@inproceedings{c849c9dd7dc7445baedd94a3a58cf773,
title = "Towards efficient verifiable conjunctive keyword search for large encrypted database",
abstract = "Searchable Symmetric Encryption (SSE) enables a client to securely outsource large encrypted database to a server while supporting efficient keyword search. Most of the existing works are designed against the honest-but-curious server. That is, the server will be curious but execute the protocol in an honest manner. Recently, some researchers presented various verifiable SSE schemes that can resist to the malicious server, where the server may not honestly perform all the query operations. However, they either only considered single-keyword search or cannot handle very large database. To address this challenge, we propose a new verifiable conjunctive keyword search scheme by leveraging accumulator. Our proposed scheme can not only ensure verifiability of search result even if an empty set is returned but also support efficient conjunctive keyword search with sublinear overhead. Besides, the verification cost of our construction is independent of the size of search result. In addition, we introduce a sample check method for verifying the completeness of search result with a high probability, which can significantly reduce the computation cost on the client side. Security and efficiency evaluation demonstrate that the proposed scheme not only can achieve high security goals but also has a comparable performance.",
keywords = "Accumulator, Conjunctive keyword search, Searchable encryption, Verifiable search",
author = "Jianfeng Wang and Xiaofeng Chen and Sun, {Shi Feng} and Liu, {Joseph K.} and Au, {Man Ho} and Zhan, {Zhi Hui}",
note = "Funding Information: This work is supported by National Key Research and Development Program of China (No. 2017YFB0802202), National Natural Science Foundation of China (Nos. 61702401, 61572382, 61602396 and U1636205), China 111 Project (No. B16037), China Postdoctoral Science Foundation (No. 2017M613083), Natural Science Basic Research Plan in Shaanxi Province of China (No. 2016JZ021), the Research Grants Council of Hong Kong (No. 25206317), and the Australian Research Council (ARC) Grant (No. DP180102199). Funding Information: Acknowledgement. This work is supported by National Key Research and Development Program of China (No. 2017YFB0802202), National Natural Science Foundation of China (Nos. 61702401, 61572382, 61602396 and U1636205), China 111 Project (No. B16037), China Postdoctoral Science Foundation (No. 2017M613083), Natural Science Basic Research Plan in Shaanxi Province of China (No. 2016JZ021), the Research Grants Council of Hong Kong (No. 25206317), and the Australian Research Council (ARC) Grant (No. DP180102199). Publisher Copyright: {\textcopyright} 2018, Springer Nature Switzerland AG.; 23rd European Symposium on Research in Computer Security, ESORICS 2018 ; Conference date: 03-09-2018 Through 07-09-2018",
year = "2018",
doi = "10.1007/978-3-319-98989-1_5",
language = "English",
isbn = "9783319989884",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "83--100",
editor = "Jianying Zhou and Miguel Soriano and Javier Lopez",
booktitle = "Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings",
address = "Germany",
}