Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Taming the round efficiency of cryptographic protocols for private web search schemes

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Myungsun-
dc.contributor.authorLee, InJae-
dc.date.accessioned2023-01-19T01:41:33Z-
dc.date.available2023-01-19T01:41:33Z-
dc.date.created2023-01-18-
dc.date.issued2023-04-
dc.identifier.issn0020-0255-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/86668-
dc.description.abstractPrivate web search (PWS) schemes allow users to find information on the internet while preserving their privacy. Among them, cryptographic PWS schemes guarantee strong pri-vacy at the cost of performance. Their design principle is that each user takes a list of ciphertexts as inputs from its predecessor and forwards a shuffled list of the input to its successor. This idea is quite reasonable but requires O(n) round complexity with respect to the number of users n. Because these cryptographic PWS schemes are interaction -intensive, this long delay causes network latency and dictates the local computational cost. This linear round complexity is the main obstacle for deploying these schemes in real -world applications.In this work, our primary goal is to improve existing cryptographic PWS solutions to reduce their complexity to O(1) rounds, thus ensuring their practicality. To this end, we first introduce the notion of vertical mixing, which hides the linkability between messages and their sources without horizontally cascaded shuffling. Second, we design a method to achieve vertical mixing by adopting additive secret sharing and modifying the widely used cryptographic PWS framework, CVH, originally developed by Castella-Roca et al. (Computer Communications 2009). This yields enhanced round efficiency while ensuring security in the semi-honest model. Furthermore, we provide a formal proof of our PWS solution using the standard simulation-based proof. In contrast, the existing works only provide heuristic proofs. Finally, we perform a set of microbenchmarks by varying the number of users and evaluate the effectiveness of our construction. Our PWS scheme runs 1.48 ti 3.63x faster than the original CVH framework. (c) 2022 Published by Elsevier Inc.-
dc.language영어-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE INC-
dc.relation.isPartOfINFORMATION SCIENCES-
dc.titleTaming the round efficiency of cryptographic protocols for private web search schemes-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000900939600001-
dc.identifier.doi10.1016/j.ins.2022.11.003-
dc.identifier.bibliographicCitationINFORMATION SCIENCES, v.621, pp.1 - 21-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-85145560458-
dc.citation.endPage21-
dc.citation.startPage1-
dc.citation.titleINFORMATION SCIENCES-
dc.citation.volume621-
dc.contributor.affiliatedAuthorKim, Myungsun-
dc.type.docTypeArticle-
dc.subject.keywordAuthorPrivate web search-
dc.subject.keywordAuthorCascade shuffle-
dc.subject.keywordAuthorRound efficiency-
dc.subject.keywordPlusQUERY-
dc.subject.keywordPlusKNOWLEDGE-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
경영대학 > 금융수학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher KIM, MYUNGSUN photo

KIM, MYUNGSUN
Business Administration (금융·빅데이터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE