• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tang Yongli, Li Jingran, Yan Xixi, Zhao Qiang. A Forward Secure Dynamic Searchable Encryption Scheme Supporting Conjunctive Search[J]. Journal of Computer Research and Development, 2022, 59(8): 1853-1866. DOI: 10.7544/issn1000-1239.20210260
Citation: Tang Yongli, Li Jingran, Yan Xixi, Zhao Qiang. A Forward Secure Dynamic Searchable Encryption Scheme Supporting Conjunctive Search[J]. Journal of Computer Research and Development, 2022, 59(8): 1853-1866. DOI: 10.7544/issn1000-1239.20210260

A Forward Secure Dynamic Searchable Encryption Scheme Supporting Conjunctive Search

Funds: This work was supported by the University Scientific and Technological Innovation Team Project of Henan Province (20IRTSTHN013), the Fundamental Research Funds for the Universities of Henan Province (NSFRF210312), and the Youth Talent Support Program of Henan Association for Science and Technology (2021HYTP008).
More Information
  • Published Date: July 31, 2022
  • The forward secure searchable encryption scheme has attracted widespread attention because it can resist the file injection attacks. It ensures that after the document is updated, the newly added document will not disclose the keyword information of the previous document. As for as the forward secure searchable encryption scheme is concerned, improving its security and operation efficiency is the current research hotspot. However, in order to improve security, the existing forward secure searchable encryption schemes often only support single-keyword query or sacrifice part of the query function. Aiming at the problem of privacy leakage and imcomplete search function during documents update in searchable encryption, a forward secure searchable encryption scheme supporting conjunctive keyword search is proposed. The scheme uses a cuckoo filter on the cloud server to filter documents that meet the query conditions, and supports dynamic update operations. The ciphertext equality test technology is introduced to hide the keywords and search without revealing the keywords and documents information in the search phase. Security analysis and experiments show that the proposed scheme achieves adaptive security, provides multi-keyword search, supports flexible update operations and efficient, so it is more suitable for practical application scenarios such as data outsourcing and email systems.
  • Related Articles

    [1]Li Song, Cao Wenqi, Hao Xiaohong, Zhang Liping, Hao Zhongxiao. Collective Spatial Keyword Query Based on Time-Distance Constrained and Cost Aware[J]. Journal of Computer Research and Development, 2025, 62(3): 808-819. DOI: 10.7544/issn1000-1239.202330815
    [2]Bao Han, Wang Yijie. A Fast Construction Method of the Erasure Code with Small Cross-Cloud Data Center Repair Traffic[J]. Journal of Computer Research and Development, 2023, 60(10): 2418-2439. DOI: 10.7544/issn1000-1239.202220580
    [3]Bi Xiuli, Yan Wuqing, Qiu Yumeng, Xiao Bin, Li Weisheng, Ma Jianfeng. Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image[J]. Journal of Computer Research and Development, 2022, 59(6): 1356-1369. DOI: 10.7544/issn1000-1239.20200995
    [4]Pu Yonglin, Yu Jiong, Lu Liang, Li Ziyang, Guo Binglei, Liao Bin. Energy-Efficient Strategy Based on Data Recovery in Storm[J]. Journal of Computer Research and Development, 2021, 58(3): 479-496. DOI: 10.7544/issn1000-1239.2021.20200489
    [5]Tang Yingjie, Wang Fang, Xie Yanwen. An Efficient Failure Reconstruction Based on In-Network Computing for Erasure-Coded Storage Systems[J]. Journal of Computer Research and Development, 2019, 56(4): 767-778. DOI: 10.7544/issn1000-1239.2019.20170834
    [6]Fu Yingxun, Wen Shilin, Ma Li, Shu Jiwu. Survey on Single Disk Failure Recovery Methods for Erasure Coded Storage Systems[J]. Journal of Computer Research and Development, 2018, 55(1): 1-13. DOI: 10.7544/issn1000-1239.2018.20160506
    [7]Huang Jianzhong, Cao Qiang, Huang Siti, Xie Changsheng. Concurrent Node Reconstruction for Erasure-Coded Storage Clusters[J]. Journal of Computer Research and Development, 2016, 53(9): 1918-1929. DOI: 10.7544/issn1000-1239.2016.20150075
    [8]Wei Qiang, Wu Zehui, and Wang Qingxian. Plaintext Recovery Based on Memory Dependence Measurement[J]. Journal of Computer Research and Development, 2014, 51(7): 1547-1554.
    [9]Xiao Fangxiong, Huang Zhiqiu, Cao Zining, Yuan Min, and Zhang Junhua. Describing and Cost Analyzing of Web Services Composition Using PPA[J]. Journal of Computer Research and Development, 2009, 46(5): 832-840.
    [10]He Xiaoyang and Wang Yasha. Model-Based Methods for Software Cost Estimation[J]. Journal of Computer Research and Development, 2006, 43(5): 777-783.
  • Cited by

    Periodical cited type(2)

    1. 陈燕菲,刘三民. 面向特征演化数据流的增量学习方法研究. 重庆工商大学学报(自然科学版). 2025(01): 94-104 .
    2. 张震宇,姜远. 面向特征演变环境的标记噪声鲁棒学习算法. 计算机研究与发展. 2023(08): 1740-1753 . 本站查看

    Other cited types(1)

Catalog

    Article views (152) PDF downloads (96) Cited by(3)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return