IXT: Improved searchable encryption for multi-word queries based on PSI  被引量:2

在线阅读下载全文

作  者:Yunbo YANG Xiaolei DONG Zhenfu CAO Jiachen SHEN Shangmin DOU 

机构地区:[1]Shanghai Key Laboratory of Trustworthy Computing,East China Normal University,Shanghai 200062,China [2]Kunyao Academy of Shanghai Kunyao Network Technology Co.,Ltd.,Shanghai 200233,China [3]PwC US Advisory Shanghai AC,Shanghai 201203,China

出  处:《Frontiers of Computer Science》2023年第5期153-163,共11页中国计算机科学前沿(英文版)

基  金:supported in part by the National Key Research and Development Program of China(2020YFA0712300);in part by the National Natural Science Foundation of China(Grant Nos.62172162,62132005);in part by the Shanghai Trusted Industry Internet Software Collaborative Innovation Center.

摘  要:Oblivious Cross-Tags(OXT)[1]is the first efficient searchable encryption(SE)protocol for conjunctive queries in a single-writer single-reader framework.However,it also has a trade-off between security and efficiency by leaking partial database information to the server.Recent attacks on these SE schemes show that the leakages from these SE schemes can be used to recover the content of queried keywords.To solve this problem,Lai et al.[2]propose Hidden Cross-Tags(HXT),which reduces the access pattern leakage from Keyword Pair Result Pattern(KPRP)to Whole Result Pattern(WRP).However,the WRP leakage can also be used to recover some additional contents of queried keywords.This paper proposes Improved Cross-Tags(IXT),an efficient searchable encryption protocol that achieves access and searches pattern hiding based on the labeled private set intersection.We also prove the proposed labeled private set intersection(PSI)protocol is secure against semi-honest adversaries,and IXT is-semi-honest secure(is leakage function).Finally,we do experiments to compare IXT with HXT.The experimental results show that the storage overhead and computation overhead of the search phase at the client-side in IXT is much lower than those in HXT.Meanwhile,the experimental results also show that IXT is scalable and can be applied to various sizes of datasets.

关 键 词:searchable encryption private set intersection 

分 类 号:TP3[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象