Abstract
Symmetric Searchable Encryption (SSE), as an ideal primitive, can ensure data privacy while supporting retrieval over encrypted data. However, existing multi-user SSE schemes require the data owner to share the secret key with all query users or always be online to generate search tokens. While there are some solutions to this problem, they have at least one weakness, such as non-supporting conjunctive query, result decryption assistance of the data owner, and unauthorized access. To solve the above issues, we propose an
- [1] . 2021. Communication–computation trade-offs in PIR. In Proc. USENIX Security Symposium (USENIX’21). 1811–1828.Google Scholar
- [2] . 1991. Efficient multiparty protocols using circuit randomization. In Proc. Annual International Cryptology Conference (CRYPTO’91). Springer, 420–432.Google Scholar
- [3] . 2008. Sharemind: A framework for fast privacy-preserving computations. In Proc. European Symposium on Research in Computer Security (ESORICS’08). Springer, 192–206.Google Scholar
- [4] . 2012. High-performance secure multi-party computation for data mining applications. International Journal of Information Security 11, 6 (2012), 403–418.Google ScholarDigital Library
- [5] . 2018. Exploring crypto dark matter: New simple PRF candidates and their applications. In Proc. Theory of Cryptography Conference (TCC’18), Vol. 11240. Springer, 699–729.Google ScholarDigital Library
- [6] , Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cǎtǎlin Roşu, and Michael Steiner. 2014. Dynamic searchable encryption in very-large databases: Data structures and implementation. Proc. Annual Network and Distributed System Security Symposium (NDSS’14) (2014), 1–16.Google Scholar
- [7] . 2013. Highly-scalable searchable symmetric encryption with support for boolean queries. In Proc. Annual Cryptology Conference (CRYPTO’13). Springer, 353–373.Google ScholarCross Ref
- [8] . 2018. Secure similar sequence query on outsourced genomic data. In Proc. Asia Conference on Computer and Communications Security (AsiaCCS’18). ACM, 237–251.Google ScholarDigital Library
- [9] . 2019. OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud. Information Sciences 489 (2019), 63–77.Google ScholarDigital Library
- [10] . 2006. Searchable symmetric encryption: Improved definitions and efficient constructions. In Proc. ACM Conference on Computer and Communications Security (CCS’06). ACM, 79–88.Google ScholarDigital Library
- [11] . 2011. Searchable symmetric encryption: Improved definitions and efficient constructions. Journal of Computer Security 19, 5 (2011), 895–934.Google ScholarCross Ref
- [12] . 2015. ABY-A framework for efficient mixed-protocol secure two-party computation. In Proc. Annual Network and Distributed System Security Symposium (NDSS’15). The Internet Society, 1–15.Google Scholar
- [13] . 2021. MPC-friendly symmetric cryptography from alternating moduli: Candidates, protocols, and applications. In Proc. Annual International Cryptology Conference (CRYPTO’21). Springer, 517–547.Google ScholarDigital Library
- [14] . 2013. Outsourced symmetric private information retrieval. In Proc. ACM SIGSAC Conference on Computer & Communications Security (CCS’13). ACM, 875–888.Google ScholarDigital Library
- [15] . 2021. Multi-client cloud-based symmetric searchable encryption. IEEE Transactions on Dependable and Secure Computing 18, 5 (2021), 2419–2437.Google ScholarDigital Library
- [16] . 2018. Result pattern hiding searchable encryption for conjunctive queries. In Proc. ACM SIGSAC Conference on Computer and Communications Security (CCS’18). ACM, 745–762.Google ScholarDigital Library
- [17] . 2020. Practical multi-keyword ranked search with access control over encrypted cloud data. IEEE Transactions on Cloud Computing 10, 3 (2020), 2005–2019.Google ScholarCross Ref
- [18] . 2011. A secure erasure code-based cloud storage system with secure data forwarding. IEEE Transactions on Parallel and Distributed Systems 23, 6 (2011), 995–1003.Google Scholar
- [19] . 2019. Toward highly secure yet efficient KNN classification scheme on outsourced cloud data. IEEE Internet of Things Journal 6, 6 (2019), 9841–9852.Google ScholarCross Ref
- [20] . 2018. Multi-user verifiable searchable symmetric encryption for cloud storage. IEEE Transactions on Dependable and Secure Computing 17, 6 (2018), 1322–1332.Google ScholarCross Ref
- [21] . 2022. Privacy-preserving object detection for medical images with faster R-CNN. IEEE Transactions on Information Forensics and Security 17 (2022), 69–84.Google ScholarDigital Library
- [22] . 2022. Constant-weight PIR: Single-round keyword PIR via constant-weight equality operators. In Proc. 31st USENIX Security Symposium (USENIX’22). 1723–1740.Google Scholar
- [23] . 2019. Optimized verifiable fine-grained keyword search in dynamic multi-owner settings. IEEE Transactions on Dependable and Secure Computing 18, 4 (2019), 1804–1820.Google Scholar
