Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain

被引:69
作者
Guo, Yu [1 ]
Zhang, Chen [2 ]
Wang, Cong [3 ,4 ]
Jia, Xiaohua [2 ]
机构
[1] Beijing Normal Univ, Sch Artificial Intelligence, Beijing 100875, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[4] City Univ Hong Kong, Shenzhen Res Inst, Shenzhen 518057, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchains; Indexes; Servers; Smart contracts; Privacy; Encryption; Prototypes; Blockchain; dynamic searchable symmetric encryption; forward privacy; verifiable searchable encryption; CLOUD; QUERIES;
D O I
10.1109/TDSC.2022.3173291
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic Searchable Symmetric Encryption (DSSE) is a practical cryptographic primitive that assists servers to provide search and update functionalities in the ciphertext domain. Recent work on DSSE schemes has focused on the direction of forward-privacy, requiring that newly added files cannot be linked to previously query results. However, due to the complexity of forward-privacy updates, existing schemes can only address an honest-but-curious server. It is difficult to verify updated results while preserving forward-privacy. In this paper, we explore how blockchain techniques can help us achieve a verifiable and forward-privacy DSSE scheme. Our scheme resorts to the emerging smart contract as a trusted platform to store digests for public result verification, and carefully crafts dynamic query protocols to enable encrypted search with forward-privacy. In our design, indexes are collocated with encrypted files and stored at storage-servers, which makes the blockchain light-weighted and search operations more efficient. Moreover, we propose a hybrid index design to support efficient files deletion. By using our blockchain-assisted primitive, the property collision between dynamic result verification and forward-privacy can be solved. We formally analyze the security strengths and provide the prototype implementation on Ethereum. Experiment results demonstrate the feasibility and usability of our blockchain-assisted DSSE scheme.
引用
收藏
页码:2111 / 2126
页数:16
相关论文
共 60 条
  • [11] Cai CJ, 2020, IEEE INFOCOM SER, P1887, DOI [10.1109/infocom41043.2020.9155385, 10.1109/INFOCOM41043.2020.9155385]
  • [12] Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness
    Cai, Chengjun
    Weng, Jian
    Yuan, Xingliang
    Wang, Cong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 131 - 144
  • [13] Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
    Cash, David
    Jaeger, Joseph
    Jarecki, Stanislaw
    Jutla, Charanjit
    Krawczyk, Hugo
    Rosu, Marcel-Catalin
    Steine, Michael
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [14] Leakage-Abuse Attacks Against Searchable Encryption
    Cash, David
    Grubbs, Paul
    Perry, Jason
    Ristenpart, Thomas
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 668 - 679
  • [15] New Constructions for Forward and Backward Private Symmetric Searchable Encryption
    Chamani, Javad Ghareh
    Papadopoulos, Dimitrios
    Papamanthou, Charalampos
    Jalili, Rasool
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1038 - 1055
  • [16] Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
  • [17] Structured Encryption and Controlled Disclosure
    Chase, Melissa
    Kamara, Seny
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 577 - 594
  • [18] Blockchain-Based Dynamic Provable Data Possession for Smart Cities
    Chen, Ruonan
    Li, Yannan
    Yu, Yong
    Li, Huilin
    Chen, Xiaofeng
    Susilo, Willy
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) : 4143 - 4154
  • [19] Clarke D, 2003, LECT NOTES COMPUT SC, V2894, P188
  • [20] Searchable symmetric encryption: Improved definitions and efficient constructions
    Curtmola, Reza
    Garay, Juan
    Kamara, Seny
    Ostrovsky, Rafail
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) : 895 - 934