期刊文献+

支持关键字更新的可搜索加密方案 被引量:2

A searchable encryption scheme for supporting keyword update
下载PDF
导出
摘要 针对可搜索加密方案不支持关键字更新的问题,采用带计数器的布隆过滤器,设计了一种支持关键字更新的可搜索加密方案。该方案允许在索引密文中增加或者删除关键字,能够对文件的索引密文进行动态修正,使得文件索引和文件的关联更加紧密,提高了检索效率。分析结果表明,该方案在已知密文模型下是安全的,可保证查询关键字陷门信息不被云存储服务器获取。 Keyword update is not supported by the exiting searchable encryption scheme, so a searchable encryption scheme for supporting keyword update with counting Bloom filter is designed. Fixing cipher index through adding or deleting key word is allowed in the scheme, the cipher of file index can be revised. And association of file and its index can be made more closely. It is very convenient to improve the efficiency of data retrieval. The analysis result shows that the new scheme is safe in the known cipher model, which can protect the query keyword and the trapdoor information from being elicited by cloud storage server.
出处 《桂林电子科技大学学报》 2016年第1期44-47,共4页 Journal of Guilin University of Electronic Technology
基金 国家自然科学基金(61272037 61402366 61472472) 陕西省自然科学基础研究计划(2013JZ020 2015JQ6236) 西安邮电大学研究生创新基金(CXL2014-10 CXL2014-04)
关键词 可搜索加密 隐私保护 关键字更新 云存储 searchable encryption privacy protection keyword update cloud storage
  • 相关文献

参考文献2

二级参考文献18

  • 1ZHENG Dong,LI Xiangxue,CHEN Kefei.LFSR-based Ring Signature Scheme[J].Chinese Journal of Electronics,2007,16(3):397-400. 被引量:3
  • 2Vaquero L M, Rodero-Merino L, Caeeres J, Lindner M A. A break in the clouds: Towards a cloud definition. ACM SIGCOMM Computer Communication Review, 2009, 39 (1) : 50-55.
  • 3Kamara S, Lauter K. Cryptographic cloud storage//Proceed ings of the Financial Cryptography Workshops. Tenerife, Canary Islands,Spain, 2010:136-149.
  • 4Cao Ning, Wang Cong, Li Ming, Ren Kui, Lou Wenjing. Privacy-preserving multi-keyword ranked search over encrypted cloud data//Proeeedings of the 30th IEEE Interna tional Conference on Computer Communications (INFOCOM 2011). Washington, USA, 2011:829-837.
  • 5Hacigumus H, Iyer B, Mehrotra S. Providing database as a serviee//Proceedings of the 18th International Conference on Data Engineering (ICDE 2002). San Jose, CA, USA, 2002: 29-40.
  • 6Song D, Wagner D, Perrig A. Practical techniques for sear- ches on encrypted data//Proceedings of the IEEE Symposium on Security and Privacy (S&P 2000). Berkeley, California, USA, 2000:44-55.
  • 7Wong W K, Cheung D W, Kao B, Mamoulis N. Secure kNN computation on encrypted databases//Proceedings of the 35th International Conference on Management of Data (SIGMOD 2009). Providence, Rhode Island, USA, 2009: 139-152.
  • 8Goh E J. Secure indexes. Cryptology ePrint Archive, 2003. http: //eprint. iacr. org/2003/216.
  • 9Boneh D, Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search//Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques ( EUROCRYPT 2004). Interlaken, Switzerland, 2004: 506-522.
  • 10Boneh D, Kushilevitz E, Ostrovsky R, Skeith III W E. Pub- lie key eneryption that allows PIR queries//Proceedings of the 27th Annual International Cryptology Conference (CRYPTO 2007). Santa Barbara, CA, USA, 2007:50-67.

共引文献85

同被引文献4

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部