A face authentication-based searchable encryption scheme for mobile device (original) (raw)
Abstract
In this paper, we introduce Face-Authentication Keyword Encryption Search (FAKES), a novel searchable encryption scheme that eliminates the requirement for clients to manage cryptographic keys by utilizing only the client’s face biometric data for authentication of outsourcing and retrieval of encrypted files. We propose two face biometric-based searchable encryption models that support single-user and multi-user scenarios, respectively. Furthermore, we propose a key recovery approach that relies exclusively on facial biometric data, making it easier for users to migrate across devices. Taking into account the limitations of storage and computation on the devices of users, we design a pairing-free elliptic-curve-based encryption algorithm in order to enhance the user’s experience. In order to ensure that cloud servers return the right files, we provide correctness and security proofs. We also provide a security analysis of FAKES and demonstrate its effectiveness through a series of extensive experiments.
Access this article
Subscribe and save
- Starting from 10 chapters or articles per month
- Access and download chapters and articles from more than 300k books and 2,500 journals
- Cancel anytime View plans
Buy Now
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Instant access to the full article PDF.
Similar content being viewed by others
Data availability
All the dataset and materials used in our research will be completely provided when requested.
References
- Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S &P 2000, pp 44–55. IEEE
- Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp 506–522. Springer
- Gu X, Wang Z, Fu M, Ren P (2021) A certificateless searchable public key encryption scheme for multiple receivers. In: 2021 IEEE International Conference on Web Services (ICWS), pp 635–64. IEEE
- Zhao F, Peng C, Xu D, Liu Y, Niu K, Tang H (2023) Attribute-based multi-user collaborative searchable encryption in covid-19. Comput Commun 205:118–126
Article Google Scholar - Sun J, Ren L, Wang S, Yao X (2019) Multi-keyword searchable and data verifiable attribute-based encryption scheme for cloud storage. IEEE Access 7:66655–66667
Article Google Scholar - Miao Y, Tong Q, Deng RH, Choo K-KR, Liu X, Li H (2020) Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage. IEEE Trans Cloud Comput 10(2):835–848
Article Google Scholar - Nayak SK, Tripathy S (2021) SEPS: efficient public-key based secure search over outsourced data. J Inf Secur Appl 61:102932
Google Scholar - Zhang W, Qin B, Dong X, Tian A (2021) Public-key encryption with bidirectional keyword search and its application to encrypted emails. Comput Standards Interfaces 78:103542
Article Google Scholar - Eslami Z, Noroozi M, Amirizirtol K (2022) Public key encryption with distributed keyword search. J Discrete Math Sci Cryptogr 25(8):2369–2393
Article Google Scholar - Qin B, Cui H, Zheng X, Zheng D (2021) Improved security model for public-key authenticated encryption with keyword search. In: Provable and Practical Security: 15th International Conference, ProvSec 2021, Guangzhou, China, November 5–8, 2021, Proceedings, vol 15, pp 19–38. Springer
- Bouscatié E, Castagnos G, Sanders O (2021) Public key encryption with flexible pattern matching. In: Advances in Cryptology—ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part IV, vol 27, pp 342–370. Springer
- Zhou Y, Hu Z, Li F (2021) Searchable public-key encryption with cryptographic reverse firewalls for cloud storage. IEEE Trans Cloud Comput 11:383–396
Article Google Scholar - Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings, vol 23, pp 523–540. Springer
- Krawczyk H (2010) Cryptographic extraction and key derivation: the HKDF scheme. In: Annual Cryptology Conference, pp 631–648. Springer
- Morelos-Zaragoza RH (2006) The art of error correcting coding. Wiley
Book Google Scholar - Lauter KE, Stange KE (2008) The elliptic curve discrete logarithm problem and equivalent hard problems for elliptic divisibility sequences. In: International Workshop on Selected Areas in Cryptography, pp 309–327. Springer
- Ballard L, Kamara S, Reiter MK (2008) The practical subtleties of biometric key generation. In: USENIX Security Symposium, pp 61–74
- Turk M, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosci 3(1):71–86
Article Google Scholar - Chang Y-J, Zhang W, Chen T (2004) Biometrics-based cryptographic key generation. In: 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No. 04TH8763), vol 3, pp 2203–2206 . IEEE
- Wu Y, Qiu B (2010) Transforming a pattern identifier into biometric key generators. In: 2010 IEEE International Conference on Multimedia and Expo, pp 78–82. IEEE
- Seo M, Park JH, Kim Y, Cho S, Lee DH, Hwang JY (2018) Construction of a new biometric-based key derivation function and its application. Secur Commun Netw 2018:1–14
Google Scholar - Rhee HS, Susilo W, Kim H-J (2009) Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron Express 6(5):237–243
Article Google Scholar - Anees A, Chen Y-PP (2018) Discriminative binary feature learning and quantization in biometric key generation. Pattern Recogn 77:289–305
