Home > Achievements in Scientific Research > Paper Publications

Paper Publications
Efficient Forward and Backward Private Conjunctive Searchable Encryption with Comprehensive Verification

Release time:2025-03-31

Hits:

DOI number:10.1109/TBDATA.2024.3442540

Journal:IEEE Transactions on Big Data

Key Words:Encryption,Cloud computing,Servers,Accuracy, Indexes,Data privacy,Keyword search

Abstract:Dynamic searchable symmetric encryption (DSSE) enables the retrieval and update of massive encrypted data and is thus widely applied in cloud storage. Malicious cloud servers may tamper with outsourced data or return incorrect search results, making verification indispensable. However, current verifiable conjunctive DSSE with forward and backward privacy cannot simultaneously achieve accurate search and empty result verification. Given the above problems, we propose a novel forward and backward private conjunctive DSSE with comprehensive verification called VCFB. VCFB introduces the notion of random blinding factors and secure dynamic cross-tags to achieve accurate conjunctive search with sublinear overhead. We design the search state and construct chain structures to ensure forward security. The new verification algorithm based on bilinear-map dynamic accumulators can guarantee the verifiability of search results even if an empty result is returned. We use a sample check method to verify the new dynamic cross-tags, reducing computation costs. We precisely define the leakage function of VCFB and give detailed security proof, demonstrating that VCFB is forward and backward private under the malicious server model. Experimental results show that VCFB ensures efficient and accurate conjunctive search, outperforming the similar verifiable conjunctive DSSE scheme regarding indexing storage and update performance.

Co-author:Ying Gao, Lin Qi, Jiankai Qiu

First Author:Yue Ge

Indexed by:Journal paper

Page Number:1 - 14

ISSN No.:2372-2096

Translation or Not:no

Date of Publication:2024-08-29

Pre One:基于理想格公钥密码关键部件的改进与优化实现

Next One:GMS: an efcient fully homomorphic encryption scheme for secure outsourced matrix multiplication