Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage

Qingqing Gan, Joseph K. Liu*, Xiaoming Wang, Xingliang Yuan, Shi Feng Sun, Daxin Huang, Cong Zuo, Jianfeng Wang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

12 Citations (Scopus)

Abstract

Searchable symmetric encryption (SSE) has been introduced for secure outsourcing the encrypted database to cloud storage, while maintaining searchable features. Of various SSE schemes, most of them assume the server is honest but curious, while the server may be trustless in the real world. Considering a malicious server not honestly performing the queries, verifiable SSE (VSSE) schemes are constructed to ensure the verifiability of the search results. However, existing VSSE constructions only focus on single-keyword search or incur heavy computational cost during verification. To address this challenge, we present an efficient VSSE scheme, built on OXT protocol (Cash et al., CRYPTO 2013), for conjunctive keyword queries with sublinear search overhead. The proposed VSSE scheme is based on a privacy-preserving hash-based accumulator, by leveraging a well-established cryptographic primitive, Symmetric Hidden Vector Encryption (SHVE). Our VSSE scheme enables both correctness and completeness verifiability for the result without pairing operations, thus greatly reducing the computational cost in the verification process. Besides, the proposed VSSE scheme can still provide a proof when the search result is empty. Finally, the security analysis and experimental evaluation are given to demonstrate the security and practicality of the proposed scheme.

Original languageEnglish
Article number166820
JournalFrontiers of Computer Science
Volume16
Issue number6
DOIs
Publication statusPublished - Dec 2022
Externally publishedYes

Keywords

  • cloud storage
  • conjunctive keyword queries
  • hash-based accumulator
  • searchable symmetric encryption
  • verifiability

Fingerprint

Dive into the research topics of 'Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage'. Together they form a unique fingerprint.

Cite this