Skip to main content

CRE: An Efficient Ciphertext Retrieval Scheme Based on Encoder

  • Conference paper
  • First Online:
Neural Information Processing (ICONIP 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1966))

Included in the following conference series:

  • 452 Accesses

Abstract

Searchable Encryption is utilized to address the issue of searching for outsourced encrypted data on third-party untrusted cloud servers. Traditional approaches for ciphertext retrieval are limited to basic keyword-matching queries and fall short when it comes to handling complex semantic queries. Although several semantic retrieval schemes have been proposed in recent years, their performance is inadequate. This paper introduces a semantic retrieval scheme called CRE (Ciphertext Retrieval based on Encoder), which leverages the prompt-based RoBERTa pre-trained language model to generate precise embeddings for sentences in queries and documents. Moreover, to improve retrieval speed in the face of massive high-dimensional sentence embedding vectors, we introduce the HNSW algorithm. Through experimentation and theoretical analysis, this paper demonstrates that CRE outperforms \(SSSW_2\) and \(SSRB_2\) in terms of retrieval speed and accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahsan, M.M., Chowdhury, F.Z., Sabilah, M., Wahab, A.W.B.A., Idris, M.Y.I.B.: An efficient fuzzy keyword matching technique for searching through encrypted cloud data. In: 2017 International Conference on Research and Innovation in Information Systems (ICRIIS), pp. 1–5. IEEE (2017)

    Google Scholar 

  2. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2013)

    Article  Google Scholar 

  3. Cer, D., Diab, M., Agirre, E., Lopez-Gazpio, I., Specia, L.: Semantic textual similarity-multilingual and cross-lingual focused evaluation. In: Proceedings of the 2017 SEMVAL International Workshop on Semantic Evaluation (2017). https://doi.org/10.18653/v1/s17-2001

  4. Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications (ICC), pp. 917–922. IEEE (2012)

    Google Scholar 

  5. Chen, Z., Wu, A., Li, Y., Xing, Q., Geng, S.: Blockchain-enabled public key encryption with multi-keyword search in cloud computing. Secur. Commun. Netw. 2021, 1–11 (2021)

    Google Scholar 

  6. Cui, J., Sun, Y., Yan, X.U., Tian, M., Zhong, H.: Forward and backward secure searchable encryption with multi-keyword search and result verification. Sci. China Inf. Sci. 65(5), 159102 (2022)

    Article  MathSciNet  Google Scholar 

  7. Cui, S., Song, X., Asghar, M.R., Galbraith, S.D., Russello, G.: Privacy-preserving dynamic symmetric searchable encryption with controllable leakage. ACM Trans. Privacy Secur. (TOPS) 24(3), 1–35 (2021)

    Article  Google Scholar 

  8. Dai, H., Dai, X., Yi, X., Yang, G., Huang, H.: Semantic-aware multi-keyword ranked search scheme over encrypted cloud data. J. Netw. Comput. Appl. 147, 102442 (2019)

    Article  Google Scholar 

  9. Dauterman, E., Feng, E., Luo, E., Popa, R.A., Stoica, I.: Dory: an encrypted search system with distributed trust. In: Operating Systems Design and Implementation (2020)

    Google Scholar 

  10. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2015)

    Article  Google Scholar 

  11. Fu, Z., Wang, Y., Sun, X., Zhang, X.: Semantic and secure search over encrypted outsourcing cloud based on BERT. Front. Comput. Sci. 16, 1–8 (2022)

    Article  Google Scholar 

  12. Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)

    Article  Google Scholar 

  13. Fu, Z., Wu, X., Wang, Q., Ren, K.: Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12(12), 2986–2997 (2017)

    Article  Google Scholar 

  14. Hu, Z., Dai, H., Yang, G., Yi, X., Sheng, W.: Semantic-based multi-keyword ranked search schemes over encrypted cloud data. Secur. Commun. Netw. 2022 (2022)

    Google Scholar 

  15. Hua, Y., Zhang, D., Ge, S.: Research progress in the interpretability of deep learning models. J. Cyber Secur. 5(3), 1–12 (2020)

    Google Scholar 

  16. Jiang, T., et al.: Promptbert: improving BERT sentence embeddings with prompts. arXiv preprint arXiv:2201.04337 (2022)

  17. Lee, J., Toutanova, K.: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)

  18. Lewis, M., et al.: Bart: denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension. arXiv preprint arXiv:1910.13461 (2019)

  19. Liu, Y., Fu, Z.: Secure search service based on word2vec in the public cloud. Int. J. Comput. Sci. Eng. 18(3), 305–313 (2019)

    Google Scholar 

  20. Malkov, Y.A., Yashunin, D.A.: Efficient and robust approximate nearest neighbor search using hierarchical navigable small world graphs. IEEE Trans. Pattern Anal. Mach. Intell. 42(4), 824–836 (2018)

    Article  Google Scholar 

  21. Moataz, T., Shikfa, A., Cuppens-Boulahia, N., Cuppens, F.: Semantic search over encrypted data. In: ICT 2013, pp. 1–5. IEEE (2013)

    Google Scholar 

  22. Nair, M.S., Rajasree, M.S., Thampi, S.M.: Fine-grained, multi-key search control in multi-user searchable encryption. In: International Workshops on Security, Privacy, and Anonymity in Computation, Communication, and Storage; IEEE International Symposium on Ubisafe Computing; IEEE International Workshop on Security in e-Science and e-Research; International Workshop on Trust, SE (2017)

    Google Scholar 

  23. Ravichandiran, S.: Getting Started with Google BERT: Build and train state-of-the-art natural language processing models using BERT. Packt Publishing Ltd (2021)

    Google Scholar 

  24. Xu, M., Namavari, A., Cash, D., Ristenpart, T.: Searching encrypted data with size-locked indexes. In: USENIX Security (2021)

    Google Scholar 

  25. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S &P 2000, pp. 44–55. IEEE (2000)

    Google Scholar 

  26. Su, J., Zhang, L., Mu, Y.: BA-RMKABSE: blockchain-aided ranked multi-keyword attribute-based searchable encryption with hiding policy for smart health system, vol. 132, pp. 299–309 (2022)

    Google Scholar 

  27. Thakur, N., Reimers, N., Rücklé, A., Srivastava, A., Gurevych, I.: BEIR: a heterogenous benchmark for zero-shot evaluation of information retrieval models. arXiv preprint arXiv:2104.08663 (2021)

  28. Veretennikov, A.B.: Relevance ranking for proximity full-text search based on additional indexes with multi-component keys (2021)

    Google Scholar 

  29. Xia, Z., Zhu, Y., Sun, X., Chen, L.: Secure semantic expansion based search over encrypted cloud data supporting similarity ranking. J. Cloud Comput. 3, 1–11 (2014)

    Article  Google Scholar 

  30. Yu-Jie, X., Lan-Xiang, C., Yi, M.: BTM topic model based searchable symmetric encryption. J. Cryptol. Res. 9(1), 88–105 (2022)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shaofei Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, K., Xu, S., Li, P., Zhang, D., Wang, W., Zou, B. (2024). CRE: An Efficient Ciphertext Retrieval Scheme Based on Encoder. In: Luo, B., Cheng, L., Wu, ZG., Li, H., Li, C. (eds) Neural Information Processing. ICONIP 2023. Communications in Computer and Information Science, vol 1966. Springer, Singapore. https://doi.org/10.1007/978-981-99-8148-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-8148-9_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-8147-2

  • Online ISBN: 978-981-99-8148-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics