A method of searching encrypted files includes a client computing device selecting a specific keyword to search a plurality of encrypted files stored at a server computing device and if the specific keyword has not been previously used to search the plurality of encrypted files, the method further includes using an encrypted keyword index stored at the server computing device to identify one or more encrypted files of the plurality of encrypted files that contain the specific keyword based upon keyword-file relationships stored in the encrypted keyword index. The method also includes, storing the keyword-file relationship for each of the one or more encrypted files that are identified as containing the specific keyword in an encrypted dictionary at the server and during a subsequent search, if the specific keyword has previously been used to search the plurality of encrypted files, the method includes using the encrypted dictionary and the encrypted keyword index stored at the server to identify one or more encrypted files of the plurality of encrypted files that contain the specific keyword based upon the keyword-file relationships for the specific keyword previously stored in the encrypted dictionary.USF Inventors have designed an improved DSSE system that allows the user to encrypt their own data in such a way that it can be later searched and dynamically updated without being vulnerable to interference. This is achieved via the creation of an encrypted index containing a set of keyword-file pairs, which associate search/update tokens with the out-sourced files encrypted with standard symmetric encryption. This system can be deployed on actual cloud environments to achieve privacy-preserving cloud services.
A new compromise-resilient and compact cryptographic tool is provided that ensures a breach-resilient authentication and integrity of system measurements in computer systems. The described methods are forward-secure digital signatures with signature and partial public key aggregation capabilities. The methods reduce the total space overhead of signature and public key storage. The methods offer a high space efficiency for systems who has relatively low state transitions, wherein the same message is continuously signed and then followed by different messages.Our proposed technology addresses many of the concerns in state-of-the-art cryptographic techniques. The coding tools ensure breach-resilience while also reducing overhead space of signature and public key storage. The methods will ensure that the system maintains a high level of space efficiency which is critical when large amounts of data are collected. This technology can be useful to security monitoring applications such as those that involve digital archives, security sensor/camera measurements, and personal bank accounts. Implementation of the proposed cryptographic tools will assist in protecting computer systems from digital crimes and attacks.