A Comparative Analysis of Searchable Encryption Schemes using SGX

Hyundo Yoon, Junbeom Hur

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)

    Abstract

    Searchable encryption (SE) schemes enable users to search over encrypted data that are outsourced to untrusted cloud servers. Although many software-based SE schemes have been developed to improve security and functionality, most of them have limitations in terms of performance and security assumptions. In order to increase the efficiency, and guarantee query and data privacy, several SE schemes based on trusted execution environment (TEE) such as Intel SGX, ARM TrustZone have been proposed recently. In this paper, we investigate the existing SGX-based searchable encryption schemes, and conduct a comparative analysis of them.

    Original languageEnglish
    Title of host publicationICTC 2020 - 11th International Conference on ICT Convergence
    Subtitle of host publicationData, Network, and AI in the Age of Untact
    PublisherIEEE Computer Society
    Pages526-528
    Number of pages3
    ISBN (Electronic)9781728167589
    DOIs
    Publication statusPublished - 2020 Oct 21
    Event11th International Conference on Information and Communication Technology Convergence, ICTC 2020 - Jeju Island, Korea, Republic of
    Duration: 2020 Oct 212020 Oct 23

    Publication series

    NameInternational Conference on ICT Convergence
    Volume2020-October
    ISSN (Print)2162-1233
    ISSN (Electronic)2162-1241

    Conference

    Conference11th International Conference on Information and Communication Technology Convergence, ICTC 2020
    Country/TerritoryKorea, Republic of
    CityJeju Island
    Period20/10/2120/10/23

    Bibliographical note

    Publisher Copyright:
    © 2020 IEEE.

    Keywords

    • Intel SGX
    • Searchable Encryption(SE)
    • Trusted Execution Environment(TEE)

    ASJC Scopus subject areas

    • Information Systems
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'A Comparative Analysis of Searchable Encryption Schemes using SGX'. Together they form a unique fingerprint.

    Cite this