JOURNAL ARTICLE

Verifiable memory leakage-resilient dynamic searchable encryption

Wenhao GuanYunling WangJianfeng WangXiaotong Fu

Year: 2018 Journal:   Journal of High Speed Networks Vol: 24 (3)Pages: 201-217   Publisher: IOS Press

Abstract

Searchable symmetric encryption (SSE) allows a data owner to outsource his encrypted data to a cloud server while retaining the ability to perform keyword search over encrypted data. The security guarantees of existing SSE schemes require that the adversary has no access to the data owner's secret keys. Unfortunately, adversaries may get some or all of the secret keys through memory attacks. Facing such memory attacks, most existing SSE schemes are no longer secure. Recently, a memory leakage-resilient dynamic SSE (MLR-DSSE) scheme has been proposed to resist memory attacks from physically unclonable functions (PUFs). However, this scheme does not consider the possibility of dishonest behaviors on the part of cloud servers. In this paper, we first propose a verifiable MLR-DSSE scheme based on PUFs and a verifiable hash table. The construction not only resists memory attacks but also supports verifiable search and dynamic updates. Besides, due to the combination of the secret sharing technique with PUFs, our proposed scheme can recover secret keys even if some PUFs are broken. Furthermore, the security analysis demonstrates that our proposed scheme is non-adaptively secure against memory attacks. The evaluation experiment results show that our scheme is efficient.

Keywords:
Verifiable secret sharing Computer science Encryption Secret sharing Computer security Hash function Scheme (mathematics) Security analysis Computer network Cloud computing Adversary Cryptography Operating system

Metrics

2
Cited By
0.20
FWCI (Field Weighted Citation Impact)
38
Refs
0.57
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Physical Unclonable Functions (PUFs) and Hardware Security
Physical Sciences →  Computer Science →  Hardware and Architecture
Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Memory leakage-resilient searchable symmetric encryption

Shuguang DaiHuige LiFangguo Zhang

Journal:   Future Generation Computer Systems Year: 2015 Vol: 62 Pages: 76-84
JOURNAL ARTICLE

Verifiable dynamic searchable encryption

Mohammad EtemadAlpteki̇n Küpçü

Journal:   TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES Year: 2019 Vol: 27 (4)Pages: 2606-2623
JOURNAL ARTICLE

Leakage Resilient Searchable Symmetric Encryption with Periodic Updation

ShrishtiManohar Sai BurraChanchal MauryaSoumyadev Maity

Journal:   2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) Year: 2019 Vol: 3027 Pages: 22-29
JOURNAL ARTICLE

Block verifiable dynamic searchable encryption using redactable blockchain

Ruizhong DuNa LiuMingyue LiJunfeng Tian

Journal:   Journal of Information Security and Applications Year: 2023 Vol: 75 Pages: 103504-103504
© 2026 ScienceGate Book Chapters — All rights reserved.