Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage

Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage
Overview of the proof generation procedure. Credit: Higher Education Press

Searchable symmetric encryption (SSE) has been introduced to enable secure outsourcing of encrypted databases to cloud storage, while maintaining searchable features. Of the various SSE schemes, most assume the server is honest but curious, while the server may be trustless in the real world.

Considering a malicious server not honestly performing the queries, verifiable SSE (VSSE) schemes are constructed to ensure the verifiability of the . However, existing VSSE constructions only focus on single-keyword search or incur heavy computational cost during verification.

To address this , a research team led by Joseph K. Liu published their new research on 02 April 2022 in Frontiers of Computer Science.

The team proposes a new VSSE construction supporting conjunctive keyword queries, which can be treated as an improvement of a recent VSSE solution. The proposed VSSE scheme is based on a privacy-preserving hash-based accumulator, leveraging a well-established cryptographic primitive, Symmetric Hidden Vector Encryption (SHVE). The VSSE scheme enables both correctness and completeness verifiability for the result without pairing operations, thus greatly reducing the computational cost in the verification process.

Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage
The process from the keyword to an accumulator. Credit: Higher Education Press

More information: Qingqing Gan et al, Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage, Frontiers of Computer Science (2022). DOI: 10.1007/s11704-021-0601-8

Provided by Higher Education Press
Citation: Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage (2022, May 26) retrieved 24 April 2024 from https://techxplore.com/news/2022-05-searchable-symmetric-encryption-conjunctive-keyword.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Explore further

Efficient protocol to secure a user's private information when algorithms use it to recommend content

22 shares

Feedback to editors