TY - JOUR
T1 - Enabling Verifiable Keyword Search Over Encrypted Data via Dynamic Version-Aware Indexing
AU - Liu, Yuzhi
AU - Shen, Meng
AU - Su, Yue
AU - Xie, Yong
AU - Wang, Wei
AU - Zhao, Qinglin
AU - Wang, Jiayang
AU - Dong, Jin
AU - Wang, Gerui
AU - Zhu, Liehuang
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2026
Y1 - 2026
N2 - As data sharing on networked infrastructures becomes more common, the need to securely manage information between nodes is increasingly critical. Searchable Encryption (SE) is a common primitive for cloud data sharing, which enables the data owner to store the encrypted data set in the cloud for users to search. However, existing SE schemes face challenge among verifiability, privacy and efficiency. To overcome this limitation, we propose an efficient and verifiable SE scheme EchoSeek. In our approach, we design a novel version-binding-based verification scheme to deal with the version change of the encrypted dataset. Our scheme ensures verifiability, privacy, and efficiency, and users are not required to maintain any auxiliary information. We tailor our scheme for both non-forward privacy and forward privacy scenarios, namely EchoSeek-N and EchoSeek-F, respectively. We formally prove the security of our scheme, and conduct theoretical and experimental evaluation to prove its effectiveness.
AB - As data sharing on networked infrastructures becomes more common, the need to securely manage information between nodes is increasingly critical. Searchable Encryption (SE) is a common primitive for cloud data sharing, which enables the data owner to store the encrypted data set in the cloud for users to search. However, existing SE schemes face challenge among verifiability, privacy and efficiency. To overcome this limitation, we propose an efficient and verifiable SE scheme EchoSeek. In our approach, we design a novel version-binding-based verification scheme to deal with the version change of the encrypted dataset. Our scheme ensures verifiability, privacy, and efficiency, and users are not required to maintain any auxiliary information. We tailor our scheme for both non-forward privacy and forward privacy scenarios, namely EchoSeek-N and EchoSeek-F, respectively. We formally prove the security of our scheme, and conduct theoretical and experimental evaluation to prove its effectiveness.
KW - Searchable encryption
KW - forward privacy
KW - verifiable data search
UR - https://www.scopus.com/pages/publications/105021521021
U2 - 10.1109/TNSE.2025.3627952
DO - 10.1109/TNSE.2025.3627952
M3 - Article
AN - SCOPUS:105021521021
SN - 2327-4697
VL - 13
SP - 3158
EP - 3174
JO - IEEE Transactions on Network Science and Engineering
JF - IEEE Transactions on Network Science and Engineering
ER -