Skip to main content
Top
Published in: Microsystem Technologies 4/2021

24-06-2019 | Technical Paper

Symmetric searchable encryption scheme that supports phrase search

Authors: Jinbin Zheng, Jiyan Zhang, Xiaomei Zhang, Huige Li

Published in: Microsystem Technologies | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The symmetric searchable encryption (SSE) scheme not only guarantees the privacy and security of cloud data, but also enables users to achieve fast search. However, the functions of the existing SSE scheme are not very perfect, for example, the phrase search cannot be effectively implemented. In order to solve the problem, this paper proposes an SSE scheme that can effectively support phrase search by means of the scheme of Cash et al. and proves that the scheme satisfies IND-CKA2 under the selected keywords through security analysis, and the search efficiency of the scheme can reach sub-linear levels.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Alderman J, Martin KM, Renwick SL (2017) Multi-level access in searchable symmetric encryption. Int Conf Financ Crypt Data Secur 10323:35–52MathSciNet Alderman J, Martin KM, Renwick SL (2017) Multi-level access in searchable symmetric encryption. Int Conf Financ Crypt Data Secur 10323:35–52MathSciNet
go back to reference Boldyreva A, Chenette N (2014) Efficient fuzzy search on encrypted data. Int Workshop Fast Softw Encryption 8540:613–633CrossRef Boldyreva A, Chenette N (2014) Efficient fuzzy search on encrypted data. Int Workshop Fast Softw Encryption 8540:613–633CrossRef
go back to reference Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Int Conf Theory Appl Crypt Tech 3027:506–522MathSciNetMATH Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Int Conf Theory Appl Crypt Tech 3027:506–522MathSciNetMATH
go back to reference Cash D, Jarecki S, Jutla C, Krawczyk H, Rosu M, Steiner M (2013) Highlyscalable searchable symmetric encryption with support for boolean queries. Annu Crypt Conf 8042:353–373MATH Cash D, Jarecki S, Jutla C, Krawczyk H, Rosu M, Steiner M (2013) Highlyscalable searchable symmetric encryption with support for boolean queries. Annu Crypt Conf 8042:353–373MATH
go back to reference Cash D, Jaeger J, Jarecki S, Jutla CS, Krawczyk H, Rosu M-C, Steiner M (2014) Dynamic searchable encryption very-large databases: data structures and implementation. In: 2014 Network and distributed system security symposium, p 853 Cash D, Jaeger J, Jarecki S, Jutla CS, Krawczyk H, Rosu M-C, Steiner M (2014) Dynamic searchable encryption very-large databases: data structures and implementation. In: 2014 Network and distributed system security symposium, p 853
go back to reference Chase M, Shen E (2015) Substring-searchable symmetric encryption. Proc Priv Enhancing Tech 2:263–281 Chase M, Shen E (2015) Substring-searchable symmetric encryption. Proc Priv Enhancing Tech 2:263–281
go back to reference Cheng R, Yan J, Guan C, Zhang F, Ren K (2015) Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Proceedings of the 10th ACM symposium on information, computer and communications security, pp 621–626 Cheng R, Yan J, Guan C, Zhang F, Ren K (2015) Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Proceedings of the 10th ACM symposium on information, computer and communications security, pp 621–626
go back to reference Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security, pp 79–88 Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security, pp 79–88
go back to reference Dai S, Li H, Zhang F (2016) Memory leakage-resilient searchable symmetric encryption. Future Gener Comput Syst 62:76–84CrossRef Dai S, Li H, Zhang F (2016) Memory leakage-resilient searchable symmetric encryption. Future Gener Comput Syst 62:76–84CrossRef
go back to reference Goh EJ (2003) Secure indexes. IACR Cryptology ePrint Archive, p 216 Goh EJ (2003) Secure indexes. IACR Cryptology ePrint Archive, p 216
go back to reference Kamara S, Papamanthou C (2013) Parallel and dynamic searchable symmetric encryption. Int Conf Financ Crypt Data Secur 7859:258–274 Kamara S, Papamanthou C (2013) Parallel and dynamic searchable symmetric encryption. Int Conf Financ Crypt Data Secur 7859:258–274
go back to reference Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on computer and communications security, pp 965–976 Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on computer and communications security, pp 965–976
go back to reference Kurosawa K, Ohtaki Y (2012) UC-secure searchable symmetric encryption. Int Conf Financ Crypt Data Secur 7393:285–298 Kurosawa K, Ohtaki Y (2012) UC-secure searchable symmetric encryption. Int Conf Financ Crypt Data Secur 7393:285–298
go back to reference Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp 1–5 Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp 1–5
go back to reference Li H, Zhang F, Fan CI (2017) Deniable searchable symmetric encryption. Inf Sci 402:233–243CrossRef Li H, Zhang F, Fan CI (2017) Deniable searchable symmetric encryption. Inf Sci 402:233–243CrossRef
go back to reference Van Liesdonk P, Sedghi S, Doumen J et al (2010) Computationally efficient searchable symmetric encryption. Workshop Secure Data Manage 6358:87–100CrossRef Van Liesdonk P, Sedghi S, Doumen J et al (2010) Computationally efficient searchable symmetric encryption. Workshop Secure Data Manage 6358:87–100CrossRef
go back to reference Naveed M, Prabhakaran M, Gunter CA (2014) Dynamic searchable encryption via blind storage. In: Security and Privacy (SP), 2014 IEEE symposium on security and privacy, pp 639–654 Naveed M, Prabhakaran M, Gunter CA (2014) Dynamic searchable encryption via blind storage. In: Security and Privacy (SP), 2014 IEEE symposium on security and privacy, pp 639–654
go back to reference Patarin J (1993) How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function. In: Advances in Cryptology— EUROCRYPT’92, pp 256–266 Patarin J (1993) How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function. In: Advances in Cryptology— EUROCRYPT’92, pp 256–266
go back to reference Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, pp 44–55 Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, pp 44–55
go back to reference Stefanov E, Papamanthou C, Shi E (2014) Practical dynamic searchable encryption with small leakage. NDSS 71:72–75 Stefanov E, Papamanthou C, Shi E (2014) Practical dynamic searchable encryption with small leakage. NDSS 71:72–75
go back to reference Sun SF, Liu JK, Sakzad A et al (2016) An efficient non-interactive multi-client searchable encryption with support for Boolean Queries. Euro Symp Res Comput Secur 9878:154–172 Sun SF, Liu JK, Sakzad A et al (2016) An efficient non-interactive multi-client searchable encryption with support for Boolean Queries. Euro Symp Res Comput Secur 9878:154–172
go back to reference Wang B, Yu S, Lou W et al (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: INFOCOM, 2014 Proceedings IEEE, pp 2112–2120 Wang B, Yu S, Lou W et al (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: INFOCOM, 2014 Proceedings IEEE, pp 2112–2120
Metadata
Title
Symmetric searchable encryption scheme that supports phrase search
Authors
Jinbin Zheng
Jiyan Zhang
Xiaomei Zhang
Huige Li
Publication date
24-06-2019
Publisher
Springer Berlin Heidelberg
Published in
Microsystem Technologies / Issue 4/2021
Print ISSN: 0946-7076
Electronic ISSN: 1432-1858
DOI
https://doi.org/10.1007/s00542-019-04515-y

Other articles of this Issue 4/2021

Microsystem Technologies 4/2021 Go to the issue