Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015
DOI: 10.1145/2810103.2813672
|View full text |Cite
|
Sign up to set email alerts
|

Grecs

Abstract: We propose graph encryption schemes that efficiently support approximate shortest distance queries on large-scale encrypted graphs. Shortest distance queries are one of the most fundamental graph operations and have a wide range of applications. Using such graph encryption schemes, a client can outsource large-scale privacy-sensitive graphs to an untrusted server without losing the ability to query it. Other applications include encrypted graph databases and controlled disclosure systems. We propose GRECS (sta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 107 publications
(8 citation statements)
references
References 47 publications
(67 reference statements)
0
8
0
Order By: Relevance
“…The existing research on route planning privacy protection has primarily focused on anonymization techniques, which can be classified into three categories: clustering-based approaches [27,28], graph encryption approaches [29][30][31], and graph modification-based approaches [32]. However, these approaches are limited by their low graph utility or high search overheads, which can impact the service performance.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The existing research on route planning privacy protection has primarily focused on anonymization techniques, which can be classified into three categories: clustering-based approaches [27,28], graph encryption approaches [29][30][31], and graph modification-based approaches [32]. However, these approaches are limited by their low graph utility or high search overheads, which can impact the service performance.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Graph encryption is a special case of structured encryption and there are several prominent works. Meng et al [13] proposed a graph encryption scheme GRECS to answer shortest distance queries approximately by computing encrypted distance oracles and using somewhat homomorphic encryption [14], Pseudo-Random Permutation (PRP), and Pseudo-Random Function (PRF). Wu et al [15] presented a multi-round navigation protocol on city streets to enable shortest path queries.…”
Section: B Related Workmentioning
confidence: 99%
“…First, how to design an appropriate oracle that lays the foundation of our shortest path queries under restricted conditions. Existing work either neglect the shortest path [13] or only consider the neighboring information [17]. Intuitively, a path-distance oracle is preferable.…”
Section: Technical Challenges and Proposed Solutionsmentioning
confidence: 99%
“…With the help of cryptography, we can encrypt the original data before communicating it, rendering it unintelligible to outsiders until it is decrypted at the receiving end. Meng et al [9] developed graph encryption techniques that effectively allow approximative shortestdistance queries on huge encrypted graphs. By creating a number of indexes to store the data required to respond to queries, Liu et al [10] investigated a graph encryption approach for a crucial graph query type known as top-k Nearest Keyword (kNK) searches.…”
Section: Introductionmentioning
confidence: 99%