- [24] . 2019. Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing. In Proc. ACM SIGSAC Conference on Computer and Communications Security (CCS’19). 79–93.Google ScholarDigital Library
- [25] . 2017. Lightweight symmetric-key hidden vector encryption without pairings. Cryptology ePrint Archive (2017).Google Scholar
- [26] . 2019. EPISODE: Efficient privacy-preserving similar sequence queries on outsourced genomic databases. In Proc. ACM Asia Conference on Computer and Communications Security (AsiaCCS’19). ACM, 315–327.Google ScholarDigital Library
- [27] . 2000. Practical techniques for searches on encrypted data. In Proc. IEEE Symposium on Security and Privacy (S&P’00). IEEE, 44–55.Google Scholar
- [28] . 2022. Non-interactive multi-client searchable encryption: Realization and implementation. IEEE Transactions on Dependable and Secure Computing 19, 1 (2022), 452–467.Google ScholarDigital Library
- [29] . 2023. Privacy-preserving boolean range query with temporal access control in mobile computing. IEEE Transactions on Knowledge and Data Engineering 35, 5 (2023), 5159–5172.Google ScholarDigital Library
- [30] . 2021. Vfirm: Verifiable fine-grained encrypted image retrieval in multi-owner multi-user settings. IEEE Transactions on Services Computing 15, 6 (2021), 3606–3619.Google ScholarCross Ref
- [31] . 2020. VPSL: Verifiable privacy-preserving data search for cloud-assisted Internet of Things. IEEE Transactions on Cloud Computing 10, 4 (2020), 2964–2976.Google ScholarCross Ref
- [32] . 2023. Verifiable fuzzy multi-keyword search over encrypted data with adaptive security. IEEE Transactions on Knowledge and Data Engineering 35, 5 (2023), 5386–5399.Google ScholarDigital Library
- [33] . 2022. Practical volume-hiding encrypted multi-maps with optimal overhead and beyond. In Proc. ACM SIGSAC Conference on Computer and Communications Security (CCS’22). 2825–2839.Google ScholarDigital Library
- [34] . 2021. Attribute-based encrypted search for multi-owner and multi-user model. In Proc. IEEE International Conference on Communications (ICC’21). IEEE, 1–7.Google ScholarCross Ref
- [35] . 2020. Search me in the dark: Privacy-preserving boolean range query over encrypted spatial data. In Proc. IEEE Conference on Computer Communications (INFOCOM’20). IEEE, 2253–2262.Google ScholarDigital Library
- [36] . 2006. Research and performance evaluation of data replication technology in distributed storage systems. Computers & Mathematics with Applications 51, 11 (2006), 1625–1632.Google ScholarDigital Library
- [37] . 2020. Privacy-preserving image retrieval based on additive secret sharing. arXiv preprint arXiv:2009.06893 (2020).Google Scholar
- [38] . 2022. Lightweight privacy-preserving GAN framework for model training and image synthesis. IEEE Transactions on Information Forensics and Security 17 (2022), 1083–1098.Google ScholarCross Ref
- [39] . 2020. Multi-client sub-linear boolean keyword searching for encrypted cloud storage with owner-enforced authorization. IEEE Transactions on Dependable and Secure Computing 18, 6 (2020), 2875–2887.Google ScholarDigital Library
- [40] . 2022. Efficient and privacy-preserving similarity query with access control in eHealthcare. IEEE Transactions on Information Forensics and Security 17 (2022), 880–893.Google ScholarCross Ref
- [41] . 2017. Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner. Computers & Security 69 (2017), 84–96.Google ScholarCross Ref
- [42] . 2013. Secure k-NN computation on encrypted cloud data without sharing key with query users. In Proc. International workshop on Security in Cloud Computing (AsiaCCS Workshop’13). ACM, 55–60.Google Scholar
Index Terms
- Owner-free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries
Recommendations
Result Pattern Hiding Searchable Encryption for Conjunctive Queries
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityThe recently proposed Oblivious Cross-Tags (OXT) protocol (CRYPTO 2013) has broken new ground in designing efficient searchable symmetric encryption (SSE) protocol with support for conjunctive keyword search in a single-writer single-reader framework. ...
Searchable symmetric encryption: improved definitions and efficient constructions
CCS '06: Proceedings of the 13th ACM conference on Computer and communications securitySearchable symmetric encryption (SSE) allows a party to outsource the storage of its data to another party (a server) in a private manner, while maintaining the ability to selectively search over it. This problem has been the focus of active research in ...
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecuritySymmetric Searchable Encryption (SSE) has received wide attention due to its practical application in searching on encrypted data. Beyond search, data addition and deletion are also supported in dynamic SSE schemes. Unfortunately, these update ...
Comments