Cryptology ePrint Archive: Report 2014/706

The Feasibility of Outsourced Database Search in the Plain Model

Carmit Hazay and Hila Zarosim

Abstract: The problem of securely outsourcing computation to an untrusted server gained momentum with the recent penetration of cloud computing services. The ultimate goal in this setting is to design efficient protocols that minimize the computational overhead of the clients and instead rely on the extended resources of the server. In this paper, we focus on the outsourced database search problem which is highly motivated in the context of delegatable computing since it offers storage alternatives for massive databases, that may contain confidential data. This functionality is described in two phases: (1) setup phase and (2) query phase. The main goal is to minimize the parties workload in the query phase so that it is proportional to the query size and its corresponding response.

We study whether a trusted setup or a random oracle are necessary for protocols with minimal interaction that meet the optimal communication and computation bounds in the query phase. We answer this question positively and demonstrate a lower bound on the communication or the computational overhead in this phase.

Category / Keywords: cryptographic protocols / Outsourced Computation, Database Search Functionalities, Lower Bound, Communication and Computational Complexities, Minimal Interaction

Original Publication (with minor differences): SCN 2016

Date: received 8 Sep 2014, last revised 29 Jun 2016

Contact author: carmit hazay at biu ac il

Available format(s): PDF | BibTeX Citation

Version: 20160629:100936 (All versions of this report)

Short URL: ia.cr/2014/706

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]