Citation: | Li Yuxi, Chen Jingjing, Zhuo Fucai, Xu Jian, Ji Dong. Verifiable Boolean Searchable Encryption Based on Blockchain Index[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440501 |
To address the limitations in search expressiveness and the inadequacy of verification mechanisms in existing searchable encryption methods, this paper proposes a Verifiable Boolean Searchable Encryption scheme based on Blockchain Index (VBSE-BI). The scheme first constructs a security model supporting verifiable Boolean search and, based on this model, designs an incremental secure index construction method utilizing blockchain storage structures. This approach achieves efficient search while ensuring the tamper-proof nature of the index structure. Moreover, the scheme introduces an efficient dynamic update mechanism for the secure index, effectively avoiding the significant storage and update overhead caused by auxiliary update structures. It meet the integrity verification requirements of Boolean searches, the scheme defines the unforgeability of Boolean search results and proposes a Boolean operation integrity verification algorithm based on bilinear map accumulators and the extended Euclidean algorithm. Security analysis demonstrates that the VBSE-BI scheme can resist dynamic chosen keyword attacks in the random oracle model and satisfies unforgeability under the bilinear q-strong Diffie-Hellman assumption. Compared with similar schemes, VBSE-BI not only supports more expressive Boolean search statements but also significantly reduces the user's computational complexity to log n (where n is the number of keywords). Experimental results show that by optimizing the verification algorithm, the scheme keeps the user’s verification time consistently low (1.0-1.8 s), accounting for only 9.98%-14.03% of the server-side computation time. These findings indicate that VBSE-BI is highly suitable for resource-constrained mobile devices, providing a solid theoretical foundation and efficiency assurance for the practical application of searchable encryption.
[1] |
Bost R. ∑ oφoς: Forward secure searchable encryption[C]//Proc of the 2016 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2016: 1143−1154
|
[2] |
Kamara S, Papamanthou C, Roeder T. Dynamic searchable symmetric encryption[C]//Proc of the 2012 ACM Conf on Computer and Communications Security. New York: ACM, 2012: 965−976
|
[3] |
李宇溪,周福才,徐剑,等. 双服务器模型下支持相关度排序的多关键字密文搜索方案[J]. 计算机研究与发展,2018,55(10):2149−2163 doi: 10.7544/issn1000-1239.2018.20180433
Li Yuxi, Zhou Fucai, Xu Jian, et al. Multiple-keyword encrypted search with relevance ranking on dual-server model[J]. Journal of Computer Research and Development, 2018, 55(10): 2149−2163 (in Chinese) doi: 10.7544/issn1000-1239.2018.20180433
|
[4] |
Othman S B, Trad A, Youssef H, et al. Secure data aggregation with MAC authentication in wireless sensor networks[C]//Proc of the 12th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications. Piscataway, NJ: IEEE, 2013: 188−195
|
[5] |
Li Hongwei, Lu Rongxing, Zhou Liang, et al. An efficient merkle-tree-based authentication scheme for smart grid[J]. IEEE Systems Journal, 2013, 8(2): 655−663
|
[6] |
Luo Lailong, Guo Deke, Ma R T. B, et al. Optimizing bloom filter: Challenges, solutions, and comparisons[J]. IEEE Communications Surveys & Tutorials, 2018, 21(2): 1912−1949
|
[7] |
Shi Zhenkui, Fu Xuemei, Li Xianxian, et al. ESVSSE: Enabling efficient, secure, verifiable searchable symmetric encryption[J]. IEEE Transactions on Knowledge and Data Engineering, 2020, 34(7): 3241−3254
|
[8] |
McConaghy T, Marques R, Müller A, et al. BigchainDB: A scalable blockchain database [EB/OL]. 2016: 53−72[2024-07-20]. https://gamma.bigchaindb.com/whitepaper/bigchaindb-whitepaper.pdf
|
[9] |
Aslam T, Maqbool A, Akhtar M, et al. Blockchain based enhanced ERP transaction integrity architecture and PoET consensus[J]. Computers, Materials & Continua, 2022, 70(1): 1089-1109
