lecture: The World of Searchable Encryption
A glimpse into advanced cryptographic schemes
In this talk we will give a brief introduction to searchable (symmetric) encryption, i.e. search over encrypted data.
We found that many people cannot believe that it is possible to execute operations on ciphertext.
We want to rectify this by educating hackers of the magic of searchable encryption schemes.
We present different approaches to achieve searchable ciphertext, namely one with an index and one with cleverly encrypted words.
"The Cloud" has undoubtedly become very popular over the last decade.
Many people like the convenience of virtually unlimited storage and computing power at their fingertips.
However, people tend to dislike to disclose their data to third parties.
A simple solution would be encrypt the data before uploading it to a third party, but you may very well want to perform certain operations on the encrypted data such as a search.
This conflict of encryption and the ability to execute computations on data seems to be inherent.
However, clever encryption schemes which allow certain search operations on ciphertext exist!
We will present some searchable symmetric encryption schemes which enable others to search for keywords or substrings without learning they key nor the plaintext.
You may very well ask what the security implications in those cases are, so we will present the associated security notions.
Another concern is performance reg. speed or memory consumption.
We present our measurements of prototypical implementations and infer that searchable symmetric encryption schemes can indeed be practical.
Our vision is to store data remotely in an encrypted fashion without losing convenience of using third party applications.
We want to enable developers to secure their databases and we want to make users aware of advances in cryptography so that they demand more secure services.
Given the properties, other use cases of secure keyword search include email or document storage.
In fact, it is possible to not only secure relational databases, but to create secure big data scenarios where massive amounts of data are being handled.
Start time: 12:40
- Wir kochen Hagebuttenmarmelade