JOURNAL ARTICLE

Highly scalable verifiable encrypted search

Abstract

In encrypted search, a server holds an encrypted database of documents but not the keys under which the documents are encrypted. The server answer keyword queries from a client with the list of documents matching the query. In this paper we present two highly scalable protocols to search over encrypted data which achieve full security against a possibly malicious server and supports conjunctive queries where the client submits many keywords and is asking the server to identify the documents that match all the keywords. The first protocol we present works in the single client model, where the party searching the data is also the data owner who originally stored with the server. The second protocol works in the more challenging multi-client model, where a data owner stores encrypted data with a server, and the allows a client to search the data via a query-based token. To be truly scalable, previous solutions for conjunctive queries do not require the server to look at every document in the encrypted database, but assume an honest but curious server. There are, however, realistic situations in which this assumption might not hold: for example when the software running on the server has been infected by malware. In this case the protocols above may not offer any meaningful security guarantee. Our solution removes this limitation without substantially increasing the computational cost compared to the honest-but-curious protocols. Therefore we are able to obtain full security against malicious servers basically "for free".

Keywords:
Verifiable secret sharing Computer science Scalability Encryption Advanced Encryption Standard Computer security Database Programming language Set (abstract data type)

Metrics

3
Cited By
0.94
FWCI (Field Weighted Citation Impact)
48
Refs
0.88
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Dynamic Verifiable Encrypted Keyword Search

S. Sree VivekRajkumar RamasamyPraveen GeorgeBharat S. Rawal

Journal:   Journal of Signal Processing Systems Year: 2017 Vol: 90 (8-9)Pages: 1151-1165
BOOK-CHAPTER

Enhanced and Verifiable Keyword Search over Encrypted Data

P RachanaPrerna MohanKavitha KumariPriyam ShreyaskarD. Komala

Lecture notes in electrical engineering Year: 2021 Pages: 967-975
JOURNAL ARTICLE

Verifiable Diversity Ranking Search Over Encrypted Outsourced Data

Yuling LiuHua PengJie Wang

Journal:   Cmc-computers Materials & Continua Year: 2018 Vol: 55 (1)Pages: 037-037
© 2026 ScienceGate Book Chapters — All rights reserved.