HCV: Practical Multi-Keyword Conjunctive Query with Little Result Pattern Leakage

Multi-keyword conjunctive query is the most common searchable encryption (SE) scheme and gives practical search capability. This paper focuses on constructing a conjunctive query scheme with high privacy and accurate query result. For efficiency, this paper introduces a novel counter vector (CV) dat...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2023-07, Vol.2023, p.1-15
Hauptverfasser: Zhu, Xueling, Fu, Shaojing, Hu, Huaping, Wu, Qing, Liu, Bo
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 15
container_issue
container_start_page 1
container_title Security and communication networks
container_volume 2023
creator Zhu, Xueling
Fu, Shaojing
Hu, Huaping
Wu, Qing
Liu, Bo
description Multi-keyword conjunctive query is the most common searchable encryption (SE) scheme and gives practical search capability. This paper focuses on constructing a conjunctive query scheme with high privacy and accurate query result. For efficiency, this paper introduces a novel counter vector (CV) data structure instead of inverted index and builds the CV index database with three-tuple keywords. We use two kinds of cryptography primitives to encrypt the CV index database, respectively. One is symmetric encryption for efficiency, which gives two schemes, CVX and ICV. Experiments show that both CVX and ICV have much higher efficiency than the existing schemes. The other is BGN homomorphic encryption for privacy and gives the scheme HCV. HCV reduces much RP information leakage and even achieves “ideal” leakage for 3-keyword query. Experiments show that the HCV scheme achieves high privacy while compromising not so much storage.
doi_str_mv 10.1155/2023/8351353
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2840851171</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2840851171</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1823-14a859502829dd31830d5b27fd5c6457ee0f602b12b63e3071c6ea9564a4e5aa3</originalsourceid><addsrcrecordid>eNp90E1Lw0AQBuBFFKzVmz9gwaPG7uxHPrxJUCtGbEW9LttkYrfGpN1sLP33prR49DQD8_AOvIScA7sGUGrEGRejWCgQShyQASQiCRhwfvi3gzwmJ227YCwEGckBmY7Tjxs6cSb3NjcVfe4qb4Mn3KwbV9C0qRdd3Z9-kE47dBu6tn5OM-t9hfQV217TifEeXU0zNF_mE0_JUWmqFs_2c0je7-_e0nGQvTw8prdZkEPMRQDSxCpRjMc8KQoBsWCFmvGoLFQeShUhsjJkfAZ8FgoULII8RJOoUBqJyhgxJBe73KVrVh22Xi-aztX9S81jyWIFEEGvrnYqd03bOiz10tlv4zYamN6Wprel6X1pPb_c8bmtC7O2_-tf4IVpzg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2840851171</pqid></control><display><type>article</type><title>HCV: Practical Multi-Keyword Conjunctive Query with Little Result Pattern Leakage</title><source>Wiley Online Library Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Zhu, Xueling ; Fu, Shaojing ; Hu, Huaping ; Wu, Qing ; Liu, Bo</creator><contributor>Zhou, Zhili</contributor><creatorcontrib>Zhu, Xueling ; Fu, Shaojing ; Hu, Huaping ; Wu, Qing ; Liu, Bo ; Zhou, Zhili</creatorcontrib><description>Multi-keyword conjunctive query is the most common searchable encryption (SE) scheme and gives practical search capability. This paper focuses on constructing a conjunctive query scheme with high privacy and accurate query result. For efficiency, this paper introduces a novel counter vector (CV) data structure instead of inverted index and builds the CV index database with three-tuple keywords. We use two kinds of cryptography primitives to encrypt the CV index database, respectively. One is symmetric encryption for efficiency, which gives two schemes, CVX and ICV. Experiments show that both CVX and ICV have much higher efficiency than the existing schemes. The other is BGN homomorphic encryption for privacy and gives the scheme HCV. HCV reduces much RP information leakage and even achieves “ideal” leakage for 3-keyword query. Experiments show that the HCV scheme achieves high privacy while compromising not so much storage.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2023/8351353</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Accuracy ; Cryptography ; Data structures ; Efficiency ; Keywords ; Leakage ; Performance evaluation ; Privacy ; Queries ; Social networks ; Sparsity</subject><ispartof>Security and communication networks, 2023-07, Vol.2023, p.1-15</ispartof><rights>Copyright © 2023 Xueling Zhu et al.</rights><rights>Copyright © 2023 Xueling Zhu et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1823-14a859502829dd31830d5b27fd5c6457ee0f602b12b63e3071c6ea9564a4e5aa3</citedby><cites>FETCH-LOGICAL-c1823-14a859502829dd31830d5b27fd5c6457ee0f602b12b63e3071c6ea9564a4e5aa3</cites><orcidid>0000-0002-9953-8438</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Zhou, Zhili</contributor><creatorcontrib>Zhu, Xueling</creatorcontrib><creatorcontrib>Fu, Shaojing</creatorcontrib><creatorcontrib>Hu, Huaping</creatorcontrib><creatorcontrib>Wu, Qing</creatorcontrib><creatorcontrib>Liu, Bo</creatorcontrib><title>HCV: Practical Multi-Keyword Conjunctive Query with Little Result Pattern Leakage</title><title>Security and communication networks</title><description>Multi-keyword conjunctive query is the most common searchable encryption (SE) scheme and gives practical search capability. This paper focuses on constructing a conjunctive query scheme with high privacy and accurate query result. For efficiency, this paper introduces a novel counter vector (CV) data structure instead of inverted index and builds the CV index database with three-tuple keywords. We use two kinds of cryptography primitives to encrypt the CV index database, respectively. One is symmetric encryption for efficiency, which gives two schemes, CVX and ICV. Experiments show that both CVX and ICV have much higher efficiency than the existing schemes. The other is BGN homomorphic encryption for privacy and gives the scheme HCV. HCV reduces much RP information leakage and even achieves “ideal” leakage for 3-keyword query. Experiments show that the HCV scheme achieves high privacy while compromising not so much storage.