Integrity-verifiable conjunctive keyword searchable encryption in cloud storage

被引:21
|
作者
Li, Yuxi [1 ]
Zhou, Fucai [1 ]
Qin, Yuhai [2 ]
Lin, Muqing [3 ]
Xu, Zifeng [1 ]
机构
[1] Northeastern Univ, Software Coll, Shenyang 110819, Liaoning, Peoples R China
[2] Natl Police Univ China, Cyber Crime Invest Dept, Shenyang 110819, Liaoning, Peoples R China
[3] Beijing Elect Sci & Technol Inst, Informat Secur Inst, Beijing 100070, Peoples R China
基金
中国国家自然科学基金;
关键词
Conjunctive keyword search; Integrity authentication; Searchable encryption; Secure cloud storage; PUBLIC-KEY ENCRYPTION;
D O I
10.1007/s10207-017-0394-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conjunctive searchable encryption is an efficient way to perform multi-keyword search over encrypted data in cloud storage. However, most existing methods do not take into account the integrity verification of the search result. Moreover, existing integrity verification methods can only verify the integrity of single-keyword search results, which cannot meet the requirements of conjunctive search. To address this problem, we proposed a conjunctive keyword searchable encryption scheme with an authentication mechanism that can efficiently verify the integrity of search results. The proposed scheme is based on the dynamic searchable symmetric encryption and adopts the Merkle tree and bilinear map accumulator to prove the correctness of set operations. It supports conjunctive keyword as input for conjunctive search and gives the server the ability to prove the integrity of the search result to the user. Formal proofs and extensive experiments show that the proposed scheme is efficient, unforgeable and adaptive secure against chosen-keyword attacks.
引用
收藏
页码:549 / 568
页数:20
相关论文
共 50 条
  • [41] Advanced Searchable Encryption: Keyword Search for Matrix-type Storage
    Kodera, Yuta
    Kuribayashi, Minoru
    Kusaka, Takuya
    Nogami, Yasuyuki
    2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 292 - 297
  • [42] Conjunctive searchable encryption with efficient authorization for group sharing
    Mei, Lin
    Xu, Chungen
    Xu, Lei
    WIRELESS NETWORKS, 2024, 30 (05) : 4477 - 4494
  • [43] A Certificateless Verifiable Bilinear Pair-Free Conjunctive Keyword Search Encryption Scheme for IoMT
    Long, Weifeng
    Zeng, Jiwen
    Wu, Yaying
    Gao, Yan
    Zhang, Hui
    ELECTRONICS, 2024, 13 (08)
  • [44] Pattern Hiding and Authorized Searchable Encryption for Data Sharing in Cloud Storage
    Zhang, Kai
    Hu, Boli
    Ning, Jianting
    Gong, Junqing
    Qian, Haifeng
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2025, 37 (05) : 2802 - 2815
  • [45] Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead
    Sheng, Qitian
    Wu, Jiaojiao
    Wang, Jianfeng
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 3 - 16
  • [46] Searchable Encryption with Keyword-Recoverability
    Jeong, Ik Rae
    Kwon, Jeong Ok
    Hong, Dowon
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 1200 - 1203
  • [47] Enabling Efficient, Verifiable, and Secure Conjunctive Keyword Search in Hybrid-Storage Blockchains
    Cui, Ningning
    Wang, Dong
    Li, Jianxin
    Zhu, Huaijie
    Yang, Xiaochun
    Xu, Jianliang
    Cui, Jie
    Zhong, Hong
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (06) : 2445 - 2460
  • [48] Searchable encryption with randomized ciphertext and randomized keyword search
    Calderini, Marco
    Longo, Riccardo
    Sala, Massimiliano
    Villa, Irene
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2024, 18 (01)
  • [49] Delegate Searchable Encryption Scheme Resisting Keyword Guess
    Cao Suzhen
    Lang Xiaoli
    Liu Xiangzhen
    Zhang Yulei
    Wang Fei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (09) : 2180 - 2186
  • [50] BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records
    Chen, Biwen
    Xiang, Tao
    He, Debiao
    Li, Hongwei
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3171 - 3184