|
[10] |
Nóbrega T, Pires C E S, Nascimento D C. Blockchain-based privacy-preserving record linkage: Enhancing data privacy in an untrusted environment[J]. Information Systems, 2021, 102: 101826 doi: 10.1016/j.is.2021.101826
|
[11] |
Piao Chunhui, Hao Yurong, Yan Jiaqi, et al. Privacy preserving in blockchain-based government data sharing: A service-on-chain (SOC) approach[J]. Information Processing & Management, 2021, 58(5): 102651
|
[12] |
Chen Lanxiang, Lee W, Chang C, et al. Blockchain based searchable encryption for electronic health record sharing[J]. Future Generation Computer Systems, 2019, 95: 420−429 doi: 10.1016/j.future.2019.01.018
|
[13] |
牛淑芬,谢亚亚,杨平平,等. 区块链上基于云辅助的属性基可搜索加密方案[J]. 计算机研究与发展,2021,58(4):811−821 doi: 10.7544/issn1000-1239.2021.20200041
Niu Shufen, Xie Yaya, Yang Pingping, et al. Cloud-assisted attribute-based searchable encryption scheme on blockchain[J]. Journal of Computer Research and Development, 2021, 58(4): 811−821 (in Chinese) doi: 10.7544/issn1000-1239.2021.20200041
|
[14] |
Tang Qiang. Towards blockchain-enabled searchable encryption[C]//Proc of the 21st ICICS Int Conf on Information and Communications Security. Berlin: Springer, 2020: 482−500
|
[15] |
Hahn F, Kerschbaum F. Searchable encryption with secure and efficient updates[C]//Proc of the 2014 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2014: 310−320
|
[16] |
Zuo Cong, Sun Shifeng, Liu J K, et al. Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security[C]//Proc of the 23rd European Symp on Research in Computer Security. Berlin: Springer, 2018: 228−246
|
[17] |
Chai Qi, Gong Guang. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers[C]//Proc of the 2012 IEEE Int Conf on Communications (ICC). Piscataway, NJ: IEEE, 2012: 917−922
|
[18] |
Wang Jie, Yu Xiao, Zhao Ming. Fault-tolerant verifiable keyword symmetric searchable encryption in Ybrid cloud[J]. International Journal of Network Security, 2015, 17(4): 471−483
|
[19] |
Kurosawa K, Ohtaki Y. How to update documents verifiably in searchable symmetric encryption[C]//Proc of the 12th Int Conf on Cryptology and Network Security. Berlin: Springer, 2013: 309−328
|
[20] |
Ameri M H, Assar M R, Mohajeri J, et al. A generic construction for verifiable attribute-based keyword search schemes[J]. Cryptology ePrint Archive, 2015
|
[21] |
Jiang Xiuxiu, Yu Jia, Yan Jingbo, et al. Enabling efficient and verifiable multi-keyword ranked searchover encrypted cloud data[J]. Information Sciences, 2017, 403: 22−41
|
[22] |
Wang Jianfeng, Chen Xiaofeng, Sun Shifeng, et al. Towards efficient verifiable conjunctive keyword search for large encrypted database[C]// Proc of the 23rd European Symp on Research in Computer Security. Berlin: Springer, 2018: 83−100
|
[23] |
闫玺玺,原笑含,汤永利,等. 基于区块链且支持验证的属性基搜索加密方案[J]. 通信学报,2020,41(2):187−198 doi: 10.11959/j.issn.1000-436x.2020011
Yan Xixi, Yuan Xiaohan, Tang Yongli, et al. Verifiable attribute-based searchable encryption scheme based on blockchain[J]. Journal on Communication, 2020, 41(2): 187−198(in Chinese) doi: 10.11959/j.issn.1000-436x.2020011
|
[24] |
Najafi A, Javadi H H S, Bayat M. Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security[J]. Multimedia Tools and Applications, 2021, 80(17): 26049−26068 doi: 10.1007/s11042-021-10844-w
|
[25] |
Xie Mande, Yang Xuekang, Hong Haibo, et al. A novel verifiable chinese multi-keyword fuzzy rank searchable encryption scheme in cloud environments[J]. Future Generation Computer Systems, 2024, 153: 287−300 doi: 10.1016/j.future.2023.11.017
|
[26] |
Ethereum Docs. Ethereum[EB/OL]. 2015[2024-07-27]. https://www.ethereum.org/
|
[27] |
ConsenSys Software Inc. Metamask[EB/OL]. 2020[2024-07-20]. https://metamask.io/
|
[28] |
The OpenSSL Project. OpenSSL: The open source toolkit for SSL/TLS[EB/OL]. 2015[2024-06-17]. http://www.openssl.org/
|
[29] |
Cohen W W. enron email dataset[EB/OL]. 2015[2024-06-01]. https://www.cs.cmu.edu/~enron/
|