22 Mar 2024 | Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang
The paper introduces a new security model for Dynamic Searchable Symmetric Encryption (DSSE) called post-compromise security, which addresses the risk of secret key compromise. The authors propose a protocol called "Bamboo" that provides post-compromise security, ensuring data confidentiality even if a client's secret key is leaked. Bamboo uses a two-layer encryption mechanism and a hidden chain-like inter-ciphertext structure to achieve this. The two-layer encryption ensures that even if the secret key is compromised, the ciphertexts generated during the compromised period remain secure. The hidden chain-like structure allows efficient search operations by linking ciphertexts encrypted with the same keyword.
Bamboo also supports a non-interactive KeyUpdate protocol, which allows clients to update their secret keys without requiring interaction with the server. This protocol ensures that the new secret key is unknown to the server, preventing the server from decrypting ciphertexts generated after the key update. The protocol is designed to be efficient, with constant bandwidth and computational costs for KeyUpdate.
The paper evaluates Bamboo's performance using a real-world dataset and compares it with existing DSSE schemes. The results show that Bamboo provides strong security with better or comparable performance. The paper also defines the security model for SEKU (Searchable Encryption with Key-Update), which includes forward and backward security. The proposed protocol satisfies both forward and backward security requirements, making it a robust solution for DSSE in the face of secret key compromise.The paper introduces a new security model for Dynamic Searchable Symmetric Encryption (DSSE) called post-compromise security, which addresses the risk of secret key compromise. The authors propose a protocol called "Bamboo" that provides post-compromise security, ensuring data confidentiality even if a client's secret key is leaked. Bamboo uses a two-layer encryption mechanism and a hidden chain-like inter-ciphertext structure to achieve this. The two-layer encryption ensures that even if the secret key is compromised, the ciphertexts generated during the compromised period remain secure. The hidden chain-like structure allows efficient search operations by linking ciphertexts encrypted with the same keyword.
Bamboo also supports a non-interactive KeyUpdate protocol, which allows clients to update their secret keys without requiring interaction with the server. This protocol ensures that the new secret key is unknown to the server, preventing the server from decrypting ciphertexts generated after the key update. The protocol is designed to be efficient, with constant bandwidth and computational costs for KeyUpdate.
The paper evaluates Bamboo's performance using a real-world dataset and compares it with existing DSSE schemes. The results show that Bamboo provides strong security with better or comparable performance. The paper also defines the security model for SEKU (Searchable Encryption with Key-Update), which includes forward and backward security. The proposed protocol satisfies both forward and backward security requirements, making it a robust solution for DSSE in the face of secret key compromise.