File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-319-98989-1_5
- Scopus: eid_2-s2.0-85051868130
- WOS: WOS:000460205900005
- Find via
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Towards efficient verifiable conjunctive keyword search for large encrypted database
Title | Towards efficient verifiable conjunctive keyword search for large encrypted database |
---|---|
Authors | |
Keywords | Accumulator Conjunctive keyword search Searchable encryption Verifiable search |
Issue Date | 2018 |
Citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, v. 11099 LNCS, p. 83-100 How to Cite? |
Abstract | © 2018, Springer Nature Switzerland AG. Searchable Symmetric Encryption (SSE) enables a client to securely outsource large encrypted database to a server while supporting efficient keyword search. Most of the existing works are designed against the honest-but-curious server. That is, the server will be curious but execute the protocol in an honest manner. Recently, some researchers presented various verifiable SSE schemes that can resist to the malicious server, where the server may not honestly perform all the query operations. However, they either only considered single-keyword search or cannot handle very large database. To address this challenge, we propose a new verifiable conjunctive keyword search scheme by leveraging accumulator. Our proposed scheme can not only ensure verifiability of search result even if an empty set is returned but also support efficient conjunctive keyword search with sublinear overhead. Besides, the verification cost of our construction is independent of the size of search result. In addition, we introduce a sample check method for verifying the completeness of search result with a high probability, which can significantly reduce the computation cost on the client side. Security and efficiency evaluation demonstrate that the proposed scheme not only can achieve high security goals but also has a comparable performance. |
Persistent Identifier | http://hdl.handle.net/10722/280679 |
ISSN | 2020 SCImago Journal Rankings: 0.249 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, Jianfeng | - |
dc.contributor.author | Chen, Xiaofeng | - |
dc.contributor.author | Sun, Shi Feng | - |
dc.contributor.author | Liu, Joseph K. | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Zhan, Zhi Hui | - |
dc.date.accessioned | 2020-02-17T14:34:40Z | - |
dc.date.available | 2020-02-17T14:34:40Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, v. 11099 LNCS, p. 83-100 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280679 | - |
dc.description.abstract | © 2018, Springer Nature Switzerland AG. Searchable Symmetric Encryption (SSE) enables a client to securely outsource large encrypted database to a server while supporting efficient keyword search. Most of the existing works are designed against the honest-but-curious server. That is, the server will be curious but execute the protocol in an honest manner. Recently, some researchers presented various verifiable SSE schemes that can resist to the malicious server, where the server may not honestly perform all the query operations. However, they either only considered single-keyword search or cannot handle very large database. To address this challenge, we propose a new verifiable conjunctive keyword search scheme by leveraging accumulator. Our proposed scheme can not only ensure verifiability of search result even if an empty set is returned but also support efficient conjunctive keyword search with sublinear overhead. Besides, the verification cost of our construction is independent of the size of search result. In addition, we introduce a sample check method for verifying the completeness of search result with a high probability, which can significantly reduce the computation cost on the client side. Security and efficiency evaluation demonstrate that the proposed scheme not only can achieve high security goals but also has a comparable performance. | - |
dc.language | eng | - |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.subject | Accumulator | - |
dc.subject | Conjunctive keyword search | - |
dc.subject | Searchable encryption | - |
dc.subject | Verifiable search | - |
dc.title | Towards efficient verifiable conjunctive keyword search for large encrypted database | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-319-98989-1_5 | - |
dc.identifier.scopus | eid_2-s2.0-85051868130 | - |
dc.identifier.volume | 11099 LNCS | - |
dc.identifier.spage | 83 | - |
dc.identifier.epage | 100 | - |
dc.identifier.eissn | 1611-3349 | - |
dc.identifier.isi | WOS:000460205900005 | - |
dc.identifier.issnl | 0302-9743 | - |