Article Google Scholar - Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: International Conference on Computational Science and Its Applications, pp 1249–1259. Springer
- Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403:1–14
Article Google Scholar - Lu Y, Li J-g (2019) Constructing pairing-free certificateless public key encryption with keyword search. Front Inf Technol Electron Eng 20(8):1049–1060
Article Google Scholar - Han L, Guo J, Yang G, Xie Q, Tian C (2021) An efficient and secure public key authenticated encryption with keyword search in the logarithmic time. IEEE Access 9:151245–151253
Article Google Scholar - Yang G, Guo J, Han L, Liu X, Tian C (2022) An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. Peer-to-Peer Netw Appl 15(1):503–515
Article Google Scholar - Wang P, You L, Hu G, Hu L, Jian Z, Xing C (2021) Biometric key generation based on generated intervals and two-layer error correcting technique. Pattern Recogn 111:107733
Article Google Scholar - Rathgeb C, Uhl A (2011) Context-based biometric key generation for iris. IET Comput Vis 5(6):389–397
Article Google Scholar - Jiasen L, An WX, Bowei C, Zheng T, Kaiyang Z (2021) Outsourced secure face recognition based on CKKS homomorphic encryption in cloud computing. Int J Mob Comput Multimed Commun (IJMCMC) 12(3):27–43
Google Scholar - Li N, Guo F, Mu Y, Susilo W, Nepal S (2017) Fuzzy extractors for biometric identification. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp 667–677. IEEE
- Wang XA, Xhafa F, Cai W, Ma J, Wei F (2016) Efficient privacy preserving predicate encryption with fine-grained searchable capability for cloud storage. Comput Electr Eng 56:871–883
Article Google Scholar - Miao Y, Ma J, Liu X, Wei F, Liu Z, Wang XA (2016) m2-ABKS: attribute-based multi-keyword search over encrypted personal health records in multi-owner setting. J Med Syst 40:1–12
Article Google Scholar - Wang XA (2021) Cryptanalysis of a privacy preserving ranked multi-keyword search scheme in cloud computing. In: International Conference on Advanced Information Networking and Applications, pp 367–370. Springer
- Zhang L, Su J, Mu Y (2020) Outsourcing attributed-based ranked searchable encryption with revocation for cloud storage. IEEE Access 8:104344–104356
Article Google Scholar - Hong H, Sun Z (2021) A flexible attribute based data access management scheme for sensor-cloud system. J Syst Arch 119:102234
Article Google Scholar - Hong H, Sun Z (2023) Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems. J Supercomput 79(13):15004–15022
Article Google Scholar - Gardham D, Manulis M, Drăgan CC (2020) Biometric-authenticated searchable encryption. In: Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II, vol 18, pp 40–61. Springer
- Mihailescu MI, Nita SL (2020) Three-factor authentication scheme based on searchable encryption and biometric fingerprint. In: 2020 13th International Conference on Communications (COMM), pp 139–144. IEEE
Funding
This study was supported by the National Natural Science Foundation of China (Grant Nos. 62001313, 62072090, 61772127) and Key Project of Liaoning Provincial Department of Science and Technology (Grant Nos. 2021JH2/10300134, 2022JH1/10500004, 2022JH1/10800085).
Author information
Authors and Affiliations
- The School of Information Science and Engineering, Shenyang University of Technology, Center Street, Shenyang, 110870, Liaoning, China
Xiaohan Yue, Gang Yi, Haoran Si, Haibo Yang & Shi Bai - The Graduate School of Science and Technology, Keio University, Hiyoshi, Yokohama, Kanagawa, 223-8522, Japan
Yuan He
Authors
- Xiaohan Yue
- Gang Yi
- Haoran Si
- Haibo Yang
- Shi Bai
- Yuan He
Contributions
Xiaohan Yue developed mechanics modeling and designed algorithm. Gang Yi performed data processing and manuscript correction. Haibo Yang performed supervision. Shi Bai contributed to funding acquisition. Yuan He contributed to methodology. Haoran Si revised the paper.
Corresponding author
Correspondence toGang Yi.
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Ethical standards
This is an original work by the author that has not been previously published elsewhere. The paper is not currently under consideration for publication elsewhere. The paper accurately and comprehensively reflects the author’s research and analysis. Proper acknowledgements are given to co-authors and co-researchers for their significant contributions. All authors have actively and personally contributed to the development of the paper and will take public responsibility for its contents. The results are appropriately contextualized in relation to prior and ongoing research.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yue, X., Yi, G., Si, H. et al. A face authentication-based searchable encryption scheme for mobile device.J Supercomput 81, 119 (2025). https://doi.org/10.1007/s11227-024-06554-3
- Accepted: 14 September 2024
- Published: 04 November 2024
- Version of record: 04 November 2024
- DOI: https://doi.org/10.1007/s11227-024-06554-3
Keywords
Profiles
- Xiaohan Yue View author profile
- Gang Yi View author profile
- Yuan He View author profile