Multi-user searchable encryption in the Cloud

Van Rompay, Cedric; Molva, Re fik; Önen, Melek
ISC 2015, 18th International Conference on Information Security, September 9-11, 2015, Trondheim, Norway

While Searchable Encryption (SE) has been widely studied, adapting it to the multi-user setting whereby many users can upload secret les or documents and delegate search operations to multiple other users still remains an interesting problem. In this paper we show that the adversarial models used in existing multi-user searchable encryption
solutions are not realistic as they implicitly require that the cloud service provider cannot collude with some users. We then propose a stronger adversarial model, and propose a construction which is both practical and provably secure in this new model. The new solution combines the use of bilinear pairings with private information retrieval and introduces a new, non trusted entity called \proxy" to transform each user's search
query into one instance per targeted le or document.

DOI
HAL
Type:
Conference
City:
Trondheim
Date:
2015-09-09
Department:
Digital Security
Eurecom Ref:
4633
Copyright:
© Springer. Personal use of this material is permitted. The definitive version of this paper was published in ISC 2015, 18th International Conference on Information Security, September 9-11, 2015, Trondheim, Norway and is available at : http://dx.doi.org/10.1007/978-3-319-23318-5_17

PERMALINK : https://www.eurecom.fr/publication/4633