dc.contributor.author | Boyd, Colin Alexander | |
dc.contributor.author | Davies, Gareth Thomas | |
dc.contributor.author | Gjøsteen, Kristian | |
dc.contributor.author | Jiang, Yao | |
dc.date.accessioned | 2021-02-12T11:42:50Z | |
dc.date.available | 2021-02-12T11:42:50Z | |
dc.date.created | 2020-09-01T11:28:49Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | Lecture Notes in Computer Science (LNCS). 2020, 12170 LNCS 464-493. | en_US |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | https://hdl.handle.net/11250/2727724 | |
dc.description.abstract | Updatable encryption allows a client to outsource ciphertexts to some untrusted server and periodically rotate the encryption key. The server can update ciphertexts from an old key to a new key with the help of an update token, received from the client, which should not reveal anything about plaintexts to an adversary.
We provide a new and highly efficient suite of updatable encryption schemes that we collectively call SHINE. In the variant designed for short messages, ciphertext generation consists of applying one permutation and one exponentiation (per message block), while updating ciphertexts requires just one exponentiation. Variants for longer messages provide much stronger security guarantees than prior work that has comparable efficiency. We present a new confidentiality notion for updatable encryption schemes that implies prior notions. We prove that SHINE is secure under our new confidentiality definition while also providing ciphertext integrity. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Springer Verlag | en_US |
dc.title | Fast and Secure Updatable Encryption | en_US |
dc.type | Peer reviewed | en_US |
dc.type | Journal article | en_US |
dc.description.version | acceptedVersion | en_US |
dc.source.pagenumber | 464-493 | en_US |
dc.source.volume | 12170 LNCS | en_US |
dc.source.journal | Lecture Notes in Computer Science (LNCS) | en_US |
dc.identifier.doi | https://doi.org/10.1007/978-3-030-56784-2_16 | |
dc.identifier.cristin | 1826435 | |
dc.description.localcode | This is a post-peer-review, pre-copyedit version of an article. Locked until 10/8-2021 due to copyright restrictions. The final authenticated version is available online at: http://dx.doi.org/https://doi.org/10.1007/978-3-030-56784-2_16 | en_US |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |