Taking authenticated range queries to arbitrary dimensions
D Papadopoulos, S Papadopoulos… - Proceedings of the 2014 …, 2014 - dl.acm.org
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014•dl.acm.org
We study the problem of authenticated multi-dimensional range queries over outsourced
databases, where an owner outsources its database to an untrusted server, which maintains
it and answers queries to clients. Previous schemes either scale exponentially in the number
of query dimensions, or rely on heuristic data structures without provable bounds. Most
importantly, existing work requires an exponential, in the database attributes, number of
structures to support queries on every possible combination of dimensions in the database …
databases, where an owner outsources its database to an untrusted server, which maintains
it and answers queries to clients. Previous schemes either scale exponentially in the number
of query dimensions, or rely on heuristic data structures without provable bounds. Most
importantly, existing work requires an exponential, in the database attributes, number of
structures to support queries on every possible combination of dimensions in the database …
We study the problem of authenticated multi-dimensional range queries over outsourced databases, where an owner outsources its database to an untrusted server, which maintains it and answers queries to clients. Previous schemes either scale exponentially in the number of query dimensions, or rely on heuristic data structures without provable bounds. Most importantly, existing work requires an exponential, in the database attributes, number of structures to support queries on every possible combination of dimensions in the database. In this paper, we propose the first schemes that (i) scale linearly with the number of dimensions, and (ii) support queries on any set of dimensions with linear in the number of attributes setup cost and storage. We achieve this through an elaborate fusion of novel and existing set-operation sub-protocols. We prove the security of our solutions relying on the q-Strong Bilinear Diffie-Hellman assumption, and experimentally confirm their feasibility.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果