35

Access Control for Information-Theoretically Secure Key-Document Stores

IACR Cryptology ePrint Archive (IACR ePrint), 2025
Yin Li
Sharad Mehrota
Shantanu Sharma
Komal Kumari
Main:16 Pages
5 Figures
Bibliography:2 Pages
37 Tables
Appendix:8 Pages
Abstract

This paper presents a novel key-based access control technique for secure outsourcing key-value stores where values correspond to documents that are indexed and accessed using keys. The proposed approach adopts Shamir's secret-sharing that offers unconditional or information-theoretic security. It supports keyword-based document retrieval while preventing leakage of the data, access rights of users, or the size (\textit{i}.\textit{e}., volume of the output that satisfies a query). The proposed approach allows servers to detect (and abort) malicious clients from gaining unauthorized access to data, and prevents malicious servers from altering data undetected while ensuring efficient access -- it takes 231.5ms over 5,000 keywords across 500,000 files.

View on arXiv
Comments on this paper