Forward and backward secure keyword search with flexible keyword shielding

被引:5
作者
Li, Zhijun [1 ,2 ]
Ma, Jianfeng [1 ]
Miao, Yinbin [1 ,2 ]
Liu, Ximeng [3 ]
Choo, Kim-Kwang Raymond [4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350116, Fujian, Peoples R China
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Dynamic searchable symmetric encryption; Forward and backward security; Keyword shielding; Trapdoor permutations; Puncturable encryption; ATTRIBUTE-BASED ENCRYPTION;
D O I
10.1016/j.ins.2021.06.048
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic Searchable Symmetric Encryption (DSSE) has gained increasing popularity as it enables users to perform both file updates and ciphertext retrieval over encrypted data. However, existing DSSE schemes still lead to privacy leakage (e.g., forward and backward privacy) in the dynamic setting. Some forward and backward secure DSSE schemes have been proposed, but still cannot support the keyword shielding flexibly. To solve this challenging issue, we propose a Forward and Backward Authorized Keyword Search (FB-AKS) scheme with recoverable keyword shielding by using trapdoor permutations and puncturable encryption in this paper. Compared with existing forward and backward private schemes, FB-AKS achieves keyword authorization flexibly (e.g., keyword shielding, keyword un-shielding). The formal security analysis proves that FB-AKS achieves forward and backward security. And extensive experiments demonstrate that FB-AKS has less computation and storage overheads. (c) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页码:507 / 521
页数:15
相关论文
共 46 条
  • [1] Forward and Backward Private Searchable Encryption with SGX
    Amjad, Ghous
    Kamara, Seny
    Moataz, Tarik
    [J]. PROCEEDINGS OF THE 12TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2019), 2019,
  • [2] [Anonymous], 2013, Financial Cryptography Data Security
  • [3] PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT
    Belguith, Sana
    Kaaniche, Nesrine
    Laurent, Maryline
    Jemai, Abderrazak
    Attia, Rabah
    [J]. COMPUTER NETWORKS, 2018, 133 : 141 - 156
  • [4] Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
  • [5] Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
    Bost, Raphael
    Minaud, Brice
    Ohrimenko, Olga
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1465 - 1482
  • [6] Σοφοζ - Forward Secure Searchable Encryption
    Bost, Raphael
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1143 - 1154
  • [7] Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
    Cash, David
    Jaeger, Joseph
    Jarecki, Stanislaw
    Jutla, Charanjit
    Krawczyk, Hugo
    Rosu, Marcel-Catalin
    Steine, Michael
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [8] Leakage-Abuse Attacks Against Searchable Encryption
    Cash, David
    Grubbs, Paul
    Perry, Jason
    Ristenpart, Thomas
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 668 - 679
  • [9] New Constructions for Forward and Backward Private Symmetric Searchable Encryption
    Chamani, Javad Ghareh
    Papadopoulos, Dimitrios
    Papamanthou, Charalampos
    Jalili, Rasool
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1038 - 1055
  • [10] Server-Aided Revocable Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    Li, Yingjiu
    Qin, Baodong
    [J]. COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 570 - 587