Deniable Searchable Symmetric Encryption

被引:12
|
作者
Li, Huige [1 ,2 ]
Zhang, Fangguo [1 ,2 ]
Fan, Chun-I [3 ]
机构
[1] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[2] Guangdong Key Lab Informat Secur Technol, Guangzhou 510006, Guangdong, Peoples R China
[3] Natl Sun Yat Sen Univ, Dept Comp Sci & Stat, Kaohsiung, Taiwan
基金
中国国家自然科学基金;
关键词
Searchable symmetric encryption; Deniable encryption; Coercer; Cloud-computing;
D O I
10.1016/j.ins.2017.03.032
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent years, Searchable Symmetric Encryption (SSE) has become one of the hottest topic in cloud-computing area because of its availability and flexibility, and there are a series of SSE schemes were proposed. The adversary considered in these schemes is either honest-but-curious or malicious. However, in the real world, there also exists such adversary who has stronger power. Namely, he/she may coerce some one of the participants to disclose some communication information. The existing SSE algorithms cannot against this adversary under the premise of confidentiality. To solve this problem, in this paper we firstly introduce coercer into SSE scheme. According to the role that the coercer plays, two situations are considered. In the first situation, the adversary is an inside coercer. In the second situation, the adversary is an outside coercer. The inside coercer means the server, while the outside coercer is such person that outside of the data owner, the user and the server. In view of the ability that the coercer has, we firstly construct the deniable SSE model (i.e., Den-SSE). Then we define the property what the Den-SSE should satisfy. By using the Deniable Encryption idea, we propose a scheme that can against the outside coercer, and two scheme that can resist inside coercer. At last, we prove our schemes can meet the property that we define. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:233 / 243
页数:11
相关论文
共 50 条
  • [1] Research on Searchable Symmetric Encryption
    Wang Y.
    Chen X.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (10): : 2374 - 2385
  • [2] Distributed Searchable Symmetric Encryption
    Bosch, Christoph
    Peter, Andreas
    Leenders, Bram
    Lim, Hoon Wei
    Tang, Qiang
    Wang, Huaxiong
    Hartel, Pieter
    Jonker, Willem
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 330 - 337
  • [3] A Survey on Searchable Symmetric Encryption
    Li, Feng
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Ximeng
    Ning, Jianting
    Deng, Robert H.
    ACM COMPUTING SURVEYS, 2024, 56 (05)
  • [4] Research on Searchable Symmetric Encryption
    Wang Yunling
    Chen Xiaofeng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (10) : 2374 - 2385
  • [5] Rethinking Searchable Symmetric Encryption
    Gui, Zichen
    Paterson, Kenneth G.
    Patranabis, Sikhar
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1401 - 1418
  • [6] The Locality of Searchable Symmetric Encryption
    Cash, David
    Tessaro, Stefano
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 351 - 368
  • [7] Garbled Searchable Symmetric Encryption
    Kurosawa, Kaoru
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 234 - 251
  • [8] Searchable Symmetric Encryption: Designs and Challe
    Sen Poh, Geong
    Chin, Ji-Jian
    Yau, Wei-Chuen
    Choo, Kim-Kwang Raymond
    Mohamad, Moesfa Soeheila
    ACM COMPUTING SURVEYS, 2017, 50 (03)
  • [9] Searchable Symmetric Encryption for Restricted Search
    Horvath, Mate
    Vajda, Istvan
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2018, 14 (01) : 104 - 111
  • [10] Searchable Symmetric Encryption Security Definitions
    Mohamad, M. S.
    Tan, S. Y.
    Chin, J. J.
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2019, 13 : 31 - 47