File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Towards efficient verifiable conjunctive keyword search for large encrypted database

TitleTowards efficient verifiable conjunctive keyword search for large encrypted database
Authors
KeywordsAccumulator
Conjunctive keyword search
Searchable encryption
Verifiable search
Issue Date2018
Citation
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, v. 11099 LNCS, p. 83-100 How to Cite?
Abstract© 2018, Springer Nature Switzerland AG. Searchable Symmetric Encryption (SSE) enables a client to securely outsource large encrypted database to a server while supporting efficient keyword search. Most of the existing works are designed against the honest-but-curious server. That is, the server will be curious but execute the protocol in an honest manner. Recently, some researchers presented various verifiable SSE schemes that can resist to the malicious server, where the server may not honestly perform all the query operations. However, they either only considered single-keyword search or cannot handle very large database. To address this challenge, we propose a new verifiable conjunctive keyword search scheme by leveraging accumulator. Our proposed scheme can not only ensure verifiability of search result even if an empty set is returned but also support efficient conjunctive keyword search with sublinear overhead. Besides, the verification cost of our construction is independent of the size of search result. In addition, we introduce a sample check method for verifying the completeness of search result with a high probability, which can significantly reduce the computation cost on the client side. Security and efficiency evaluation demonstrate that the proposed scheme not only can achieve high security goals but also has a comparable performance.
Persistent Identifierhttp://hdl.handle.net/10722/280679
ISSN
2020 SCImago Journal Rankings: 0.249
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorWang, Jianfeng-
dc.contributor.authorChen, Xiaofeng-
dc.contributor.authorSun, Shi Feng-
dc.contributor.authorLiu, Joseph K.-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorZhan, Zhi Hui-
dc.date.accessioned2020-02-17T14:34:40Z-
dc.date.available2020-02-17T14:34:40Z-
dc.date.issued2018-
dc.identifier.citationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, v. 11099 LNCS, p. 83-100-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10722/280679-
dc.description.abstract© 2018, Springer Nature Switzerland AG. Searchable Symmetric Encryption (SSE) enables a client to securely outsource large encrypted database to a server while supporting efficient keyword search. Most of the existing works are designed against the honest-but-curious server. That is, the server will be curious but execute the protocol in an honest manner. Recently, some researchers presented various verifiable SSE schemes that can resist to the malicious server, where the server may not honestly perform all the query operations. However, they either only considered single-keyword search or cannot handle very large database. To address this challenge, we propose a new verifiable conjunctive keyword search scheme by leveraging accumulator. Our proposed scheme can not only ensure verifiability of search result even if an empty set is returned but also support efficient conjunctive keyword search with sublinear overhead. Besides, the verification cost of our construction is independent of the size of search result. In addition, we introduce a sample check method for verifying the completeness of search result with a high probability, which can significantly reduce the computation cost on the client side. Security and efficiency evaluation demonstrate that the proposed scheme not only can achieve high security goals but also has a comparable performance.-
dc.languageeng-
dc.relation.ispartofLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.subjectAccumulator-
dc.subjectConjunctive keyword search-
dc.subjectSearchable encryption-
dc.subjectVerifiable search-
dc.titleTowards efficient verifiable conjunctive keyword search for large encrypted database-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/978-3-319-98989-1_5-
dc.identifier.scopuseid_2-s2.0-85051868130-
dc.identifier.volume11099 LNCS-
dc.identifier.spage83-
dc.identifier.epage100-
dc.identifier.eissn1611-3349-
dc.identifier.isiWOS:000460205900005-
dc.identifier.issnl0302-9743-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats