Forward and backward secure keyword search with flexible keyword shielding

被引:4
|
作者
Li, Zhijun [1 ,2 ]
Ma, Jianfeng [1 ]
Miao, Yinbin [1 ,2 ]
Liu, Ximeng [3 ]
Choo, Kim-Kwang Raymond [4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350116, Fujian, Peoples R China
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Dynamic searchable symmetric encryption; Forward and backward security; Keyword shielding; Trapdoor permutations; Puncturable encryption; ATTRIBUTE-BASED ENCRYPTION;
D O I
10.1016/j.ins.2021.06.048
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic Searchable Symmetric Encryption (DSSE) has gained increasing popularity as it enables users to perform both file updates and ciphertext retrieval over encrypted data. However, existing DSSE schemes still lead to privacy leakage (e.g., forward and backward privacy) in the dynamic setting. Some forward and backward secure DSSE schemes have been proposed, but still cannot support the keyword shielding flexibly. To solve this challenging issue, we propose a Forward and Backward Authorized Keyword Search (FB-AKS) scheme with recoverable keyword shielding by using trapdoor permutations and puncturable encryption in this paper. Compared with existing forward and backward private schemes, FB-AKS achieves keyword authorization flexibly (e.g., keyword shielding, keyword un-shielding). The formal security analysis proves that FB-AKS achieves forward and backward security. And extensive experiments demonstrate that FB-AKS has less computation and storage overheads. (c) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页码:507 / 521
页数:15
相关论文
共 50 条
  • [1] Forward and backward secure searchable encryption with multi-keyword search and result verification
    Jie CUI
    Yue SUN
    Yan XU
    Miaomiao TIAN
    Hong ZHONG
    [J]. Science China(Information Sciences), 2022, (05) : 270 - 272
  • [2] Forward and backward secure searchable encryption with multi-keyword search and result verification
    Jie Cui
    Yue Sun
    Yan Xu
    Miaomiao Tian
    Hong Zhong
    [J]. Science China Information Sciences, 2022, 65
  • [3] Forward and backward secure searchable encryption with multi-keyword search and result verification
    Cui, Jie
    Sun, Yue
    Xu, Yan
    Tian, Miaomiao
    Zhong, Hong
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (05)
  • [4] Toward Forward Secure SSE Supporting Conjunctive Keyword Search
    Wang, Yunling
    Wang, Jianfeng
    Sun, Shifeng
    Miao, Meixia
    Chen, Xiaofeng
    [J]. IEEE ACCESS, 2019, 7 : 142762 - 142772
  • [5] Secure Symmetric Keyword Search with Keyword Privacy for Cloud Storage Services
    Youn, Taek-Young
    Rhee, Hyun Sook
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [6] Secure, Dynamic, and Efficient Keyword Search With Flexible Merging for Cloud Storage
    Zhang, Xi
    Huang, Cheng
    Su, Ye
    Qin, Jing
    [J]. IEEE Transactions on Services Computing, 2024, 17 (05): : 2822 - 2835
  • [7] Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search
    JIANG, Z. H. E.
    ZHANG, K. A., I
    WANG, L. I. A. N. G. L. I. A. N. G.
    NING, J. I. A. N. T. I. N. G.
    [J]. COMPUTER JOURNAL, 2023, 66 (09): : 2265 - 2278
  • [8] Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage
    Zeng, Ming
    Qian, Haifeng
    Chen, Jie
    Zhang, Kai
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 426 - 438
  • [9] Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search
    Emura, Keita
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 237 - 256
  • [10] A Secure Attribute Based Keyword Search Scheme Against Keyword Guessing Attack
    Yousefipoor, Vahid
    Ameri, Mohammad Hassan
    Mohajeri, Javad
    Eghlidos, Taraneh
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 124 - 128