HCV: Practical Multi-Keyword Conjunctive Query with Little Result Pattern Leakage
Multi-keyword conjunctive query is the most common searchable encryption (SE) scheme and gives practical search capability. This paper focuses on constructing a conjunctive query scheme with high privacy and accurate query result. For efficiency, this paper introduces a novel counter vector (CV) dat...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2023-07, Vol.2023, p.1-15 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 15 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2023 |
creator | Zhu, Xueling Fu, Shaojing Hu, Huaping Wu, Qing Liu, Bo |
description | Multi-keyword conjunctive query is the most common searchable encryption (SE) scheme and gives practical search capability. This paper focuses on constructing a conjunctive query scheme with high privacy and accurate query result. For efficiency, this paper introduces a novel counter vector (CV) data structure instead of inverted index and builds the CV index database with three-tuple keywords. We use two kinds of cryptography primitives to encrypt the CV index database, respectively. One is symmetric encryption for efficiency, which gives two schemes, CVX and ICV. Experiments show that both CVX and ICV have much higher efficiency than the existing schemes. The other is BGN homomorphic encryption for privacy and gives the scheme HCV. HCV reduces much RP information leakage and even achieves “ideal” leakage for 3-keyword query. Experiments show that the HCV scheme achieves high privacy while compromising not so much storage. |
doi_str_mv | 10.1155/2023/8351353 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2840851171</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2840851171</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1823-14a859502829dd31830d5b27fd5c6457ee0f602b12b63e3071c6ea9564a4e5aa3</originalsourceid><addsrcrecordid>eNp90E1Lw0AQBuBFFKzVmz9gwaPG7uxHPrxJUCtGbEW9LttkYrfGpN1sLP33prR49DQD8_AOvIScA7sGUGrEGRejWCgQShyQASQiCRhwfvi3gzwmJ227YCwEGckBmY7Tjxs6cSb3NjcVfe4qb4Mn3KwbV9C0qRdd3Z9-kE47dBu6tn5OM-t9hfQV217TifEeXU0zNF_mE0_JUWmqFs_2c0je7-_e0nGQvTw8prdZkEPMRQDSxCpRjMc8KQoBsWCFmvGoLFQeShUhsjJkfAZ8FgoULII8RJOoUBqJyhgxJBe73KVrVh22Xi-aztX9S81jyWIFEEGvrnYqd03bOiz10tlv4zYamN6Wprel6X1pPb_c8bmtC7O2_-tf4IVpzg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2840851171</pqid></control><display><type>article</type><title>HCV: Practical Multi-Keyword Conjunctive Query with Little Result Pattern Leakage</title><source>Wiley Online Library Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Zhu, Xueling ; Fu, Shaojing ; Hu, Huaping ; Wu, Qing ; Liu, Bo</creator><contributor>Zhou, Zhili</contributor><creatorcontrib>Zhu, Xueling ; Fu, Shaojing ; Hu, Huaping ; Wu, Qing ; Liu, Bo ; Zhou, Zhili</creatorcontrib><description>Multi-keyword conjunctive query is the most common searchable encryption (SE) scheme and gives practical search capability. This paper focuses on constructing a conjunctive query scheme with high privacy and accurate query result. For efficiency, this paper introduces a novel counter vector (CV) data structure instead of inverted index and builds the CV index database with three-tuple keywords. We use two kinds of cryptography primitives to encrypt the CV index database, respectively. One is symmetric encryption for efficiency, which gives two schemes, CVX and ICV. Experiments show that both CVX and ICV have much higher efficiency than the existing schemes. The other is BGN homomorphic encryption for privacy and gives the scheme HCV. HCV reduces much RP information leakage and even achieves “ideal” leakage for 3-keyword query. Experiments show that the HCV scheme achieves high privacy while compromising not so much storage.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2023/8351353</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Accuracy ; Cryptography ; Data structures ; Efficiency ; Keywords ; Leakage ; Performance evaluation ; Privacy ; Queries ; Social networks ; Sparsity</subject><ispartof>Security and communication networks, 2023-07, Vol.2023, p.1-15</ispartof><rights>Copyright © 2023 Xueling Zhu et al.</rights><rights>Copyright © 2023 Xueling Zhu et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1823-14a859502829dd31830d5b27fd5c6457ee0f602b12b63e3071c6ea9564a4e5aa3</citedby><cites>FETCH-LOGICAL-c1823-14a859502829dd31830d5b27fd5c6457ee0f602b12b63e3071c6ea9564a4e5aa3</cites><orcidid>0000-0002-9953-8438</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Zhou, Zhili</contributor><creatorcontrib>Zhu, Xueling</creatorcontrib><creatorcontrib>Fu, Shaojing</creatorcontrib><creatorcontrib>Hu, Huaping</creatorcontrib><creatorcontrib>Wu, Qing</creatorcontrib><creatorcontrib>Liu, Bo</creatorcontrib><title>HCV: Practical Multi-Keyword Conjunctive Query with Little Result Pattern Leakage</title><title>Security and communication networks</title><description>Multi-keyword conjunctive query is the most common searchable encryption (SE) scheme and gives practical search capability. This paper focuses on constructing a conjunctive query scheme with high privacy and accurate query result. For efficiency, this paper introduces a novel counter vector (CV) data structure instead of inverted index and builds the CV index database with three-tuple keywords. We use two kinds of cryptography primitives to encrypt the CV index database, respectively. One is symmetric encryption for efficiency, which gives two schemes, CVX and ICV. Experiments show that both CVX and ICV have much higher efficiency than the existing schemes. The other is BGN homomorphic encryption for privacy and gives the scheme HCV. HCV reduces much RP information leakage and even achieves “ideal” leakage for 3-keyword query. Experiments show that the HCV scheme achieves high privacy while compromising not so much storage.