Skip to main content

Searchable Encryption Semantics

  • Chapter
  • First Online:
Searchable Encryption

Part of the book series: Wireless Networks ((WN))

  • 665 Accesses

Abstract

After acquiring adequate background knowledge, we are now about to advance to the world of searchable encryption, which has made prosperous progress since its first construction in the early 2000s. Since mainstream designs in searchable encryption focus on symmetric key-based primitives, we will focus on them in this chapter and only briefly discuss other designs when necessary.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bloom BH (1970) Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13(7):422–426

    Article  MATH  Google Scholar 

  2. Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Advances in Cryptology—EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2–6, 2004, Proceedings, Springer, Lecture Notes in Computer Science, vol 3027, pp 506–522

    Google Scholar 

  3. Chang F, Dean J, Ghemawat S, Hsieh WC, Wallach DA, Burrows M, Chandra T, Fikes A, Gruber R (2006) Bigtable: A distributed storage system for structured data (awarded best paper!). In: 7th Symposium on Operating Systems Design and Implementation (OSDI ’06), November 6–8, Seattle, WA, USA, USENIX Association, pp 205–218

    Google Scholar 

  4. Chase M, Kamara S (2010) Structured encryption and controlled disclosure. In: Advances in Cryptology—ASIACRYPT 2010—16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5–9, 2010. Proceedings, Springer, Lecture Notes in Computer Science, vol 6477, pp 577–594

    Google Scholar 

  5. Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30–November 3, 2006, ACM, pp 79–88

    Google Scholar 

  6. Goh EJ (2003) Secure indexes. IACR Cryptology ePrint Archive p 216

    Google Scholar 

  7. Islam MS, Kuzu M, Kantarcioglu M (2012) Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In: 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5–8, 2012, The Internet Society

    Google Scholar 

  8. Kamara S, Moataz T (2019) Computationally volume-hiding structured encryption. In: Advances in Cryptology—EUROCRYPT 2019—38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Springer, Lecture Notes in Computer Science, vol 11477, pp 183–213

    Google Scholar 

  9. Kamara S, Moataz T, Ohrimenko O (2018) Structured encryption and leakage suppression. In: Advances in Cryptology—CRYPTO 2018—38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Springer, Lecture Notes in Computer Science, vol 10991, pp 339–370

    Google Scholar 

  10. Li R, Liu AX (2017) Adaptively secure conjunctive query processing over encrypted data for cloud computing. In: 33rd IEEE International Conference on Data Engineering, ICDE 2017, San Diego, CA, USA, April 19–22, 2017, IEEE Computer Society, pp 697–708

    Google Scholar 

  11. Lindell Y (2016) How to simulate it—A tutorial on the simulation proof technique. IACR Cryptology ePrint Archive p 46

    Google Scholar 

  12. Nowak D, Zhang Y (2010) A calculus for game-based security proofs. In: Provable Security—4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings, Springer, Lecture Notes in Computer Science, vol 6402, pp 35–52

    Google Scholar 

  13. Patel S, Persiano G, Yeo K, Yung M (2019) Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11–15, 2019, ACM, pp 79–93

    Google Scholar 

  14. Song DX, Wagner DA, Perrig A (2000) Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14–17, 2000, IEEE Computer Society, pp 44–55

    Google Scholar 

  15. Wang J, Chow SSM (2022) Omnes pro uno: Practical Multi-Writer encrypted database. In: 31st USENIX Security Symposium (USENIX Security 22), USENIX Association, Boston, MA, pp 2371–2388

    Google Scholar 

  16. Xu P, Wu Q, Wang W, Susilo W, Domingo-Ferrer J, Jin H (2015) Generating searchable public-key ciphertexts with hidden structures for fast keyword search. IEEE Transactions on Information Forensics and Security 10(9):1993–2006

    Article  Google Scholar 

  17. Zeng M, Qian H, Chen J, Zhang K (2022) Forward secure public key encryption with keyword search for outsourced cloud storage. IEEE Transactions on Cloud Computing 10(1):426–438

    Article  Google Scholar 

  18. Zhao Y, Wang H, Lam K (2021) Volume-hiding dynamic searchable symmetric encryption with forward and backward privacy. IACR Cryptology ePrint Archive p 786

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ren, K., Wang, C. (2023). Searchable Encryption Semantics. In: Searchable Encryption. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-031-21377-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-21377-9_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-21376-2

  • Online ISBN: 978-3-031-21377-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics