SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search

Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries. Prior works addressed this issue by means of for...

Full description

Bibliographic Details
Main Authors: Hyundo Yoon, Soojung Moon, Youngki Kim, Changhee Hahn, Wonjun Lee, Junbeom Hur
Format: Article
Language:English
Published: MDPI AG 2020-11-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/10/21/7842
_version_ 1797548779934580736
author Hyundo Yoon
Soojung Moon
Youngki Kim
Changhee Hahn
Wonjun Lee
Junbeom Hur
author_facet Hyundo Yoon
Soojung Moon
Youngki Kim
Changhee Hahn
Wonjun Lee
Junbeom Hur
author_sort Hyundo Yoon
collection DOAJ
description Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries. Prior works addressed this issue by means of forward privacy, but most of them suffer from significant performance degradation. In this paper, we present a novel forward private PEKS scheme leveraging Software Guard Extension (SGX), a trusted execution environment provided by Intel. The proposed scheme presents substantial performance improvements over prior work. Specifically, we reduce the query processing cost from <inline-formula><math display="inline"><semantics><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mo>)</mo></mrow></semantics></math></inline-formula> to <inline-formula><math display="inline"><semantics><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></semantics></math></inline-formula>, where <i>n</i> is the number of encrypted data. According to our performance analysis, the overall computation time is reduced by 80% on average. Lastly, we provide a formal security definition of SGX-based forward private PEKS, as well as a rigorous security proof of the proposed scheme.
first_indexed 2024-03-10T15:05:35Z
format Article
id doaj.art-e9a1e8aaacd74048b2e1cb63e37caef4
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-10T15:05:35Z
publishDate 2020-11-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-e9a1e8aaacd74048b2e1cb63e37caef42023-11-20T19:52:09ZengMDPI AGApplied Sciences2076-34172020-11-011021784210.3390/app10217842SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword SearchHyundo Yoon0Soojung Moon1Youngki Kim2Changhee Hahn3Wonjun Lee4Junbeom Hur5Department of Computer Science and Engineering, Korea University, Seoul 02841, KoreaSchool of Cybersecurity, Korea University, Seoul 02841, KoreaSchool of Cybersecurity, Korea University, Seoul 02841, KoreaDepartment of Computer Science and Engineering, Korea University, Seoul 02841, KoreaSchool of Cybersecurity, Korea University, Seoul 02841, KoreaDepartment of Computer Science and Engineering, Korea University, Seoul 02841, KoreaPublic key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries. Prior works addressed this issue by means of forward privacy, but most of them suffer from significant performance degradation. In this paper, we present a novel forward private PEKS scheme leveraging Software Guard Extension (SGX), a trusted execution environment provided by Intel. The proposed scheme presents substantial performance improvements over prior work. Specifically, we reduce the query processing cost from <inline-formula><math display="inline"><semantics><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mo>)</mo></mrow></semantics></math></inline-formula> to <inline-formula><math display="inline"><semantics><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></semantics></math></inline-formula>, where <i>n</i> is the number of encrypted data. According to our performance analysis, the overall computation time is reduced by 80% on average. Lastly, we provide a formal security definition of SGX-based forward private PEKS, as well as a rigorous security proof of the proposed scheme.https://www.mdpi.com/2076-3417/10/21/7842searchable encryptionPEKSforward privacytrusted execution environmentSGX
spellingShingle Hyundo Yoon
Soojung Moon
Youngki Kim
Changhee Hahn
Wonjun Lee
Junbeom Hur
SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search
Applied Sciences
searchable encryption
PEKS
forward privacy
trusted execution environment
SGX
title SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search
title_full SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search
title_fullStr SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search
title_full_unstemmed SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search
title_short SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search
title_sort speks forward private sgx based public key encryption with keyword search
topic searchable encryption
PEKS
forward privacy
trusted execution environment
SGX
url https://www.mdpi.com/2076-3417/10/21/7842
work_keys_str_mv AT hyundoyoon speksforwardprivatesgxbasedpublickeyencryptionwithkeywordsearch
AT soojungmoon speksforwardprivatesgxbasedpublickeyencryptionwithkeywordsearch
AT youngkikim speksforwardprivatesgxbasedpublickeyencryptionwithkeywordsearch
AT changheehahn speksforwardprivatesgxbasedpublickeyencryptionwithkeywordsearch
AT wonjunlee speksforwardprivatesgxbasedpublickeyencryptionwithkeywordsearch
AT junbeomhur speksforwardprivatesgxbasedpublickeyencryptionwithkeywordsearch