Efficient negative databases from cryptographic hash functions

  • Authors:
  • George Danezis;Claudia Diaz;Sebastian Faust;Emilia Käsper;Carmela Troncoso;Bart Preneel

  • Affiliations:
  • K.U. Leuven, ESAT, COSIC, Leuven-Heverlee, Belgium;K.U. Leuven, ESAT, COSIC, Leuven-Heverlee, Belgium;K.U. Leuven, ESAT, COSIC, Leuven-Heverlee, Belgium;K.U. Leuven, ESAT, COSIC, Leuven-Heverlee, Belgium;K.U. Leuven, ESAT, COSIC, Leuven-Heverlee, Belgium;K.U. Leuven, ESAT, COSIC, Leuven-Heverlee, Belgium

  • Venue:
  • ISC'07 Proceedings of the 10th international conference on Information Security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

A negative database is a privacy-preserving storage system that allows to efficiently test if an entry is present, but makes it hard to enumerate all encoded entries. We improve significantly over previous work presented at ISC 2006 by Esponda et al. [9], by showing constructions for negative databases reducible to the security of well understood primitives, such as cryptographic hash functions or the hardness of the Discrete-Logarithm problem. Our constructions require only O(m) storage in the number m of entries in the database, and linear query time (compared to O(l ċ m) storage and O(l ċ m) query time, where l is a security parameter.) Our claims are supported by both proofs of security and experimental performance measurements.