Research Article

A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security

Table 1

Notations (used in our scheme).

NotationDescription

A secure keyed PRF used to generate the key for algorithm
A secure keyed PRF used to generate the key for algorithm
A secure PRF family used to generate the file's column
Maximum number of files corresponding to security parameters
A secure keyed PRF used to generate the key of column
A secure PRF used to generate the keyword's hash
A secure PRF family used to generate the row order of keywords
The set of keywords extracted from the file
The set of files
To column c of the index
The key corresponding to column c of the index
The ciphertext of the file corresponding to the cth column of the index
The ciphertext of the set of the files
The ciphertext of the set of the files F at time
Plaintext of row of index at time
The input label of HMAC
The file set that does not update
At time , the plaintext of the file corresponding to column of index