Efficient dynamic searchable encryption scheme for conjunctive queries based on bidirectional index

被引:0
|
作者
Du R. [1 ,2 ]
Zhang Y. [1 ]
Li M. [3 ]
机构
[1] School of Cyberspace Security and Computer Science, Hebei University, Baoding
[2] Hebei Provincial Key Laboratory of High Trusted Information System, Baoding
[3] Computer College, Nankai University, Tianjin
来源
基金
中国国家自然科学基金;
关键词
Backward privacy; Conjunctive query; Dynamic searchable symmetric encryption; Forward privacy;
D O I
10.11959/j.issn.1000-436x.2022099
中图分类号
学科分类号
摘要
To solve the problems of complicated operation, information leakage, and inflexible query method in the update process of existing dynamic searchable encryption scheme, an efficient dynamic searchable encryption scheme (named BPC-DSSE) for conjunctive query with forward and backward privacy was proposed. A bitmap index was used to construct a bidirectional index structure to simplify the dynamic update process, and the access pattern was hidden through symmetric encryption with homomorphic addition. At the same time, since the addition and deletion operations were completed by modulo addition, the leakage of the update process could be reduced by hiding the update type. Security analysis shows that the BPC-DSSE scheme achieves forward and Type-I- backward privacy. The simulation results show that the BPC-DSSE scheme has higher update and retrieval efficiency than other conjunctive query schemes. © 2022, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:123 / 132
页数:9
相关论文
共 23 条
  • [1] DONG X L, ZHOU J, CAO Z F., Research advances on secure searchable encryption, Journal of Computer Research and Development, 54, 10, pp. 2107-2120, (2017)
  • [2] SONG D X, WAGNER D, PERRIG A., Practical techniques for searches on encrypted data, Proceedings of IEEE Symposium on Security and Privacy, pp. 44-55, (2000)
  • [3] WU Z Q, LI K L, ZHENG H., Efficient and scalable architecture for searchable symmetric encryption, Journal on Communications, 38, 8, pp. 79-93, (2017)
  • [4] DU R Z, TAN A L, TIAN J F., Public key searchable encryption scheme based on blockchain, Journal on Communications, 41, 4, pp. 114-122, (2020)
  • [5] KAMARA S, PAPAMANTHOU C, ROEDER T., Dynamic searchable symmetric encryption, Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 965-976, (2012)
  • [6] STEFANOV E, PAPAMANTHOU C, SHI E., Practical dynamic searchable encryption with small leakage, Proceedings 2014 Network and Distributed System Security Symposium, pp. 72-75, (2014)
  • [7] BOST R, MINAUD B, OHRIMENKO O., Forward and backward private searchable encryption from constrained cryptographic primitives, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1465-1482, (2017)
  • [8] CASH D, GRUBBS P, PERRY J, Et al., Leakage-abuse attacks against searchable encryption, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 668-679, (2015)
  • [9] ZHANG Y P, KATZ J, PAPAMANTHOU C., All your queries are belong to us: the power of file-injection attacks on searchable encryption, IACR Cryptology EPrint Archive, (2016)
  • [10] BOST R., ∑oφoς: forward secure searchable encryption, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1143-1154, (2016)