Issue |
Security and Safety
Volume 4, 2025
Security and Safety of Data in Cloud Computing
|
|
---|---|---|
Article Number | 2024022 | |
Number of page(s) | 21 | |
Section | Other Fields | |
DOI | https://doi.org/10.1051/sands/2024022 | |
Published online | 30 January 2025 |
Research Article
Efficient verifiable searchable encryption with search and access pattern privacy
1
State Key Laboratory of Cryptology, Beijing, 100878, China
2
TCA Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing, 100190, China
3
National Engineering Research Center for Secured Wireless (NERCSW), School of Cyberspace Security, Xi’an University of Posts & Telecommunications, Xi’an, 710121, China
* Corresponding author (email: waxinsec@163.com)
Received:
16
October
2024
Revised:
8
November
2024
Accepted:
17
December
2024
Searchable encryption (SE) enables data users to securely search encrypted data stored in untrusted cloud servers. However, most SE schemes allow for leakages of access and search patterns to maximize efficiency and functionality. Recent attacks have shown that adversaries can recover query keywords with prior knowledge of the database by exploiting these leakages. Unfortunately, the existing schemes that protect access and search patterns result in frequent communications and high computational costs. Furthermore, complex calculation processes also raise challenges for verifying search results. To address these concerns, we first design an efficient conjunctive SE scheme with search and access pattern privacy using private set intersection. In the proposed scheme, we utilize random numbers to obfuscate the values of polynomials and randomly divide the results into two parts, which simplifies the search process, improves search efficiency, and eliminates the need for time-consuming ciphertext multiplication operations. We also extend this scheme to support search result verifiability. Specifically, by embedding a random number as the root of the return polynomial, we achieve verifiability of search results. Furthermore, we prove the security of both schemes employing the simulation-based method. Finally, we implement the schemes in a real database and thorough performance analyses demonstrate their efficiency.
Key words: Searchable encryption / Private set intersection / Search and access pattern / Verifiability / Conjunctive search
Citation: Wu A, Feng D and Zhang M et al. Efficient verifiable searchable encryption with search and access pattern privacy. Security and Safety 2025; 4: 2024022. https://doi.org/10.1051/sands/2024022
© The Author(s) 2025. Published by EDP Sciences and China Science Publishing & Media Ltd.
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.