</description><subject>Accuracy</subject><subject>Cryptography</subject><subject>Data structures</subject><subject>Efficiency</subject><subject>Keywords</subject><subject>Leakage</subject><subject>Performance evaluation</subject><subject>Privacy</subject><subject>Queries</subject><subject>Social networks</subject><subject>Sparsity</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNp90E1Lw0AQBuBFFKzVmz9gwaPG7uxHPrxJUCtGbEW9LttkYrfGpN1sLP33prR49DQD8_AOvIScA7sGUGrEGRejWCgQShyQASQiCRhwfvi3gzwmJ227YCwEGckBmY7Tjxs6cSb3NjcVfe4qb4Mn3KwbV9C0qRdd3Z9-kE47dBu6tn5OM-t9hfQV217TifEeXU0zNF_mE0_JUWmqFs_2c0je7-_e0nGQvTw8prdZkEPMRQDSxCpRjMc8KQoBsWCFmvGoLFQeShUhsjJkfAZ8FgoULII8RJOoUBqJyhgxJBe73KVrVh22Xi-aztX9S81jyWIFEEGvrnYqd03bOiz10tlv4zYamN6Wprel6X1pPb_c8bmtC7O2_-tf4IVpzg</recordid><startdate>20230711</startdate><enddate>20230711</enddate><creator>Zhu, Xueling</creator><creator>Fu, Shaojing</creator><creator>Hu, Huaping</creator><creator>Wu, Qing</creator><creator>Liu, Bo</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-9953-8438</orcidid></search><sort><creationdate>20230711</creationdate><title>HCV: Practical Multi-Keyword Conjunctive Query with Little Result Pattern Leakage</title><author>Zhu, Xueling ; Fu, Shaojing ; Hu, Huaping ; Wu, Qing ; Liu, Bo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1823-14a859502829dd31830d5b27fd5c6457ee0f602b12b63e3071c6ea9564a4e5aa3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Accuracy</topic><topic>Cryptography</topic><topic>Data structures</topic><topic>Efficiency</topic><topic>Keywords</topic><topic>Leakage</topic><topic>Performance evaluation</topic><topic>Privacy</topic><topic>Queries</topic><topic>Social networks</topic><topic>Sparsity</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhu, Xueling</creatorcontrib><creatorcontrib>Fu, Shaojing</creatorcontrib><creatorcontrib>Hu, Huaping</creatorcontrib><creatorcontrib>Wu, Qing</creatorcontrib><creatorcontrib>Liu, Bo</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhu, Xueling</au><au>Fu, Shaojing</au><au>Hu, Huaping</au><au>Wu, Qing</au><au>Liu, Bo</au><au>Zhou, Zhili</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>HCV: Practical Multi-Keyword Conjunctive Query with Little Result Pattern Leakage</atitle><jtitle>Security and communication networks</jtitle><date>2023-07-11</date><risdate>2023</risdate><volume>2023</volume><spage>1</spage><epage>15</epage><pages>1-15</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Multi-keyword conjunctive query is the most common searchable encryption (SE) scheme and gives practical search capability. This paper focuses on constructing a conjunctive query scheme with high privacy and accurate query result. For efficiency, this paper introduces a novel counter vector (CV) data structure instead of inverted index and builds the CV index database with three-tuple keywords. We use two kinds of cryptography primitives to encrypt the CV index database, respectively. One is symmetric encryption for efficiency, which gives two schemes, CVX and ICV. Experiments show that both CVX and ICV have much higher efficiency than the existing schemes. The other is BGN homomorphic encryption for privacy and gives the scheme HCV. HCV reduces much RP information leakage and even achieves “ideal” leakage for 3-keyword query. Experiments show that the HCV scheme achieves high privacy while compromising not so much storage.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2023/8351353</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0002-9953-8438</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2023-07, Vol.2023, p.1-15 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2840851171 |
source | Wiley Online Library Open Access; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection |
subjects | Accuracy Cryptography Data structures Efficiency Keywords Leakage Performance evaluation Privacy Queries Social networks Sparsity |
title | HCV: Practical Multi-Keyword Conjunctive Query with Little Result Pattern Leakage |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T15%3A23%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=HCV:%20Practical%20Multi-Keyword%20Conjunctive%20Query%20with%20Little%20Result%20Pattern%20Leakage&rft.jtitle=Security%20and%20communication%20networks&rft.au=Zhu,%20Xueling&rft.date=2023-07-11&rft.volume=2023&rft.spage=1&rft.epage=15&rft.pages=1-15&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2023/8351353&rft_dat=%3Cproquest_cross%3E2840851171%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2840851171&rft_id=info:pmid/&rfr_iscdi=true |