Multi-Key Searchable Encryption, Revisited

@article{Hamlin2018MultiKeySE,
  title={Multi-Key Searchable Encryption, Revisited},
  author={Ariel Hamlin and Abhi Shelat and Mor Weiss and Daniel Wichs},
  journal={IACR Cryptol. ePrint Arch.},
  year={2018},
  volume={2018},
  pages={18}
}
We consider a setting where users store their encrypted documents on a remote server and can selectively share documents with each other. A user should be able to perform keyword searches over all the documents she has access to, including the ones that others shared with her. The contents of the documents, and the search queries, should remain private from the server. 
Symmetric Searchable Encryption with Sharing and Unsharing
TLDR
The concept of a Symmetric Searchable Encryption with Sharing and Unsharing, an extension of Multi-Key SearchableEncryption (NSDI ’14), that supports dynamic sharing and unsharing of documents amongst users is introduced.
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model
TLDR
In this work, the tradeoffs between privacy and efficiency for EMMs are formally examined.
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing
We introduce the notion of a Functionally Encrypted Datastore which collects data anonymously from multiple data-owners, stores it encrypted on an untrusted server, and allows untrusted clients to
Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage
TLDR
This work presents the first MUSE protocol that does protect against user-server collusions, and yet scales very well, and it is proved that the leakage of the protocol is limited to the access pattern of queries.
Multi-User Collusion-Resistant Searchable Encryption with Optimal Search Time
TLDR
This work proposes three novel multi-user searchable encryption schemes for this setting that achieve different trade-offs between performance and leakage, and is the first to achieve asymptotically optimal search time.
Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages
TLDR
An SSE scheme which employs a secure index for searching a keyword which takes into account the location of the queried keyword in the documents by targeting a matrix-type data format and enables an administrator to search personal information listed per line or column in CSV-like format data.
Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing
TLDR
A new verifiable MKSE (VMKSE) scheme by leveraging Garbled Bloom Filter, which can simultaneously support verifiability of search result and secure data sharing in multi-user setting is proposed.
Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation
TLDR
This paper discusses the security of KASE formally and proposes another provably secure scheme, named main construction, with respect to trapdoors in a two-server setting, which guarantees the privacy of a search, encrypted files, and aggregate keys.
Aggregate Searchable Encryption With Result Privacy
TLDR
An aggregate searchable encryption with result privacy (ASE-RP) that includes ASearch() algorithm that performs aggregate operation (i.e. Count *) on the implicitly searched ciphertexts (for the conjunctive query) and outputs an encrypted result.
Delegatable searchable encryption with specified keywords for EHR systems
TLDR
This work presents an efficient solution to the problem of delegated searchable encryption, gives a concrete construction, and shows that the construction is efficient and practical for real applications by experimental results.
...
...

References

SHOWING 1-10 OF 42 REFERENCES
Multi-Key Searchable Encryption
TLDR
A searchable encryption scheme that enables keyword search over data encrypted with different keys is constructed that was designed to be included in a new system for protecting data confidentiality in client-server applications against attacks on the server.
Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control
TLDR
This paper proposes a keyword search scheme for the cryptographic cloud storage based on attribute-based cryptosystems that presents a new keyword search notion: fine-grained access control aware keyword search.
Practical techniques for searches on encrypted data
  • D. Song, D. Wagner, A. Perrig
  • Computer Science, Mathematics
    Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000
  • 2000
TLDR
This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Key-Aggregate Searchable Encryption ( KASE ) For Group Data Sharing via Cloud Storage
TLDR
A differential attack on One-to-Many OPE by way of exploiting the variations of the ordered cipher texts is proposed and the experimental results show that the cloud server can get a good estimate of the distribution of relevance rankings by using a differential attack.
Nothing is for Free: Security in Searching Shared and Encrypted Data
  • Qiang Tang
  • Computer Science, Mathematics
    IEEE Transactions on Information Forensics and Security
  • 2014
TLDR
A new security model for MPSE is presented by considering the worst case and average-case scenarios, which capture different server-user collusion possibilities, and employing the bilinear property of Type-3 pairings to prove its security based on the bil inear Diffie-Hellman variant and symmetric external Diffie -Hellman assumptions in the random oracle model.
Privacy Preserving Keyword Searches on Remote Encrypted Data
TLDR
This paper offers solutions for the problem of efficiently retrieving some of the encrypted files containing (or indexed by) specific keywords, keeping the keywords themselves secret and not jeopardizing the security of the remotely stored files.
Building Web Applications on Top of Encrypted Data Using Mylar
TLDR
Mylar is presented, a platform for building web applications, which protects data confidentiality against attackers with full access to servers, and stores sensitive data encrypted on the server, and decrypts that data only in users' browsers.
Practical Dynamic Searchable Encryption with Small Leakage
TLDR
This paper proposes the first DSSE scheme that achieves the best of both worlds, i.e., both small leakage and efficiency, and provides an implementation of the scheme, showing its practical efficiency.
A Leakage-Abuse Attack Against Multi-User Searchable Encryption
TLDR
It is shown that in the special case of Multi-User Searchable Encryption (MUSE), where many users upload and search data in a cloud-based infrastructure, a large number of existing solutions have a common leakage in addition to the well-studied access pattern leakage.
Searchable symmetric encryption: improved definitions and efficient constructions
TLDR
This paper formally defines SSE in the multi-user setting, and presents an efficient construction that achieves better performance than simply using access control mechanisms.
...
...