Netinfo Security ›› 2023, Vol. 23 ›› Issue (5): 32-40.doi: 10.3969/j.issn.1671-1122.2023.05.004

Previous Articles     Next Articles

Multi-Keyword Searchable Encryption Scheme Based on Verifiable Secret Sharing

QIN Baodong1(), CHEN Congzheng1, HE Junjie1, ZHENG Dong1,2   

  1. 1. School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
    2. The college of Computer, Qinghai Normal University, Xining 810008, China
  • Received:2023-02-19 Online:2023-05-10 Published:2023-05-15
  • Contact: QIN Baodong E-mail:qinbaodong@xupt.edu.cn

Abstract:

With the rapid development of cloud storage technology, searchable encryption technology has been widely used in the implementation of data security and personal information protection, and has been paid attention by many scholars at home and abroad as a research hotspot. The security of the encryption system depends on the confidentiality of the key. However, at present, most searchable encryption schemes require users to manage the key by themselves. There is a risk of key leakage and loss, which affects the security of the encryption scheme, and also limits users who need to use different devices. Aiming at the key management problem of searchable encryption, the paper proposed a key reconfigurable multi-keyword searchable encryption scheme based on verifiable secret sharing. Users only need to rely on their biometrics and password to complete data outsourcing and retrieval, and get rid of the problem of self-managed keys. The scheme meets the two security attributes of selecting keywords indistinguishable and identity authentication, and ensures that data outsourcing and retrieval can be completed only when the password is correct and the biometrics are close enough to the template. The correctness of user characteristics is calculated and verified by the server, and privacy information such as the user's original biometrics, keys and keywords cannot be obtained.

Key words: multi-searchable encryption, biometric, verifiable secret sharing, key management

CLC Number: