MMKFB: multi-client and multi-keyword searchable symmetric encryption with forward and backward privacy
Panyu WU , Jiachen SHEN , Zhenfu CAO , Xiaolei DONG
Front. Comput. Sci. ›› 2025, Vol. 19 ›› Issue (3) : 193804
MMKFB: multi-client and multi-keyword searchable symmetric encryption with forward and backward privacy
Data outsourcing has become an industry trend with the popularity of cloud computing. How to search data securely and efficiently has received unprecedented attention. Dynamic Searchable Symmetric Encryption (DSSE) is an effective method to solve this problem, which supports file updates and keyword-based searches over encrypted data. Unfortunately, most existing DSSE schemes have privacy leakages during the addition and deletion phases, thus proposing the concepts of forward and backward privacy. At present, some secure DSSE schemes with forward and backward privacy have been proposed, but most of these DSSE schemes only achieve single-keyword query in the single-client setting, which seriously limits the application in practice. To solve this problem, we propose a multi-client and multi-keyword searchable symmetric encryption scheme with forward and backward privacy (MMKFB). Our scheme focuses on the multi-keyword threshold queries in the multi-client setting, which is a new pattern of multi-keyword search realized with the help of additive homomorphism. And performance analysis and experiments demonstrate that our scheme is more practical for use in small and medium size databases. Especially when a large number of files are updated at once, our scheme has advantages over some existing DSSE schemes in terms of computational efficiency and client storage overhead.
searchable symmetric encryption / multi-client / multi-keyword search / forward security / backward security
| [1] |
Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceeding of 2000 IEEE Symposium on Security and Privacy. S&P 2000. 2000, 44−55 |
| [2] |
Cash D, Jaeger J, Jarecki S, Jutla C, Krawczyk H, Roşu M C, Steiner M. Dynamic searchable encryption in very-large databases: data structures and implementation. In: Proceedings of 2014 Network and Distributed System Security Symposium. 2014 |
| [3] |
Kamara S, Papamanthou C, Roeder T. Dynamic searchable symmetric encryption. In: Proceedings of 2012 ACM Conference on Computer and Communications Security. 2012, 965−976 |
| [4] |
|
| [5] |
|
| [6] |
Bost R. ∑oφoς: forward secure searchable encryption. In: Proceedings of 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016, 1143−1154 |
| [7] |
Papamanthou C, Stefanov E, Shi E. Practical dynamic searchable encryption with small leakage. In: Proceedings of Network and Distributed System Security Symposium. 2014, 23–26 |
| [8] |
Bost R, Minaud B, Ohrimenko O. Forward and backward private searchable encryption from constrained cryptographic primitives. In: Proceedings of 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017, 1465−1482 |
| [9] |
|
| [10] |
Sun S F, Yuan X, Liu J K, Steinfeld R, Sakzad A, Vo V, Nepal S. Practical backward-secure searchable encryption from symmetric puncturable encryption. In: Proceedings of 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018, 763−780 |
| [11] |
|
| [12] |
|
| [13] |
|
| [14] |
|
| [15] |
Patranabis S, Mukhopadhyay D. Forward and backward private conjunctive searchable symmetric encryption. In: Proceedings of 2021 Network and Distributed System Security Symposium. 2021 |
| [16] |
|
| [17] |
Ghareh Chamani J, Papadopoulos D, Papamanthou C, Jalili R. New constructions for forward and backward private symmetric searchable encryption. In: Proceedings of 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018, 1038−1055 |
| [18] |
Goh E J. Secure indexes. Cryptology ePrint Archive, Paper 2003/216, 2003 |
| [19] |
|
| [20] |
|
| [21] |
|
| [22] |
Lai S, Patranabis S, Sakzad A, Liu J K, Mukhopadhyay D, Steinfeld R, Sun S F, Liu D, Zuo C. Result pattern hiding searchable encryption for conjunctive queries. In: Proceedings of 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018, 745−762 |
| [23] |
|
| [24] |
|
| [25] |
|
| [26] |
|
| [27] |
|
| [28] |
|
| [29] |
|
| [30] |
|
| [31] |
|
| [32] |
|
| [33] |
|
| [34] |
Wang J, Chow S S M. Forward and backward-secure range-searchable symmetric encryption. Proceedings on Privacy Enhancing Technologies, 2022(1): 28–48 |
| [35] |
|
| [36] |
|
| [37] |
|
| [38] |
|
| [39] |
|
| [40] |
|
Higher Education Press
Supplementary files
/
| 〈 |
|
〉 |