Searching on Encrypted Data without Revealing the Search Predicate

Download Report

Transcript Searching on Encrypted Data without Revealing the Search Predicate

Searching on Encrypted Data Without
Revealing the Search Predicate
Ananth Raghunathan
Stanford University
(joint work with Dan Boneh & Gil Segev)
Public-Key Encryption
public key
secret
key
c
m
m
Bob
Alice
Learns nothing!
More precisely:
Searching on Encrypted Data
(Boneh, Raghunathan, Segev)
≈
SINET ITSEF 2013
(to
)
Public-Key Encryption with Keyword Search
Payment
Routing
Gateway
Scenario 1: Payment Gateway
Searching on Encrypted Data
(Boneh, Raghunathan, Segev)
SINET ITSEF 2013
Public-Key Encryption with Keyword Search
Assistant
Urgent!
Email
routing
proxy
Later
Scenario 2: Email forwarding
Searching on Encrypted Data
(Boneh, Raghunathan, Segev)
SINET ITSEF 2013
Requirements
An encryption scheme that allow untrusted
proxies to test for keywords (“tokens”)
– Without a token, the proxy learns nothing.
– With a token, the proxy learns whether message
contains the keyword or not and nothing else.
– (Implied) Tokens generated by secret key holder.
Searching on Encrypted Data
(Boneh, Raghunathan, Segev)
SINET ITSEF 2013
PEKS definition (Boneh et al. ‘04)
secret key
“BoA”
TokBoA
Payment
Routing
Gateway
public key
• PEKS(pk,w) is publicly computable
• Generating Tokw requires the secret key
• Given TokBoA and PEKS(pk, w), the
gateway can check if keyword w=“BoA”
or not (algorithm Test)
PEKS (pk, “BoA”)
TokWF
TokChase
TokBoA
Searching on Encrypted Data
(Boneh, Raghunathan, Segev)
SINET ITSEF 2013
Security: Overview
Informally: the attacker is given tokens of his choice and should
not be able to Test for w for which he does not have a token.
(to
PEKS (pk, “BoA”)
Payment
Routing
Gateway
TokWF
TokChase
TokBoA
Searching on Encrypted Data
(Boneh, Raghunathan, Segev)
SINET ITSEF 2013
Yes for “BoA”
)
Security: Overview
Informally: the attacker is given tokens of his choice and should
not be able to Test for w for which he does not have a token.
(to
PEKS (pk, “JP Morgan”)
Payment
Routing
Gateway
TokWF
TokChase
TokBoA
Searching on Encrypted Data
(Boneh, Raghunathan, Segev)
SINET ITSEF 2013
)
Predicate privacy
• Previous research did not consider information leaked by Tok
• Several schemes even explicitly leak w in Tokw
• Motivation 1: Payment gateway
– Routing information might be sensitive
– Transactions tagged with “suspected fraudulent” or other attributes
that affect routing but shouldn’t be revealed to a gateway
• Motivation 2: Encrypted email filter
– Keywords are sensitive: “Urgent” keywords might leak information
about personal life or medical data
• Can we model a realistic notion of predicate privacy?
• Can we construct schemes that satisfy predicate privacy?
Searching on Encrypted Data
(Boneh, Raghunathan, Segev)
SINET ITSEF 2013
Our work
• Model predicate privacy (“Tok
noProxy
more
Email
example:
encrypts
w leaks
PEKS(pk, “Doctor’s appointment”)
information than necessary”)
and sees whether Tok outputs Y or N
– Closely related to program obfuscation
– If attacker can guess w then he can check quickly:
Compute PEKS(pk,w) and test if Tok outputs “yes” or “no”
– Our definition: If the keyword w “cannot be guessed” by
the attacker, then Tokw ≈ Tokrandom
• Constructions: First PEKS schemes with predicate privacy
– We give a general approach to add predicate privacy to
existing schemes
Searching on Encrypted Data
(Boneh, Raghunathan, Segev)
SINET ITSEF 2013
More expressive predicates
In PEKS, p(id) checks if id = w
or not and sk corresponds to
Tok
• A different formulation
– Encrypt a tuple (id,m)
– Secret key skp
– Decryption algorithm given Enc(id,m) and skp recover m only if p(id)=1
• [Boneh et al. ‘04]: Equality predicate (point function)
• [Boneh-Waters ‘07]: Conjunctive, subset, and range queries
• [Katz-Sahai-Waters ‘08, Agrawal-Freeman-Vaikuntanathan ‘11]: Inner
product, polynomial equations, and disjunctions
• [Shen-Shi-Waters ‘09]: Inner product (but symmetric-key setting)
• [Shi-Waters ‘08, Okamoto-Takashima ‘09, Lewko et al. ‘10]: Hierarchical
inner product systems
Searching on Encrypted Data
(Boneh, Raghunathan, Segev)
SINET ITSEF 2013
Thank you!
Any questions?
[email protected]