Verifiable memory leakage-resilient dynamic searchable encryption

被引:1
|
作者
Guan, Wenhao [1 ]
Wang, Yunling [1 ,2 ]
Wang, Jianfeng [1 ,3 ,4 ]
Fu, Xiaotong [5 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Shaanxi, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Colleges & Univ Key Lab Cloud Comp & Comp, Guilin, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Key Lab Crypt & Informat Secur, Guilin, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Cooperat Innovat Ctr Cloud Comp & Big Dat, Guilin, Peoples R China
[5] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Searchable symmetric encryption; verifiability; memory leakage-resilient; physically unclonable functions; cloud computing;
D O I
10.3233/JHS-180591
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable symmetric encryption (SSE) allows a data owner to outsource his encrypted data to a cloud server while retaining the ability to perform keyword search over encrypted data. The security guarantees of existing SSE schemes require that the adversary has no access to the data owner's secret keys. Unfortunately, adversaries may get some or all of the secret keys through memory attacks. Facing such memory attacks, most existing SSE schemes are no longer secure. Recently, a memory leakage-resilient dynamic SSE (MLR-DSSE) scheme has been proposed to resist memory attacks from physically unclonable functions (PUFs). However, this scheme does not consider the possibility of dishonest behaviors on the part of cloud servers. In this paper, we first propose a verifiable MLR-DSSE scheme based on PUFs and a verifiable hash table. The construction not only resists memory attacks but also supports verifiable search and dynamic updates. Besides, due to the combination of the secret sharing technique with PUFs, our proposed scheme can recover secret keys even if some PUFs are broken. Furthermore, the security analysis demonstrates that our proposed scheme is non-adaptively secure against memory attacks. The evaluation experiment results show that our scheme is efficient.
引用
收藏
页码:201 / 217
页数:17
相关论文
共 50 条
  • [21] Continual Leakage-Resilient Hedged Public-Key Encryption
    Huang, Meijuan
    Yang, Bo
    Zhou, Yanwei
    Hu, Xuewei
    [J]. COMPUTER JOURNAL, 2022, 65 (06): : 1574 - 1585
  • [22] Leakage-Resilient Symmetric Encryption via Re-keying
    Abdalla, Michel
    Belaid, Sonia
    Fouque, Pierre-Alain
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 471 - 488
  • [23] Bounded leakage-resilient functional encryption with hidden vector predicate
    [J]. Zhang, M. (mwzhang@imi.kyushu-u.ac.jp), 1600, Oxford University Press (56):
  • [24] Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives
    Pereira, Olivier
    Standaert, Francois-Xavier
    Vivek, Srinivas
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 96 - 108
  • [25] Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate
    Zhang, Mingwu
    Yang, Bo
    Takagi, Tsuyoshi
    [J]. COMPUTER JOURNAL, 2013, 56 (04): : 464 - 477
  • [26] Practical Dynamic Searchable Encryption with Small Leakage
    Stefanov, Emil
    Papamanthou, Charalampos
    Shi, Elaine
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [27] Leakage-Resilient Storage
    Davi, Francesco
    Dziembowski, Stefan
    Venturi, Daniele
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 121 - +
  • [28] An Efficient, Verifiable, and Dynamic Searchable Symmetric Encryption with Forward Privacy
    Salmani, Khosro
    [J]. 2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [29] Leakage-Resilient Cryptography
    Dziembowski, Stefan
    Pietrzak, Krzysztof
    [J]. PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, : 293 - +
  • [30] Block verifiable dynamic searchable encryption using redactable blockchain
    Du, Ruizhong
    Liu, Na
    Li, Mingyue
    Tian, Junfeng
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75