Cross pattern hiding structured encryption for conjunctive queries

Structured encryption, a specialized form of searchable encryption, has been recognized for offering improved tradeoffs between performance, security, and expressiveness. It is designed to protect the privacy of cloud storage data and supports a variety of queries on the ciphertext database. The str...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG Ziyi, MA Changshe, XIE Nanjiang
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2024-06-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024048
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529522702254080
author YANG Ziyi
MA Changshe
XIE Nanjiang
author_facet YANG Ziyi
MA Changshe
XIE Nanjiang
author_sort YANG Ziyi
collection DOAJ
description Structured encryption, a specialized form of searchable encryption, has been recognized for offering improved tradeoffs between performance, security, and expressiveness. It is designed to protect the privacy of cloud storage data and supports a variety of queries on the ciphertext database. The structured encryption scheme OXT, proposed in 2013, supports conjunctive queries of multi-keywords but was found to incur linear complexity in both token computation and search communication overheads. The ConjFilter scheme, more recently introduced, was aimed at decreasing the token overhead and reducing privacy leakage for structured encryption schemes that support Boolean queries. However, it was observed that this scheme resulted in cross-leakage between different queries. To address this issue, a transformed key encryption (TKE) scheme, based on random permutation and counter encryption modes was proposed. In essence, the TKE scheme was capable of converting ciphertext encrypted by one key into ciphertext encrypted by another key, without the need for decrypting the ciphertext at the serving side and without disclosing any information beyond the transformation modes. Utilizing this scheme, an encrypted multi-map scheme, transformable key filter (TK-Filter), was designed to support conjunctive queries. This scheme was reported to have nearly identical communication and storage overhead as the ConjFilter scheme but effectively prevented cross-leakage between different queries. Experimental analysis results show that TK-Filter reduces the initialization time by 58% to 86% and improves the search efficiency by 34% to 41% compared to ConjFilter across datasets of various sizes.
format Article
id doaj-art-613ff93abb7140feba5d3d91ad360fcd
institution Kabale University
issn 2096-109X
language English
publishDate 2024-06-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-613ff93abb7140feba5d3d91ad360fcd2025-01-15T03:17:13ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2024-06-011017518767188633Cross pattern hiding structured encryption for conjunctive queriesYANG ZiyiMA ChangsheXIE NanjiangStructured encryption, a specialized form of searchable encryption, has been recognized for offering improved tradeoffs between performance, security, and expressiveness. It is designed to protect the privacy of cloud storage data and supports a variety of queries on the ciphertext database. The structured encryption scheme OXT, proposed in 2013, supports conjunctive queries of multi-keywords but was found to incur linear complexity in both token computation and search communication overheads. The ConjFilter scheme, more recently introduced, was aimed at decreasing the token overhead and reducing privacy leakage for structured encryption schemes that support Boolean queries. However, it was observed that this scheme resulted in cross-leakage between different queries. To address this issue, a transformed key encryption (TKE) scheme, based on random permutation and counter encryption modes was proposed. In essence, the TKE scheme was capable of converting ciphertext encrypted by one key into ciphertext encrypted by another key, without the need for decrypting the ciphertext at the serving side and without disclosing any information beyond the transformation modes. Utilizing this scheme, an encrypted multi-map scheme, transformable key filter (TK-Filter), was designed to support conjunctive queries. This scheme was reported to have nearly identical communication and storage overhead as the ConjFilter scheme but effectively prevented cross-leakage between different queries. Experimental analysis results show that TK-Filter reduces the initialization time by 58% to 86% and improves the search efficiency by 34% to 41% compared to ConjFilter across datasets of various sizes.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024048structured encryptionconjunctive querycross leakagecounter encryption mode
spellingShingle YANG Ziyi
MA Changshe
XIE Nanjiang
Cross pattern hiding structured encryption for conjunctive queries
网络与信息安全学报
structured encryption
conjunctive query
cross leakage
counter encryption mode
title Cross pattern hiding structured encryption for conjunctive queries
title_full Cross pattern hiding structured encryption for conjunctive queries
title_fullStr Cross pattern hiding structured encryption for conjunctive queries
title_full_unstemmed Cross pattern hiding structured encryption for conjunctive queries
title_short Cross pattern hiding structured encryption for conjunctive queries
title_sort cross pattern hiding structured encryption for conjunctive queries
topic structured encryption
conjunctive query
cross leakage
counter encryption mode
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024048
work_keys_str_mv AT yangziyi crosspatternhidingstructuredencryptionforconjunctivequeries
AT machangshe crosspatternhidingstructuredencryptionforconjunctivequeries
AT xienanjiang crosspatternhidingstructuredencryptionforconjunctivequeries