• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Yuxi, Chen Jingjing, Zhuo Fucai, Xu Jian, Ji Dong. Verifiable Boolean Searchable Encryption Based on Blockchain Index[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440501
Citation: Li Yuxi, Chen Jingjing, Zhuo Fucai, Xu Jian, Ji Dong. Verifiable Boolean Searchable Encryption Based on Blockchain Index[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440501

Verifiable Boolean Searchable Encryption Based on Blockchain Index

Funds: This work was supported by the Fundamental Research Funds for the Central Universities (N2316007) and the Natural Science Foundation of Liaoning Province (2023-BS-053).
More Information
  • Author Bio:

    Li Yuxi: born in 1990. PhD, lecture. Member of CCF. Her main research interests include secure cloud storage. (eliyuxi@gmail.com)

    Chen Jingjing: born in 1999. Master student. Her main research interests include spatial data security. (chenjingjing5051@163.com)

    Zhuo Fucai: born in 1964. PhD, professor and PhD supervisor. Senior member of CCF. His main research interests include cryptography and network security, trusted computing, and critical technology in electronic commerence. (fczhou@mail.neu.edu.cn)

    Xu Jian: born in 1978. PhD, professor and PhD supervisor. Senior member of CCF. His research interests include cryptography and network security. (jianxu@mail.neu.edu.cn)

    Ji Dong: born in 1989. PhD. His main research interests include timing analysis in embedded systems, machine learning and its various applications in renewable energy. (jidong@mail.neu.edu.cn)

  • Received Date: June 05, 2024
  • Accepted Date: March 02, 2025
  • Available Online: March 02, 2025
  • To address the limitations in search expressiveness and the inadequacy of verification mechanisms in existing searchable encryption methods, this paper proposes a Verifiable Boolean Searchable Encryption scheme based on Blockchain Index (VBSE-BI). The scheme first constructs a security model supporting verifiable Boolean search and, based on this model, designs an incremental secure index construction method utilizing blockchain storage structures. This approach achieves efficient search while ensuring the tamper-proof nature of the index structure. Moreover, the scheme introduces an efficient dynamic update mechanism for the secure index, effectively avoiding the significant storage and update overhead caused by auxiliary update structures. It meet the integrity verification requirements of Boolean searches, the scheme defines the unforgeability of Boolean search results and proposes a Boolean operation integrity verification algorithm based on bilinear map accumulators and the extended Euclidean algorithm. Security analysis demonstrates that the VBSE-BI scheme can resist dynamic chosen keyword attacks in the random oracle model and satisfies unforgeability under the bilinear q-strong Diffie-Hellman assumption. Compared with similar schemes, VBSE-BI not only supports more expressive Boolean search statements but also significantly reduces the user's computational complexity to log n (where n is the number of keywords). Experimental results show that by optimizing the verification algorithm, the scheme keeps the user’s verification time consistently low (1.0-1.8 s), accounting for only 9.98%-14.03% of the server-side computation time. These findings indicate that VBSE-BI is highly suitable for resource-constrained mobile devices, providing a solid theoretical foundation and efficiency assurance for the practical application of searchable encryption.

  • [1]
    Bost R. ∑ oφoς: Forward secure searchable encryption[C]//Proc of the 2016 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2016: 1143−1154
    [2]
    Kamara S, Papamanthou C, Roeder T. Dynamic searchable symmetric encryption[C]//Proc of the 2012 ACM Conf on Computer and Communications Security. New York: ACM, 2012: 965−976
    [3]
    李宇溪,周福才,徐剑,等. 双服务器模型下支持相关度排序的多关键字密文搜索方案[J]. 计算机研究与发展,2018,55(10):2149−2163 doi: 10.7544/issn1000-1239.2018.20180433

    Li Yuxi, Zhou Fucai, Xu Jian, et al. Multiple-keyword encrypted search with relevance ranking on dual-server model[J]. Journal of Computer Research and Development, 2018, 55(10): 2149−2163 (in Chinese) doi: 10.7544/issn1000-1239.2018.20180433
    [4]
    Othman S B, Trad A, Youssef H, et al. Secure data aggregation with MAC authentication in wireless sensor networks[C]//Proc of the 12th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications. Piscataway, NJ: IEEE, 2013: 188−195
    [5]
    Li Hongwei, Lu Rongxing, Zhou Liang, et al. An efficient merkle-tree-based authentication scheme for smart grid[J]. IEEE Systems Journal, 2013, 8(2): 655−663
    [6]
    Luo Lailong, Guo Deke, Ma R T. B, et al. Optimizing bloom filter: Challenges, solutions, and comparisons[J]. IEEE Communications Surveys & Tutorials, 2018, 21(2): 1912−1949
    [7]
    Shi Zhenkui, Fu Xuemei, Li Xianxian, et al. ESVSSE: Enabling efficient, secure, verifiable searchable symmetric encryption[J]. IEEE Transactions on Knowledge and Data Engineering, 2020, 34(7): 3241−3254
    [8]
    McConaghy T, Marques R, Müller A, et al. BigchainDB: A scalable blockchain database [EB/OL]. 2016: 53−72[2024-07-20]. https://gamma.bigchaindb.com/whitepaper/bigchaindb-whitepaper.pdf
    [9]
    Aslam T, Maqbool A, Akhtar M, et al. Blockchain based enhanced ERP transaction integrity architecture and PoET consensus[J]. Computers, Materials & Continua, 2022, 70(1): 1089-1109
    [10]
    Nóbrega T, Pires C E S, Nascimento D C. Blockchain-based privacy-preserving record linkage: Enhancing data privacy in an untrusted environment[J]. Information Systems, 2021, 102: 101826 doi: 10.1016/j.is.2021.101826
    [11]
    Piao Chunhui, Hao Yurong, Yan Jiaqi, et al. Privacy preserving in blockchain-based government data sharing: A service-on-chain (SOC) approach[J]. Information Processing & Management, 2021, 58(5): 102651
    [12]
    Chen Lanxiang, Lee W, Chang C, et al. Blockchain based searchable encryption for electronic health record sharing[J]. Future Generation Computer Systems, 2019, 95: 420−429 doi: 10.1016/j.future.2019.01.018
    [13]
    牛淑芬,谢亚亚,杨平平,等. 区块链上基于云辅助的属性基可搜索加密方案[J]. 计算机研究与发展,2021,58(4):811−821 doi: 10.7544/issn1000-1239.2021.20200041

