Integrity-verifiable conjunctive keyword searchable encryption in cloud storage

被引:21
作者
Li, Yuxi [1 ]
Zhou, Fucai [1 ]
Qin, Yuhai [2 ]
Lin, Muqing [3 ]
Xu, Zifeng [1 ]
机构
[1] Northeastern Univ, Software Coll, Shenyang 110819, Liaoning, Peoples R China
[2] Natl Police Univ China, Cyber Crime Invest Dept, Shenyang 110819, Liaoning, Peoples R China
[3] Beijing Elect Sci & Technol Inst, Informat Secur Inst, Beijing 100070, Peoples R China
基金
中国国家自然科学基金;
关键词
Conjunctive keyword search; Integrity authentication; Searchable encryption; Secure cloud storage; PUBLIC-KEY ENCRYPTION;
D O I
10.1007/s10207-017-0394-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conjunctive searchable encryption is an efficient way to perform multi-keyword search over encrypted data in cloud storage. However, most existing methods do not take into account the integrity verification of the search result. Moreover, existing integrity verification methods can only verify the integrity of single-keyword search results, which cannot meet the requirements of conjunctive search. To address this problem, we proposed a conjunctive keyword searchable encryption scheme with an authentication mechanism that can efficiently verify the integrity of search results. The proposed scheme is based on the dynamic searchable symmetric encryption and adopts the Merkle tree and bilinear map accumulator to prove the correctness of set operations. It supports conjunctive keyword as input for conjunctive search and gives the server the ability to prove the integrity of the search result to the user. Formal proofs and extensive experiments show that the proposed scheme is efficient, unforgeable and adaptive secure against chosen-keyword attacks.
引用
收藏
页码:549 / 568
页数:20
相关论文
共 22 条
[1]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[2]  
Ballard L, 2005, LECT NOTES COMPUT SC, V3783, P414
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]  
Cachin Christian, 2009, SIGACT News, V40, P81, DOI 10.1145/1556154.1556173
[5]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[6]  
Cash D., 2014, P OF NDSS
[7]  
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[8]  
Curtmola Reza, 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417
[9]  
Gentry C, 2006, LECT NOTES COMPUT SC, V4004, P445
[10]  
Goh E.-J., 2003, Rep. 2003/216