Efficient SSE with forward id-privacy and authentication in the multi-data-owner settings

2Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Based on Sun et al.'s multi-client symmetric searchable encryption (SSE) scheme (at ESORICS 2016), and combining Zhao's identity-concealed authenticated encryption (CCS 2016), a new SSE scheme with multi-data-owner functionalities is proposed. By setting two key generation centers, our scheme first implements multi-data-owner SSE. In particular, compared with Sun et al.'s scheme, the new scheme not only meets the same security requirements stated by them, but also further strengthens the securities of the same category relevant scheme by providing identity-concealment, authentication of data user to server and confidentiality of search token. The identity-concealment aims to provide privacy protection (Forward ID-Privacy) for data users by hiding their identity information, while the authentication is to resist the camouflage attack by applying certificate-based mechanism to our scheme. In particular, the confidentiality of the search token provides replay-attack-resistant by encrypting the plaintext search token generated by data user. While in other works, the adversary can employ the previously generated plaintext search tokens to force the server to perform the same search queries. Furthermore, by efficiency analysis, our scheme reaches almost the same level of efficiency as Sun et al.'s scheme.

References Powered by Scopus

Ciphertext-policy attribute-based encryption

4553Citations
N/AReaders
Get full text

Searchable symmetric encryption: Improved definitions and efficient constructions

1515Citations
N/AReaders
Get full text

Digital signcryption or how to achieve cost(Signature &: Encryption) << cost(signature) + cost(encryption)

1257Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A typology of secure multicast communication over 5 G/6 G networks

1Citations
N/AReaders
Get full text

Blockchain Search Using Searchable Encryption Based on Elliptic Curves

1Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Wang, H., Sui, G., Zhao, Y., & Chen, K. (2021). Efficient SSE with forward id-privacy and authentication in the multi-data-owner settings. IEEE Access, 9, 10443–10459. https://doi.org/10.1109/ACCESS.2020.3039040

Readers' Seniority

Tooltip

Lecturer / Post doc 3

50%

PhD / Post grad / Masters / Doc 2

33%

Professor / Associate Prof. 1

17%

Readers' Discipline

Tooltip

Computer Science 4

67%

Engineering 1

17%

Social Sciences 1

17%

Save time finding and organizing research with Mendeley

Sign up for free