    Niu Shufen, Xie Yaya, Yang Pingping, et al. Cloud-assisted attribute-based searchable encryption scheme on blockchain[J]. Journal of Computer Research and Development, 2021, 58(4): 811−821 (in Chinese) doi: 10.7544/issn1000-1239.2021.20200041
    [14]
    Tang Qiang. Towards blockchain-enabled searchable encryption[C]//Proc of the 21st ICICS Int Conf on Information and Communications Security. Berlin: Springer, 2020: 482−500
    [15]
    Hahn F, Kerschbaum F. Searchable encryption with secure and efficient updates[C]//Proc of the 2014 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2014: 310−320
    [16]
    Zuo Cong, Sun Shifeng, Liu J K, et al. Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security[C]//Proc of the 23rd European Symp on Research in Computer Security. Berlin: Springer, 2018: 228−246
    [17]
    Chai Qi, Gong Guang. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C]//Proc of the 2012 IEEE Int Conf on Communications (ICC). Piscataway, NJ: IEEE, 2012: 917−922
    [18]
    Wang Jie, Yu Xiao, Zhao Ming. Fault-tolerant verifiable keyword symmetric searchable encryption in Ybrid cloud[J]. International Journal of Network Security, 2015, 17(4): 471−483
    [19]
    Kurosawa K, Ohtaki Y. How to update documents verifiably in searchable symmetric encryption[C]//Proc of the 12th Int Conf on Cryptology and Network Security. Berlin: Springer, 2013: 309−328
    [20]
    Ameri M H, Assar M R, Mohajeri J, et al. A generic construction for verifiable attribute-based keyword search schemes[J]. Cryptology ePrint Archive, 2015
    [21]
    Jiang Xiuxiu, Yu Jia, Yan Jingbo, et al. Enabling efficient and verifiable multi-keyword ranked searchover encrypted cloud data[J]. Information Sciences, 2017, 403: 22−41
    [22]
    Wang Jianfeng, Chen Xiaofeng, Sun Shifeng, et al. Towards efficient verifiable conjunctive keyword search for large encrypted database[C]// Proc of the 23rd European Symp on Research in Computer Security. Berlin: Springer, 2018: 83−100
    [23]
    闫玺玺,原笑含,汤永利,等. 基于区块链且支持验证的属性基搜索加密方案[J]. 通信学报,2020,41(2):187−198 doi: 10.11959/j.issn.1000-436x.2020011

    Yan Xixi, Yuan Xiaohan, Tang Yongli, et al. Verifiable attribute-based searchable encryption scheme based on blockchain[J]. Journal on Communication, 2020, 41(2): 187−198(in Chinese) doi: 10.11959/j.issn.1000-436x.2020011
    [24]
    Najafi A, Javadi H H S, Bayat M. Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security[J]. Multimedia Tools and Applications, 2021, 80(17): 26049−26068 doi: 10.1007/s11042-021-10844-w
    [25]
    Xie Mande, Yang Xuekang, Hong Haibo, et al. A novel verifiable chinese multi-keyword fuzzy rank searchable encryption scheme in cloud environments[J]. Future Generation Computer Systems, 2024, 153: 287−300 doi: 10.1016/j.future.2023.11.017
    [26]
    Ethereum Docs. Ethereum[EB/OL]. 2015[2024-07-27]. https://www.ethereum.org/
    [27]
    ConsenSys Software Inc. Metamask[EB/OL]. 2020[2024-07-20]. https://metamask.io/
    [28]
    The OpenSSL Project. OpenSSL: The open source toolkit for SSL/TLS[EB/OL]. 2015[2024-06-17]. http://www.openssl.org/
    [29]
    Cohen W W. enron email dataset[EB/OL]. 2015[2024-06-01]. https://www.cs.cmu.edu/~enron/

Catalog

    Article views (18) PDF downloads (12) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return