Verifiable memory leakage-resilient dynamic searchable encryption

被引:1
|
作者
Guan, Wenhao [1 ]
Wang, Yunling [1 ,2 ]
Wang, Jianfeng [1 ,3 ,4 ]
Fu, Xiaotong [5 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Shaanxi, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Colleges & Univ Key Lab Cloud Comp & Comp, Guilin, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Key Lab Crypt & Informat Secur, Guilin, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Cooperat Innovat Ctr Cloud Comp & Big Dat, Guilin, Peoples R China
[5] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Searchable symmetric encryption; verifiability; memory leakage-resilient; physically unclonable functions; cloud computing;
D O I
10.3233/JHS-180591
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable symmetric encryption (SSE) allows a data owner to outsource his encrypted data to a cloud server while retaining the ability to perform keyword search over encrypted data. The security guarantees of existing SSE schemes require that the adversary has no access to the data owner's secret keys. Unfortunately, adversaries may get some or all of the secret keys through memory attacks. Facing such memory attacks, most existing SSE schemes are no longer secure. Recently, a memory leakage-resilient dynamic SSE (MLR-DSSE) scheme has been proposed to resist memory attacks from physically unclonable functions (PUFs). However, this scheme does not consider the possibility of dishonest behaviors on the part of cloud servers. In this paper, we first propose a verifiable MLR-DSSE scheme based on PUFs and a verifiable hash table. The construction not only resists memory attacks but also supports verifiable search and dynamic updates. Besides, due to the combination of the secret sharing technique with PUFs, our proposed scheme can recover secret keys even if some PUFs are broken. Furthermore, the security analysis demonstrates that our proposed scheme is non-adaptively secure against memory attacks. The evaluation experiment results show that our scheme is efficient.
引用
收藏
页码:201 / 217
页数:17
相关论文
共 50 条
  • [41] A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search
    Bag, Samiran
    Ray, Indranil Ghosh
    Hao, Feng
    [J]. SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 366 - 373
  • [42] Efficient leakage-resilient public key encryption from DDH assumption
    Li, Sujuan
    Zhang, Futai
    Sun, Yinxia
    Shen, Limin
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 797 - 806
  • [43] On the Security of Verifiable Searchable Encryption Schemes
    Li, Chuang
    Xu, Chunxiang
    Li, Shanshan
    Chen, Kefei
    Miao, Yinbin
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2977 - 2978
  • [44] Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy
    Lu, Haitang
    Chen, Jie
    Ning, Jianting
    Zhang, Kai
    [J]. COMPUTER JOURNAL, 2023, 66 (10): : 2379 - 2392
  • [45] Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency
    Yoneyama, Kazuki
    Kimura, Shogo
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 489 - 501
  • [46] Leakage-Resilient Zero Knowledge
    Garg, Sanjam
    Jain, Abhishek
    Sahai, Amit
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 297 - 315
  • [47] Leakage-resilient coin tossing
    Elette Boyle
    Shafi Goldwasser
    Yael Tauman Kalai
    [J]. Distributed Computing, 2014, 27 : 147 - 164
  • [48] Fully Leakage-Resilient Signatures
    Boyle, Elette
    Segev, Gil
    Wichs, Daniel
    [J]. JOURNAL OF CRYPTOLOGY, 2013, 26 (03) : 513 - 558
  • [49] Leakage-Resilient Coin Tossing
    Boyle, Elette
    Goldwasser, Shafi
    Kalai, Yael Tauman
    [J]. DISTRIBUTED COMPUTING, 2011, 6950 : 181 - +
  • [50] Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext
    Xu, Jia
    Zhou, Jianying
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (02) : 141 - 159