
URLhttp://doi.acm.org/10.1145/3133956.3133980
DOI10.1145/3133956.3133980
Citation Keybost_forward_2017