Research Article

HCV: Practical Multi-Keyword Conjunctive Query with Little Result Pattern Leakage

Algorithm 4

HCV conjunctive searchable encryption scheme.
(1)Setup
Input: Security Parameter k, Inverted Index
Output: K, EDB
(2)Generate key according to ;
(3)Get the EMM as in ;
(4)Compute CV database using Algorithm 1;
(5)Encrypt CV as equation (15) to acquire ECV;
(6)set ,
(7)return .
(8)Token
(9)The same as CVX.
(10)Query;
Input: tk, EDB
Output: result
(11)initialize a tag vector S;
(12)initialize a bool vector ;
(13)initialize a integer vector ;
(14)(a) Server parse , and parse ;
(15)fordo
(16)if ;
(17)  return;
(18)Server send Query Request command to Client.
(19)(b) fordo
(20) set a vector and encrypt it to as equation (16), send and to Server.
(21)(c) Server do as follows:
(22)set each element of to integer 1 fordo
(23) set ,
(24)fordo
(25)  if then
(26)   ;
(27)  else
(28)   ;
(29)Finally, the Server computes ;
(30)return