A face authentication-based searchable encryption scheme for mobile device

被引:0
作者
Yue, Xiaohan [1 ]
Yi, Gang [1 ]
Si, Haoran [1 ]
Yang, Haibo [1 ]
Bai, Shi [1 ]
He, Yuan [2 ]
机构
[1] Shenyang Univ Technol, Sch Informat Sci & Engn, Ctr St, Shenyang 110870, Liaoning, Peoples R China
[2] Keio Univ, Grad Sch Sci & Technol, Yokohama, Kanagawa 2238522, Japan
基金
中国国家自然科学基金;
关键词
Face authentication; Biometric key; Searchable encryption; PUBLIC-KEY ENCRYPTION;
D O I
10.1007/s11227-024-06554-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce Face-Authentication Keyword Encryption Search (FAKES), a novel searchable encryption scheme that eliminates the requirement for clients to manage cryptographic keys by utilizing only the client's face biometric data for authentication of outsourcing and retrieval of encrypted files. We propose two face biometric-based searchable encryption models that support single-user and multi-user scenarios, respectively. Furthermore, we propose a key recovery approach that relies exclusively on facial biometric data, making it easier for users to migrate across devices. Taking into account the limitations of storage and computation on the devices of users, we design a pairing-free elliptic-curve-based encryption algorithm in order to enhance the user's experience. In order to ensure that cloud servers return the right files, we provide correctness and security proofs. We also provide a security analysis of FAKES and demonstrate its effectiveness through a series of extensive experiments.
引用
收藏
页数:35
相关论文
共 50 条
  • [31] Multi-Recipient Certificate-Based Searchable Encryption Scheme
    Liu H.
    Ming Y.
    Wang C.-H.
    Zhao Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 544 - 557
  • [32] A Novel Proximity Based Searchable Encryption Scheme Using Referential Dissimilarity
    Mallaiah, Kurra
    Pande, Prateek
    Ramachandram, S.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 253 - 261
  • [33] Multi-user and Keyword-based Searchable Encryption Scheme
    Zhang, Ya-ling
    Liu, Li-jun
    Wang, Shang-ping
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 223 - 227
  • [34] Fast, Searchable, Symmetric Encryption Scheme Supporting Ranked Search
    He, Wei
    Zhang, Yu
    Li, Yin
    SYMMETRY-BASEL, 2022, 14 (05):
  • [35] Fuzzy Dynamical Searchable Encryption Scheme Based on Balanced Binary Tree
    Hu, Xiang
    Qin, Baodong
    2024 6TH INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING, ICNLP 2024, 2024, : 277 - 282
  • [36] An efficient conjunctive keyword searchable encryption scheme
    Wang, Shang-Ping
    Liu, Li-Jun
    Zhang, Ya-Ling
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (09): : 2266 - 2271
  • [37] A Hierarchical Searchable Encryption Scheme Using Blockchain-Based Indexing
    Li, Yuxi
    Zhou, Fucai
    Ji, Dong
    Xu, Zifeng
    ELECTRONICS, 2022, 11 (22)
  • [38] An Attribute-based Searchable Encryption Scheme Supporting Trapdoor Updating
    Xu, Jingjing
    Ying, Chun
    Tan, Shuhua
    Sun, Zhe
    Wang, Pan
    Sun, Zhixin
    2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 7 - 14
  • [39] Revocable Identity-Based Searchable Encryption Scheme for Smart Grid
    Wang, Aqian
    Qin, Baodong
    Fan, Yajun
    2024 6TH INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING, ICNLP 2024, 2024, : 722 - 727
  • [40] Design and Implementation of Searchable Encryption Scheme Prototype System Based on BSSEVD
    Li P.
    Zhou F.-C.
    Zhang S.
    Zhou, Fu-Cai (fczhou@mail.neu.edu.cn), 1600, Northeast University (41): : 1244 - 1250