Skip to main content

Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security

  • Conference paper
  • First Online:
Artificial Intelligence Security and Privacy (AIS&P 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14509))

  • 217 Accesses

Abstract

Wildcard Searchable Symmetric Encryption can achieve flexibility and pattern matching while protecting data privacy. There is a promising future for combining secure wildcard search with emerging technologies such as AI. However, there are challenges in reducing the communication cost and improving security. In this paper, we propose an efficient wildcard searchable symmetric encryption with forward and backward security. The complexity of communication costs in the search protocol is O(1), independent of the number of characters of wildcard keywords, or files in the search result. It is achieved by a double-compressed index in which the character set and file identifiers are encoded simultaneously. Then, the double-compressed index provides a possibility to achieve oblivious keyword query and update, so that the proposed scheme only reveals the query type (search or update) without anything else. It achieves forward and backward security using the distributed multi-point function and an additively homomorphic symmetric encryption scheme. Detailed security proof and the theoretical comparison show the improvement in security and efficiency. The acceptable overheads of the proposed scheme are presented by the extensive performance evaluation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bösch, C., Brinkman, R., Hartel, P., Jonker, W.: Conjunctive wildcard search over encrypted data. In: Jonker, W., Petković, M. (eds.) SDM 2011. LNCS, vol. 6933, pp. 114–127. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23556-6_8

    Chapter  Google Scholar 

  2. Boyle, E., Gilboa, N., Ishai, Y.: Function secret sharing: improvements and extensions. In: Proceedings of CCS, pp. 1292–1303 (2016)

    Google Scholar 

  3. Castelluccia, C., Chan, C.F., Mykletun, E., Sudik, G.: Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sens. Netw. 5(3), 1–36 (2009)

    Article  Google Scholar 

  4. de Castro, L., Polychroniadou, A.: Lightweight, maliciously secure verifiable function secret sharing. In: Dunkelman, O., Dziembowski, S. (eds.) EUROCRYPT 2022. LNCS, vol. 13275, pp. 150–179. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-06944-4_6

    Chapter  Google Scholar 

  5. Dauterman, E., Feng, E., Luo, E., Popa, R.A., Stoica, I.: \(\{\)DORY\(\}\): an encrypted search system with distributed trust. In: Proceedings of NSDI, pp. 1101–1119 (2020)

    Google Scholar 

  6. Du, M., Wang, Q., He, M., Weng, J.: Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans. Inf. Forensics Secur. 13(9), 2320–2332 (2018)

    Article  Google Scholar 

  7. Gui, Z., Paterson, K.G., Patranabis, S.: Rethinking searchable symmetric encryption. In: 44th IEEE Symposium on Security and Privacy (SP 2023) (2023)

    Google Scholar 

  8. Hu, C., Han, L.: Efficient wildcard search over encrypted data. Int. J. Inf. Secur. 15, 539–547 (2016)

    Article  Google Scholar 

  9. Hu, C., Han, L., Yiu, S.: Efficient and secure multi-functional searchable symmetric encryption schemes. Secur. Commun. Netw. 9(1), 34–42 (2016)

    Article  Google Scholar 

  10. Hua, J., Liu, Y., Chen, H., Tian, X., Jin, C.: An enhanced wildcard-based fuzzy searching scheme in encrypted databases. World Wide Web 23(3), 2185–2214 (2020)

    Article  Google Scholar 

  11. Kamara, S., Moataz, T.: Boolean searchable symmetric encryption with worst-case sub-linear complexity. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017, Part III. LNCS, vol. 10212, pp. 94–124. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56617-7_4

    Chapter  Google Scholar 

  12. Li, J., et al.: Searchable symmetric encryption with forward search privacy. IEEE Trans. Depend. Secure Comput. 18(1), 460–474 (2019)

    Article  Google Scholar 

  13. Li, M., Jia, C., Du, R., Shao, W.: Forward and backward secure searchable encryption scheme supporting conjunctive queries over bipartite graphs. IEEE Trans. Cloud Comput. 11(1), 1091–1102 (2023)

    Article  Google Scholar 

  14. Li, Y., Ning, J., Chen, J.: Secure and practical wildcard searchable encryption system based on inner product. IEEE Trans. Serv. Comput. 16(3), 2178–2190 (2023)

    Google Scholar 

  15. Sedghi, S., van Liesdonk, P., Nikova, S., Hartel, P., Jonker, W.: Searching keywords with wildcards on encrypted data. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 138–153. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15317-4_10

    Chapter  Google Scholar 

  16. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE S &P, pp. 44–55 (2000)

    Google Scholar 

  17. Suga, T., Nishide, T., Sakurai, K.: Secure keyword search using bloom filter with specified character positions. In: Takagi, T., Wang, G., Qin, Z., Jiang, S., Yu, Y. (eds.) ProvSec 2012. LNCS, vol. 7496, pp. 235–252. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33272-2_15

    Chapter  Google Scholar 

  18. Weener, J., Hahn, F., Peter, A.: Libertas: backward private dynamic searchable symmetric encryption supporting wildcards. In: Sural, S., Lu, H. (eds.) DBSec 2022. LNCS, vol. 13383, pp. 215–235. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-10684-2_13

    Chapter  Google Scholar 

  19. Wu, Z., Li, R.: OBI: a multi-path oblivious RAM for forward-and-backward-secure searchable encryption. In: 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, 27 February–3 March 2023. The Internet Society (2023)

    Google Scholar 

  20. Xu, W., Zhang, J., Yuan, Y.: Enabling dynamic multi-client and Boolean query in searchable symmetric encryption scheme for cloud storage system. KSII Trans. Internet Inf. Syst. 16(4), 1286–1306 (2022)

    Google Scholar 

  21. Yang, Y., Liu, X., Deng, R.H., Weng, J.: Flexible wildcard searchable encryption system. IEEE Trans. Serv. Comput. 13(3), 464–477 (2020)

    Article  Google Scholar 

  22. Yuan, D., Zuo, C., Cui, S., Russello, G.: Result-pattern-hiding conjunctive searchable symmetric encryption with forward and backward privacy. Proc. Priv. Enhanc. Technol. 2023(2), 40–58 (2023)

    Google Scholar 

  23. Zhang, X., Zhao, B., Qin, J., Hou, W., Su, Y., Yang, H.: Practical wildcard searchable encryption with tree-based index. Int. J. Intell. Syst. 36(12), 7475–7499 (2021)

    Article  Google Scholar 

  24. Zhang, Y., Katz, J., Papamanthou, C.: All your queries are belong to us: the power of \(\{\)File-Injection\(\}\) attacks on searchable encryption. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 707–720 (2016)

    Google Scholar 

  25. Zhao, F., Nishide, T.: Searchable symmetric encryption supporting queries with multiple-character wildcards. In: Chen, J., Piuri, V., Su, C., Yung, M. (eds.) NSS 2016. LNCS, vol. 9955, pp. 266–282. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46298-1_18

    Chapter  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (No. 62072276, No. 62302280) and National Natural Science Foundation of Shandong Province (No. ZR2023QF133).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Qin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, X., Su, Y., Wei, Z., Shen, W., Qin, J. (2024). Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security. In: Vaidya, J., Gabbouj, M., Li, J. (eds) Artificial Intelligence Security and Privacy. AIS&P 2023. Lecture Notes in Computer Science, vol 14509. Springer, Singapore. https://doi.org/10.1007/978-981-99-9785-5_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9785-5_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9784-8

  • Online ISBN: 978-981-99-9785-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics