A face authentication-based searchable encryption scheme for mobile device

被引:0
|
作者
Yue, Xiaohan [1 ]
Yi, Gang [1 ]
Si, Haoran [1 ]
Yang, Haibo [1 ]
Bai, Shi [1 ]
He, Yuan [2 ]
机构
[1] Shenyang Univ Technol, Sch Informat Sci & Engn, Ctr St, Shenyang 110870, Liaoning, Peoples R China
[2] Keio Univ, Grad Sch Sci & Technol, Yokohama, Kanagawa 2238522, Japan
来源
JOURNAL OF SUPERCOMPUTING | 2025年 / 81卷 / 01期
基金
中国国家自然科学基金;
关键词
Face authentication; Biometric key; Searchable encryption; PUBLIC-KEY ENCRYPTION;
D O I
10.1007/s11227-024-06554-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce Face-Authentication Keyword Encryption Search (FAKES), a novel searchable encryption scheme that eliminates the requirement for clients to manage cryptographic keys by utilizing only the client's face biometric data for authentication of outsourcing and retrieval of encrypted files. We propose two face biometric-based searchable encryption models that support single-user and multi-user scenarios, respectively. Furthermore, we propose a key recovery approach that relies exclusively on facial biometric data, making it easier for users to migrate across devices. Taking into account the limitations of storage and computation on the devices of users, we design a pairing-free elliptic-curve-based encryption algorithm in order to enhance the user's experience. In order to ensure that cloud servers return the right files, we provide correctness and security proofs. We also provide a security analysis of FAKES and demonstrate its effectiveness through a series of extensive experiments.
引用
收藏
页数:35
相关论文
共 50 条
  • [1] Certificateless Authentication Searchable Encryption Scheme for Multi-user
    Zhang Yulei
    Wen Long
    Wang Haohao
    Zhang Yongjie
    Wang Caifen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (05) : 1094 - 1101
  • [2] THREE-FACTOR AUTHENTICATION SCHEME BASED ON SEARCHABLE ENCRYPTION AND BIOMETRIC FINGERPRINT
    Mihailescu, Marius Iulian
    Nita, Stefania Loredana
    2020 13TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2020, : 139 - 144
  • [3] An Agent-based Searchable Encryption Scheme in Mobile Computing Environment
    Yang Jian
    Yang Dengqi
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [4] A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments
    Mihailescu, Marius Iulian
    Nita, Stefania Loredana
    CRYPTOGRAPHY, 2022, 6 (01)
  • [5] An Efficient Public Key Searchable Encryption Scheme for Mobile Smart Terminal
    Yang, Ningbin
    Xu, Shumei
    Quan, Zhou
    IEEE ACCESS, 2020, 8 : 77940 - 77950
  • [6] Public key searchable encryption scheme based on blockchain
    Du R.
    Tan A.
    Tian J.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (04): : 114 - 122
  • [7] Identity-based Public Key Keyword Searchable Encryption Scheme with Denial Authentication
    Cao Suzhen
    Ding Binbin
    Ding Xiaohui
    Dou Fengge
    Wang Caifen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (03) : 1086 - 1092
  • [8] Lightweight searchable encryption scheme based on certificateless cryptosystem
    Yang, Xiaodong
    Chen, Guilan
    Wang, Meiding
    Pei, Xizhen
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 669 - 672
  • [9] An Improved Asymmetric Searchable Encryption Scheme
    Wu, Qi
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 39 - 44
  • [10] Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage
    Wang, Shangping
    Zhang, Duo
    Zhang, Yaling
    Liu, Lihua
    IEEE ACCESS, 2018, 6 : 30444 - 30457