Pattern Matching over Encrypted Data with a Short Ciphertext

Jongkil Kim, Willy Susilo, Yang Wai Chow, Joonsang Baek, Intae Kim

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

In this paper, we propose a new searchable encryption with shiftable trapdoor (SEST) scheme to enable pattern matching over encrypted data. In the proposed scheme, data is encrypted per character and the trapdoor for searching can be shifted. This implies that the trapdoor can be created over any string, which is not necessarily pre-defined. Also, it does not require any additional data tokenization method, which will expand the ciphertext size. As ciphertext size increases with the size of data, it is imperative to reduce ciphertext size in the SEST scheme as the matching operation requires expensive pairing computations proportional to the ciphertext length. Our work reduces the ciphertext size by up to 50% of the state-of-art scheme in this research domain while maintaining the same level of search efficiency.

Original languageEnglish
Title of host publicationInformation Security Applications - 22nd International Conference, WISA 2021, Revised Selected Papers
EditorsHyoungshick Kim
PublisherSpringer Science and Business Media Deutschland GmbH
Pages132-143
Number of pages12
ISBN (Print)9783030894313
DOIs
StatePublished - 2021
Event22nd World Conference on Information Security Application, WISA 2021 - Jeju, Korea, Republic of
Duration: 11 Aug 202113 Aug 2021

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13009 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference22nd World Conference on Information Security Application, WISA 2021
Country/TerritoryKorea, Republic of
CityJeju
Period11/08/2113/08/21

Bibliographical note

Publisher Copyright:
© 2021, Springer Nature Switzerland AG.

Fingerprint

Dive into the research topics of 'Pattern Matching over Encrypted Data with a Short Ciphertext'. Together they form a unique fingerprint.

Cite this