A face authentication-based searchable encryption scheme for mobile device

被引:0
作者
Yue, Xiaohan [1 ]
Yi, Gang [1 ]
Si, Haoran [1 ]
Yang, Haibo [1 ]
Bai, Shi [1 ]
He, Yuan [2 ]
机构
[1] Shenyang Univ Technol, Sch Informat Sci & Engn, Ctr St, Shenyang 110870, Liaoning, Peoples R China
[2] Keio Univ, Grad Sch Sci & Technol, Yokohama, Kanagawa 2238522, Japan
基金
中国国家自然科学基金;
关键词
Face authentication; Biometric key; Searchable encryption; PUBLIC-KEY ENCRYPTION;
D O I
10.1007/s11227-024-06554-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce Face-Authentication Keyword Encryption Search (FAKES), a novel searchable encryption scheme that eliminates the requirement for clients to manage cryptographic keys by utilizing only the client's face biometric data for authentication of outsourcing and retrieval of encrypted files. We propose two face biometric-based searchable encryption models that support single-user and multi-user scenarios, respectively. Furthermore, we propose a key recovery approach that relies exclusively on facial biometric data, making it easier for users to migrate across devices. Taking into account the limitations of storage and computation on the devices of users, we design a pairing-free elliptic-curve-based encryption algorithm in order to enhance the user's experience. In order to ensure that cloud servers return the right files, we provide correctness and security proofs. We also provide a security analysis of FAKES and demonstrate its effectiveness through a series of extensive experiments.
引用
收藏
页数:35
相关论文
共 50 条
  • [41] Chaotic Searchable Encryption for Mobile Cloud Storage
    Awad, Abir
    Matthews, Adrian
    Qiao, Yuansong
    Lee, Brian
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 440 - 452
  • [42] Attribute-Based Searchable Encryption: A Survey
    Yan, Li
    Wang, Gaozhou
    Yin, Tian
    Liu, Peishun
    Feng, Hongxin
    Zhang, Wenbin
    Hu, Hailin
    Pan, Fading
    [J]. ELECTRONICS, 2024, 13 (09)
  • [43] A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods
    Luo, Guangchun
    Peng, Ningduo
    Qin, Ke
    Chen, Aiguo
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [44] A provably secure free-pairing certificateless searchable encryption scheme
    Senouci, Mohammed Raouf
    Benkhaddra, Ilyas
    Senouci, Abdelkader
    Li, Fagen
    [J]. TELECOMMUNICATION SYSTEMS, 2022, 80 (03) : 383 - 395
  • [45] SDKSE:A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems
    Chen, Hongyuan
    Cao, Zhenfu
    Dong, Xiaolei
    Shen, Jiachen
    [J]. 2018 THIRD INTERNATIONAL CONFERENCE ON SECURITY OF SMART CITIES, INDUSTRIAL CONTROL SYSTEM AND COMMUNICATIONS (SSIC), 2018,
  • [46] A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications
    Zeng, Ming
    Zhang, Kai
    Qian, Haifeng
    Chen, Xiaofeng
    Chen, Jie
    [J]. COMPUTER JOURNAL, 2019, 62 (04) : 563 - 578
  • [47] A secure searchable encryption scheme for cloud using hash-based indexing
    Andola, Nitish
    Prakash, Sourabh
    Yadav, Vijay Kumar
    Raghav
    Venkatesan, S.
    Verma, Shekhar
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2022, 126 : 119 - 137
  • [48] Secure Content Based Image Retrieval Scheme Based on Deep Hashing and Searchable Encryption
    Wang, Zhen
    Zhang, Qiu-yu
    Meng, Ling-tao
    Liu, Yi-lin
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (03): : 6161 - 6184
  • [49] Cloud-Assisted Attribute-Based Searchable Encryption Scheme on Blockchain
    Niu S.
    Xie Y.
    Yang P.
    Du X.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (04): : 811 - 821
  • [50] A lattice-based searchable encryption scheme with the validity period control of files
    En Zhang
    Yingying Hou
    Gongli Li
    [J]. Multimedia Tools and Applications, 2021, 80 : 4655 - 4672