Multi-keyword Searchable Encryption Based on Paillier and Private Set Intersection

被引:1
作者
Zhou F.-C. [1 ]
Zhang Z.-Y. [1 ]
Wang K.-X. [1 ]
Li Y.-X. [1 ]
机构
[1] School of Software, Northeastern University, Shenyang
来源
Dongbei Daxue Xuebao/Journal of Northeastern University | 2019年 / 40卷 / 03期
关键词
Cloud storage; Multi-keyword; Pailler homomorphic encryption; Private set intersection; Searchable encryption;
D O I
10.12068/j.issn.1005-3026.2019.03.004
中图分类号
学科分类号
摘要
Efficient multi-keyword ciphertext search and problems of data security protection were researched. Based on Paillier homomorphic encryption and private set intersection(PSI)technique, a multi-keyword searchable encryption scheme was provided, which can search over encrypted files efficiently and protect the search pattern. First, through random number padding and Paillier homomorphic encryption the index privacy and the trapdoor privacy were protected, and the search pattern was further protected. Then, the scheme supports conjunctive multi-keyword search by using PSI. Because only multiplications and exponentiations were used in searching, the proposed scheme is more efficient than others. Security and performance analysis showed that the scheme has the semantic security of searchable encryption and can perform multi-keyword search efficiently with a good computational cost. © 2019, Editorial Department of Journal of Northeastern University. All right reserved.
引用
收藏
页码:321 / 326
页数:5
相关论文
共 12 条
  • [1] Dong X.-L., Zhou J., Cao Z.-F., Research advances on secure searchable encryption, Journal of Computer Research and Development, 54, 10, pp. 2107-2120, (2017)
  • [2] Song D.X., Wagner D., Perrig A., Practical techniques for searches on encrypted data, IEEE Symposium on Security and Privacy, (2000)
  • [3] Dan B., Crescenzo G.D., Ostrovsky R., Et al., Public Key Encryption with Keyword Search, pp. 506-522, (2004)
  • [4] Goh E.J., Secure indexes
  • [5] Cao N., Wang C., Li M., Et al., Privacy-preserving multi-keyword ranked search over encrypted cloud data, IEEE Transactions on Parallel & Distributed Systems, 25, 1, pp. 222-233, (2013)
  • [6] Li M., Yu S., Lou W., Et al., Toward privacy-assured cloud data services with flexible search functionalities, International Conference on Distributed Computing Systems Workshops, pp. 466-470, (2012)
  • [7] Sun W., Yu S., Lou W., Et al., Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud, IEEE Transactions on Parallel and Distributed Systems, 27, 4, pp. 1187-1198, (2014)
  • [8] Curtmola R., Garay J., Kamara S., Et al., Searchable symmetric encryption: improved definitions and efficient constructions, Journal of Computer Security, 19, 5, pp. 895-934, (2011)
  • [9] Gentry C., Fully homomorphic encryption using ideal lattices, Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 169-178, (2009)
  • [10] Paillier P., Public-key cryptosystems based on composite degree residuosity classes, International Conference on Theory and Application of Cryptographic Techniques, pp. 223-238, (1999)