### Deterministic Public-Key Encryption under Continual Leakage

Venkata Koppula, Omkant Pandey, Yannis Rouselakis, and Brent Waters

##### Abstract

Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO 2007), is an important technique for searchable encryption; it allows quick, logarithmic-time, search over encrypted data items. The technique is most effective in scenarios where frequent search queries are performed over a huge database of unpredictable data items. We initiate the study of deterministic public-key encryption (D-PKE) in the presence of leakage. We formulate appropriate security notions for leakage-resilient D-PKE, and present constructions that achieve them in the standard model. We work in the continual leakage model, where the secret-key is updated at regular intervals and an attacker can learn arbitrary but bounded leakage on the secret key during each time interval. We, however, do not consider leakage during the updates. Our main construction is based on the (standard) linear assumption in bilinear groups, tolerat- ing up to 0.5 - o(1) fraction of arbitrary leakage. The leakage rate can be improved to 1 - o(1) by relying on the SXDH assumption. At a technical level, we propose and construct a “continual leakage resilient” version of the all-but-one lossy trapdoor functions, introduced by Peikert and Waters (STOC 2008). Our formulation and construction of leakage-resilient lossy-TDFs is of independent general interest for leakage-resilient cryptography.

Note: Revised proof of theorem 8 to refer to crooked version of generalized LHL, and included details of all hybrids.

Available format(s)
Category
Public-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Deterministic EncryptionContinual LeakageSearchable EncryptionLossy Trapdoor FunctionsAll-But-One Functions
Contact author(s)
kvenkata @ cs utexas edu
History
2015-08-16: last of 3 revisions
See all versions
Short URL
https://ia.cr/2014/780

CC BY

BibTeX

@misc{cryptoeprint:2014/780,
author = {Venkata Koppula and Omkant Pandey and Yannis Rouselakis and Brent Waters},
title = {Deterministic Public-Key Encryption under Continual Leakage},
howpublished = {Cryptology ePrint Archive, Paper 2014/780},
year = {2014},
note = {\url{https://eprint.iacr.org/2014/780}},
url = {https://eprint.iacr.org/2014/780}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.