A Fully Secure Verifiable and Outsourced Decryption Ranked Searchable Encryption Scheme Supporting Synonym Query

被引:3
|
作者
Kang, Yaqian [1 ]
Liu, Zhenhua [1 ]
机构
[1] Xidian Univ, Sch Math & Stat, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
ATTRIBUTE-BASED ENCRYPTION; KEYWORD SEARCH; CLOUD DATA;
D O I
10.1109/DSC.2017.72
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public key encryption scheme with keyword searchable (PEKS) enables one to search for encrypted keywords without compromising the confidentiality of the original data. A practical PEKS scheme should have the following properties: quickly and efficiently searchable method, ciphertext integrity, a small amount of decryption operation for user, and full security. However, there are seldom schemes that have the all properties described above. In this paper, we propose a synonym searchable encryption scheme in composite order bilinear group. Using TFxIDF method in public key system, data owner ranks keywords and their synonyms to search efficiently. Furthermore, cloud storage server only returns the first K most relevant documents. Then, the cloud transformation server verifies ciphertext integrity and pre-decrypts the ciphertext, which reduces user's decryption burden. Finally, using dual system encryption, our scheme also achieves full security under static assumption in the random oracle model. Compared with classical searchable encryption schemes, the proposed scheme has better performance in aspects of searchable efficiency, ciphertext integrity and security.
引用
收藏
页码:223 / 231
页数:9
相关论文
共 50 条
  • [1] BCVSE: Verifiable Searchable Encryption Scheme With Blockchain Supporting Fuzzy Query
    Fucai Zhou
    Zi Jiao
    Qiang Wang
    Jintong Sun
    Arabian Journal for Science and Engineering, 2024, 49 : 4401 - 4418
  • [2] BCVSE: Verifiable Searchable Encryption Scheme With Blockchain Supporting Fuzzy Query
    Zhou, Fucai
    Jiao, Zi
    Wang, Qiang
    Sun, Jintong
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 4401 - 4418
  • [3] An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption
    Li, Zhidan
    Li, Wenmin
    Jin, Zhengping
    Zhang, Hua
    Wen, Qiaoyan
    IEEE ACCESS, 2019, 7 : 29023 - 29037
  • [4] Comment on "An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption"
    Guo, Zhen
    Liu, Bin
    Zhao, Kaiqiang
    Feng, Chaosheng
    IEEE ACCESS, 2020, 8 : 202483 - 202486
  • [5] ACP-ABE Scheme with Verifiable Outsourced Encryption and Decryption
    Yang H.-K.
    Feng C.-S.
    Jin Y.-X.
    Wang L.
    Luo W.-P.
    Deng H.-H.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2020, 48 (08): : 1545 - 1551
  • [6] An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing
    Li, Jing
    Guan, Zhitao
    Du, Xiaojiang
    Zhang, Zijian
    Wu, Jun
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [7] An Efficient Disjunctive Query enabled Ranked Searchable Encryption Scheme
    Tahir, Shahzaib
    Rajarajan, Muttukrishnan
    Ruj, Sushmita
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 425 - 432
  • [8] Fast, Searchable, Symmetric Encryption Scheme Supporting Ranked Search
    He, Wei
    Zhang, Yu
    Li, Yin
    SYMMETRY-BASEL, 2022, 14 (05):
  • [9] Verifiable Decryption for Fully Homomorphic Encryption
    Luo, Fucai
    Wang, Kunpeng
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 347 - 365
  • [10] Analysis of an ABE Scheme with Verifiable Outsourced Decryption
    Liao, Yongjian
    He, Yichuan
    Li, Fagen
    Jiang, Shaoquan
    Zhou, Shijie
    SENSORS, 2018, 18 (01):