计算机科学
萃取(化学)
人工智能
算法
模式识别(心理学)
计算机视觉
特征提取
作者
Rui Wen,Yu Yu,Xiang Xie,Yang Zhang
出处
期刊:Computer and Communications Security
日期:2020-10-30
被引量:1
标识
DOI:10.1145/3372297.3417237
摘要
Secure search looks for and retrieves records from a (possibly cloud-hosted) encrypted database while ensuring the confidentiality of the queries. Researchers are paying increasing attention to secure search in recent years due to the growing concerns about database privacy. However, the low efficiency of (especially multiplicative) homomorphic operations in secure search has hindered its deployment in practice. To address this issue, Akavia et al. [CCS 2018, PETS 2019] proposed new protocols that bring down the number of multiplications in the search algorithm from O(n2) to O(n log2 n), and then to O(n log n), where n is the size of the database. In this paper, we present the first secure search protocol -- LEAF and its variant LEAF+ -- which only requires $O(n)$ multiplications. Specifically, at the core of LEAF are three novel methods we propose, referred to as Localization, Extraction, and Reconstruction. In addition, LEAF enjoys low communication complexity and only requires the client to perform decryption, which adds its advantage in deployment on weak-power devices such as mobile phones.
科研通智能强力驱动
Strongly Powered by AbleSci AI