Publicly verifiable searchable symmetric encryption based on efficient cryptographic components

被引:0
作者
Azam Soleimanian
Shahram Khazaei
机构
[1] Kharazmi University,Department of Mathematics and Computer Science
[2] Sharif University of Technology,Department of Mathematical Sciences
来源
Designs, Codes and Cryptography | 2019年 / 87卷
关键词
Cloud computing; Data confidentiality; Searchable encryption; Verifiability; Multi party computation; Boolean queries; 94A60; 68P25;
D O I
暂无
中图分类号
学科分类号
摘要
Public verifiability is an interesting feature that cryptographic protocols, such as those used in cloud computing applications, may support. By public verifiability, the client can delegate the verification process to a third party auditor without revealing the private key or data. The main contribution of this paper is achieving public verifiability in the symmetric setting of searchable encryption (SE), separately for single and Boolean keyword search. While Public verifiability in SE has already been achieved using complex tools such as indistinguishability obfuscation or pairing, this work employs basic cryptographic components and assumptions, such as pseudo-random functions, one-way functions, digital signatures and the DDH assumption.
引用
收藏
页码:123 / 147
页数:24
相关论文
共 47 条
  • [1] Ali M(2015)Security in cloud computing: opportunities and challenges Inf. Sci 305 357-383
  • [2] Khan SU(2005)Correlation-resistant storage via keyword-searchable encryption IACR Cryptol. ePrint Arch. 2005 417-233
  • [3] Vasilakos AV(2016)Verifiable dynamic symmetric searchable encryption: optimality and forward security IACR Cryptol. ePrint Arch. 2016 62-473
  • [4] Ballard L(2014)Privacy-preserving multi-keyword ranked search over encrypted cloud data IEEE Trans. Parallel Distrib. Syst. 25 222-188
  • [5] Green M(2003)Secure indexes IACR Cryptol. ePrint Arch. 2003 216-12
  • [6] de Medeiros B(1996)Software protection and simulation on oblivious rams J. ACM 43 431-859
  • [7] Monrose F(2017)Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data Inf. Sci 403404 2241-352
  • [8] Bost R(2015)How to construct uc-secure searchable symmetric encryption scheme IACR Cryptol. ePrint Arch. 2015 251-undefined
  • [9] Fouque P(2014)Search pattern leakage in searchable encryption: attacks and new construction Inf. Sci. 265 176-undefined
  • [10] Pointcheval D(2016)Efficient no-dictionary verifiable SSE IACR Cryptol. ePrint Arch. 2016 981-undefined