期刊文献+

一个高效的基于连接关键词的可搜索加密方案 被引量:12

An Efficient Conjunctive Keyword Searchable Encryption Scheme
在线阅读 下载PDF
导出
摘要 在存储服务中,可搜索加密方案使得用户能够有选择地访问其密文数据,同时还能确保用户搜索数据的机密性。基于连接关键词(即多个关键词的布尔组合)的可搜索加密方案因其更高的搜索精度在安全存储服务中有着重要的应用价值。目前已有的基于连接关键词的可搜索加密方案存在诸如连接关键词的陷门太大、搜索效率不高及不支持多用户等问题。该文采用授权用户和存储服务器先后对关键词加密的方式提出了一个高效的基于连接关键词的可搜索加密方案,使得授权用户能够利用连接关键词的陷门搜索加密文档。在确定性Diffie-Hellman问题假设下,证明了方案的安全性。通过与现有方案相比较,提出的方案在通信和计算代价,即搜索陷门大小、关键词加密和搜索的速度等方面的综合效率得到提高。此外,提出的方案支持多用户,即能够动态地增加和撤销用户,使得用户能够直接在存储服务器上进行数据共享。 In storage service, searchable encryption scheme allows users to access their cipher data selectively, and meanwhile ensures the confidentiality of search data. Since possessing higher search accuracy, conjunctive keyword (namely Boolean combination of multiple keywords) searchable encryption scheme enjoys greater significance in secure storage service application. However, there are some flaws in existing searchable encryption schemes, such as the size of the trapdoor of conjunctive keyword is too large, the search efficiency is slow and there is no support for multiple users search, etc. In this paper, an efficient conjunctive keyword searchable encryption scheme is proposed based on the method that the keywords are encrypted by authorized users and storage server successively, in which authorized users are allowed to search encrypted documents with the trapdoor generated by conjunctive keyword. The scheme is provable secure in the decisional Diffie-Hellman assumption. Compared with the existing schemes, the overall efficiency of the proposed scheme in computation and communication cost, including the size of trapdoor, the speed of keyword encryption and searching, is improved. Moreover, the proposed scheme also supports multiple users, that is, users can be added or revoked dynamically, by this way, and users can share data directly in storage server.
出处 《电子与信息学报》 EI CSCD 北大核心 2013年第9期2266-2271,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61173192 60873268) 陕西省教育厅2012年度科学研究计划(12JK0740 12JK0857)资助课题
关键词 密码学 可搜索加密 连接关键词 存储服务 确定性Diffie—Hellman问题 Cryptography Searchable encryption Conjunctive keyword Storage service Decisional Diffie-Hellmanproblem
  • 相关文献

参考文献15

  • 1Song D, Wagner D, and Perrig A. Practical techniques for searches on encrypted data[C]. Proceedings of IEEE Symposium on Security and Privacy, Berkeley, 2000: 44-55.
  • 2Goh E. J. Secure indexes[OL], http://eprint.iacr.org/2003/ 216/, 2003.
  • 3Boneh D, Crescenzo G, Ostrovsky R, et al.. Public key encryption with keyword search[C]. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, 2004: 506-522.
  • 4Liu Chang, Zhu Lie-huang, Li Long, et al.. Fuzzy keyword search on encrypted cloud storage data with small index[C]. Proceedings of International Conference on Cloud Computing and Intelligence Systems, Beijing, 2011: 269-273.
  • 5Golle P, Staddon J, and Waters B. Secure conjunctive keyword search over encrypted data[C]. Proceedings of the 2nd International Conference on Applied Cryptography and Network Security, Huangshan, 2004: 31-45.
  • 6Ballard L, Kamara S, and Monrose F. Achieving efficient conjunctive keyword searches over encrypted data[C]. Proceedings of the 7th International Conference on Information and Communications Security, Beijing, 2005: 414-426.
  • 7Byun J W, Lee D H, and Lira J. Efficient conjunctive keyword search on encrypted data storage system[C]. Proceedings of EuroPKI, Turin, 2006: 184-196.
  • 8Ryu E K and Takagi T. Efficient conjunctive keyword- searchable encryption[C]. Proceedings of 21st InternationalConference on Advanced Information Networking and Application Workshops, Niagara, 2007: 409-414.
  • 9Kerschbaum F. Secure conjunctive keyword searches for unstructured text[C]. Proceedings of 5th International Conference on Network and System Security, Milan, 2011: 285-289.
  • 10Cao Ning, Wang Cong, Li Ming, et al.. Privacy-preserving multi-keyword ranked search over encrypted cloud data[C]. Proceedings of IEEE INFOCOM, Shanghai, 2011: 829-837.

同被引文献64

  • 1SONG D, WAGNER D, PERRIG A. Practical techniques for searcheson encrypted data[C]//The IEEE Symposium on Security and Pri-vacy(S&P’00). c2000:44-55.
  • 2BONEH D, CRESCENZOM G D, OSTROVSKY R, et al. Public keyencryption with keywordsearch[C]//The International Conference onthe Theory and Applications of Cryptographic Techniques(EUROCRYPT2004). Interlaken, Switzerland, c2004:506-522.
  • 3LEE C C, HSU S T, H M S. A study of conjunctive keyword search-able schemes[J]. International Journal of Network Security, 2013,15(5):321-330.
  • 4GOLLE P, STADDON J, WATERS B. Secure conjunctive keywordsearch over encrypted data[C]//Applied Cryptography and Network Se-curity Conference (ACNS 2004). Yellow Mountain, China, c2004;31-45.
  • 5PARK D J, KIM K, LEE P J. Public key encryption with conjunc-tive-field keyword search[C]//The 5th Information Security Applica-tions International Workshop (WISA 2004).Jeju Island, Korea,c2004:73-86.
  • 6HWANG Y H, LEE P J. Public key encryption with conjunctive key-word search and its extension to a multi-user system[C]//丁he first In-ternational Conference of Pairing-BasedCryptography (Pairing 2007).Tokyo, Japan, c2007:2-22.
  • 7BONEH D, WATERS B. Conjunctive, subset, and range queries onencrypted data[C]//The 4th Theory of Cryptography conference (TCC2007). Amsterdam, The Netherlands, c2007: 535-554.
  • 8KATZ J, SAHAI A, WATERS B. Predicate encryption supportingdisjunctions, polynomial equations, and inner products[C]//The 27thAnnual International Conference on the Theory and Applications ofCryptographic Techniques (EUROCRYPT 2008). Istanbul, Turkey,c2008:146-162.
  • 9CHEN Y C, HORNG G. Timestamped conjunctive keyword searchablepublic key encryption[C]//Fourth International Conference on Innova-tion Computing Information and Control (IC1CIC). Kaohsiung,c2009:729-932.
  • 10ZHANG B, ZHANG F G An efficient public key encryption withconjunctive-subset keywords search[J]. Journal of Network and Com-puter Applications, 2011, 34(1):262-267.

引证文献12

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部