A face authentication-based searchable encryption scheme for mobile device

被引:0
作者
Yue, Xiaohan [1 ]
Yi, Gang [1 ]
Si, Haoran [1 ]
Yang, Haibo [1 ]
Bai, Shi [1 ]
He, Yuan [2 ]
机构
[1] Shenyang Univ Technol, Sch Informat Sci & Engn, Ctr St, Shenyang 110870, Liaoning, Peoples R China
[2] Keio Univ, Grad Sch Sci & Technol, Yokohama, Kanagawa 2238522, Japan
基金
中国国家自然科学基金;
关键词
Face authentication; Biometric key; Searchable encryption; PUBLIC-KEY ENCRYPTION;
D O I
10.1007/s11227-024-06554-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce Face-Authentication Keyword Encryption Search (FAKES), a novel searchable encryption scheme that eliminates the requirement for clients to manage cryptographic keys by utilizing only the client's face biometric data for authentication of outsourcing and retrieval of encrypted files. We propose two face biometric-based searchable encryption models that support single-user and multi-user scenarios, respectively. Furthermore, we propose a key recovery approach that relies exclusively on facial biometric data, making it easier for users to migrate across devices. Taking into account the limitations of storage and computation on the devices of users, we design a pairing-free elliptic-curve-based encryption algorithm in order to enhance the user's experience. In order to ensure that cloud servers return the right files, we provide correctness and security proofs. We also provide a security analysis of FAKES and demonstrate its effectiveness through a series of extensive experiments.
引用
收藏
页数:35
相关论文
共 50 条
  • [21] Searchable Encryption Scheme of Genomic Data Based on Suffix Tree
    Qin S.-Y.
    Zhou F.-C.
    Liu L.
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (04): : 461 - 466
  • [22] A Blockchain Based Searchable Encryption Scheme for Multiple Cloud Storage
    Zhang, Chao
    Fu, Shaojing
    Ao, Weijun
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 585 - 600
  • [23] Mobile device access control: an improved correlation based face authentication scheme and its Java']Java ME application
    Xi, Kai
    Hu, Jiankun
    Han, Fengling
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (10) : 1066 - 1085
  • [24] A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain
    Xu, Gang
    Cao, Yibo
    Xu, Shiyuan
    Liu, Xin
    Chen, Xiu-Bo
    Yu, Yiying
    Wang, Xiaojun
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (03): : 5429 - 5441
  • [25] Blockchain-Based Searchable Encryption Scheme With Fair Payment
    Yan, Xixi
    Yuan, Xiaohan
    Ye, Qing
    Tang, Yongli
    IEEE ACCESS, 2020, 8 : 109687 - 109706
  • [26] Lattice-Based Searchable Encryption Scheme against Inside Keywords Guessing Attack
    Yu, Xiaoling
    Xu, Chungen
    Xu, Lei
    Wang, Yuntao
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (02): : 1107 - 1125
  • [27] Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing
    Zhang, Yu-lei
    Wen, Long
    Zhang, Yong-jie
    Wang, Cai-fen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (37-38) : 27075 - 27090
  • [28] Searchable Encryption Scheme on the Cloud Via Fully Homomorphic Encryption
    Liu, Jian
    Han, Jing-Li
    Wang, Zhao-Li
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 108 - 111
  • [29] Witness-based searchable encryption
    Ma, Sha
    Mu, Yi
    Susilo, Willy
    Yang, Bo
    INFORMATION SCIENCES, 2018, 453 : 364 - 378
  • [30] A New Lightweight Symmetric Searchable Encryption Scheme for String Identification
    Ray, Indranil Ghosh
    Rahulamathavan, Yogachandran
    Rajarajan, Muttukrishnan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (03) : 672 - 684