Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation

Shi Feng Sun, Cong Zuo, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, Xingliang Yuan, Dawu Gu*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

34 Citations (Scopus)

Abstract

In this article, we introduce a new mechanism for constructing multi-client searchable encryption (SE). By tactfully leveraging the RSA-function, we propose the first multi-client SE protocol that successfully avoids per-query interaction between data owner and client. Therefore, our approach significantly reduces the communication cost by eliminating the need for data owner to authorize client queries at all times. To be compatible with the RSA-based approach, we also present a deterministic and memory-efficient 'keyword to prime' hash function, which may be of independent interest. Further, to improve efficiency, we put forward a more generic construction from set-constrained PRFs. The construction not only inherits the merits of our first protocol, but also achieves an enhanced security (against untrusted clients), where colluding attack among clients is also taken into account. Both protocols are instantiated via the recent representative SE protocol by Cash et al. with the support of boolean queries. At last, we implement our proposed protocols and comprehensively evaluate their performance to demonstrate their practicability and scalability.

Original languageEnglish
Pages (from-to)452-467
Number of pages16
JournalIEEE Transactions on Dependable and Secure Computing
Volume19
Issue number1
DOIs
Publication statusPublished - 2022
Externally publishedYes

Keywords

  • Data outsourcing
  • constrained PRF
  • data privacy
  • multi-client
  • non-interaction
  • searchable encryption

Fingerprint

Dive into the research topics of 'Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation'. Together they form a unique fingerprint.

Cite this