Deniable Searchable Symmetric Encryption

被引:12
|
作者
Li, Huige [1 ,2 ]
Zhang, Fangguo [1 ,2 ]
Fan, Chun-I [3 ]
机构
[1] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[2] Guangdong Key Lab Informat Secur Technol, Guangzhou 510006, Guangdong, Peoples R China
[3] Natl Sun Yat Sen Univ, Dept Comp Sci & Stat, Kaohsiung, Taiwan
基金
中国国家自然科学基金;
关键词
Searchable symmetric encryption; Deniable encryption; Coercer; Cloud-computing;
D O I
10.1016/j.ins.2017.03.032
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent years, Searchable Symmetric Encryption (SSE) has become one of the hottest topic in cloud-computing area because of its availability and flexibility, and there are a series of SSE schemes were proposed. The adversary considered in these schemes is either honest-but-curious or malicious. However, in the real world, there also exists such adversary who has stronger power. Namely, he/she may coerce some one of the participants to disclose some communication information. The existing SSE algorithms cannot against this adversary under the premise of confidentiality. To solve this problem, in this paper we firstly introduce coercer into SSE scheme. According to the role that the coercer plays, two situations are considered. In the first situation, the adversary is an inside coercer. In the second situation, the adversary is an outside coercer. The inside coercer means the server, while the outside coercer is such person that outside of the data owner, the user and the server. In view of the ability that the coercer has, we firstly construct the deniable SSE model (i.e., Den-SSE). Then we define the property what the Den-SSE should satisfy. By using the Deniable Encryption idea, we propose a scheme that can against the outside coercer, and two scheme that can resist inside coercer. At last, we prove our schemes can meet the property that we define. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:233 / 243
页数:11
相关论文
共 50 条
  • [21] Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption
    Gajek, Sebastian
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 75 - 89
  • [22] Storage Efficient Substring Searchable Symmetric Encryption
    Leontiadis, Iraklis
    Li, Ming
    SCC'18: PROCEEDINGS OF THE 6TH INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2018, : 3 - 13
  • [23] Efficient and scalable architecture for searchable symmetric encryption
    Wu Z.-Q.
    Li K.-L.
    Zheng H.
    Zheng, Hui (zhdilly@163.com), 1600, Editorial Board of Journal on Communications (38): : 79 - 93
  • [24] A Searchable Symmetric Encryption Scheme Based on SRE
    Huang Y.
    Yu B.
    Li S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (12): : 2725 - 2736
  • [25] Exploiting Update Leakage in Searchable Symmetric Encryption
    Haltiwanger, Jacob
    Hoang, Thang
    PROCEEDINGS OF THE FOURTEENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2024, 2024, : 115 - 126
  • [26] Updatable searchable symmetric encryption: Definitions and constructions *
    Wang, Xiwen
    Zhang, Kai
    Gong, Junqing
    Sun, Shi-Feng
    Ning, Jianting
    THEORETICAL COMPUTER SCIENCE, 2024, 983
  • [27] Attribute-Based Symmetric Searchable Encryption
    Dang, Hai-Van
    Ullah, Amjad
    Bakas, Alexandros
    Michalas, Antonis
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 318 - 336
  • [28] Searchable symmetric encryption over multiple servers
    Geong Sen Poh
    Moesfa Soeheila Mohamad
    Ji-Jian Chin
    Cryptography and Communications, 2018, 10 : 139 - 158
  • [29] Efficient Searchable Symmetric Encryption for Join Queries
    Jutla, Charanjit
    Patranabis, Sikhar
    ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 304 - 333
  • [30] Searchable Symmetric Encryption with Forward Search Privacy
    Li, Jin
    Huang, Yanyu
    Wei, Yu
    Lv, Siyi
    Liu, Zheli
    Dong, Changyu
    Lou, Wenjing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 460 - 474