</description><subject>Accuracy</subject><subject>Cryptography</subject><subject>Data structures</subject><subject>Efficiency</subject><subject>Keywords</subject><subject>Leakage</subject><subject>Performance evaluation</subject><subject>Privacy</subject><subject>Queries</subject><subject>Social networks</subject><subject>Sparsity</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNp90E1Lw0AQBuBFFKzVmz9gwaPG7uxHPrxJUCtGbEW9LttkYrfGpN1sLP33prR49DQD8_AOvIScA7sGUGrEGRejWCgQShyQASQiCRhwfvi3gzwmJ227YCwEGckBmY7Tjxs6cSb3NjcVfe4qb4Mn3KwbV9C0qRdd3Z9-kE47dBu6tn5OM-t9hfQV217TifEeXU0zNF_mE0_JUWmqFs_2c0je7-_e0nGQvTw8prdZkEPMRQDSxCpRjMc8KQoBsWCFmvGoLFQeShUhsjJkfAZ8FgoULII8RJOoUBqJyhgxJBe73KVrVh22Xi-aztX9S81jyWIFEEGvrnYqd03bOiz10tlv4zYamN6Wprel6X1pPb_c8bmtC7O2_-tf4IVpzg</recordid><startdate>20230711</startdate><enddate>20230711</enddate><creator>Zhu, Xueling</creator><creator>Fu, Shaojing</creator><creator>Hu, Huaping</creator><creator>Wu, Qing</creator><creator>Liu, Bo</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-9953-8438</orcidid></search><sort><creationdate>20230711</creationdate><title>HCV: Practical Multi-Keyword Conjunctive Query with Little Result Pattern Leakage</title><author>Zhu, Xueling ; Fu, Shaojing ; Hu, Huaping ; Wu, Qing ; Liu, Bo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1823-14a859502829dd31830d5b27fd5c6457ee0f602b12b63e3071c6ea9564a4e5aa3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Accuracy</topic><topic>Cryptography</topic><topic>Data structures</topic><topic>Efficiency</topic><topic>Keywords</topic><topic>Leakage</topic><topic>Performance evaluation</topic><topic>Privacy</topic><topic>Queries</topic><topic>Social networks</topic><topic>Sparsity</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhu, Xueling</creatorcontrib><creatorcontrib>Fu, Shaojing</creatorcontrib><creatorcontrib>Hu, Huaping</creatorcontrib><creatorcontrib>Wu, Qing</creatorcontrib><creatorcontrib>Liu, Bo</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhu, Xueling</au><au>Fu, Shaojing</au><au>Hu, Huaping</au><au>Wu, Qing</au><au>Liu, Bo</au><au>Zhou, Zhili</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>HCV: Practical Multi-Keyword Conjunctive Query with Little Result Pattern Leakage</atitle><jtitle>Security and communication networks</jtitle><date>2023-07-11</date><risdate>2023</risdate><volume>2023</volume><spage>1</spage><epage>15</epage><pages>1-15</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Multi-keyword conjunctive query is the most common searchable encryption (SE) scheme and gives practical search capability. This paper focuses on constructing a conjunctive query scheme with high privacy and accurate query result. For efficiency, this paper introduces a novel counter vector (CV) data structure instead of inverted index and builds the CV index database with three-tuple keywords. We use two kinds of cryptography primitives to encrypt the CV index database, respectively. One is symmetric encryption for efficiency, which gives two schemes, CVX and ICV. Experiments show that both CVX and ICV have much higher efficiency than the existing schemes. The other is BGN homomorphic encryption for privacy and gives the scheme HCV. HCV reduces much RP information leakage and even achieves “ideal” leakage for 3-keyword query. Experiments show that the HCV scheme achieves high privacy while compromising not so much storage.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2023/8351353</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0002-9953-8438</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2023-07, Vol.2023, p.1-15
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2840851171
source Wiley Online Library Open Access; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection
subjects Accuracy
Cryptography
Data structures
Efficiency
Keywords
Leakage
Performance evaluation
Privacy
Queries
Social networks
Sparsity
title HCV: Practical Multi-Keyword Conjunctive Query with Little Result Pattern Leakage
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T15%3A23%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=HCV:%20Practical%20Multi-Keyword%20Conjunctive%20Query%20with%20Little%20Result%20Pattern%20Leakage&rft.jtitle=Security%20and%20communication%20networks&rft.au=Zhu,%20Xueling&rft.date=2023-07-11&rft.volume=2023&rft.spage=1&rft.epage=15&rft.pages=1-15&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2023/8351353&rft_dat=%3Cproquest_cross%3E2840851171%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2840851171&rft_id=info:pmid/&rfr_iscdi=true