期刊文献+

基于同态加密的密文检索方案研究 被引量:1

Ciphertext Retrieval Technology Based Homomorphic Encryption
下载PDF
导出
摘要 现有的密文检索技术主要是采用的是布尔模型,它无法精确的计算出检索项与待检索文件的相关度,不能按相似度进行精确的排序。针对以上情况,结合同态加密技术和基于TF-IDF的向量空间模型技术,采用了一个基于向量空间模型全同态环境下的密文检索方案BVH(Based Vector space model and Homomorphism ciphertext retrieval scheme),BVH主要分为三个步骤:第一是预处理阶段,主要对上传的文件建立倒排索引,生成文件向量集,计算各个文件向量的模,对文件向量集和要上传的文件加密以密文的形式上传到云端;第二个阶段是检索阶段,主要是将搜索词的向量密文和各个文件向量的密文相乘将结果以密文的形式返回给客户端;第三个阶段结果处理阶段,主要是对解密后的结果进行相应的计算处理,对最后的处理结果按相似度大小排序;经分析,该方案在准确率和检索效率方面都得到了较大提升。 The existing ciphertext retrieval techniques mainly adopt the boolean model and can not calculate accurately the related degree of the search terms and the retrieved documents,then it can not sort precisely.In view of the above situation,combined with homomorphic encryption technology and vector space model technique based on TF-IDF,the paper proposed a ciphertext retrieval scheme BVH,BVH is divided into three steps:the first is preprocessing stage,it's main work is the establishment of inverted index file and vector set,and the calculation of each document vector module,then uploads the encrypted document vectors and files to the cloud.The second stage is the retrieval stage,it mainly multiplys key words vector ciphertext and each file vector ciphertext and returns the result ciphertext to the client.The third stage is the result process stage,it mainly decrypts the returned results,processes the decrypted results,and then sorts the processing results according to the similarity.The results of analysis show that the scheme has greatly improved in the safety,precision and retrieval efficiency.
出处 《计算机测量与控制》 2016年第3期154-158,共5页 Computer Measurement &Control
基金 辽宁省教育厅科学基金(L2013064) 辽宁省教育厅科学基金(L2013064) 中航工业技术创新基金(基础研究类)(2013S60109R) 中航工业技术创新基金(基础研究类)(2013S60109R)
关键词 同态加密 向量空间模型 倒排索引 密文检索 相似度 homomorphic encryption vector space modal inverted index ciphertext retrieval similarity
  • 相关文献

参考文献9

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1070
  • 2Aderemi A. Atayero, Oluwaseyi Feyisetan. Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption [J]. Journal of Emerging Trends in Computing and Information Sci- ences, 2011, 2 (10): 546-552.
  • 3Craig Gentry, Palo Alto. Fully homomorphic encryption using ideal lattices [A]. STOC "09 Proceedings of the 41st annual ACM sym- posium on Theory of computing [C]. 2009, 3 (10) : 169 - 178 .
  • 4Yin L F. The Analysis of Critical Technology on Cloud Storage Se- curity [A]. 2013 International Conference on Computer Sciences and Applications [C]. 2013, 2 (7) : 26 - 28.
  • 5汤殿华,祝世雄,曹云飞.一个较快速的整数上的全同态加密方案[J].计算机工程与应用,2012,48(28):117-122. 被引量:35
  • 6谭凯丽.飞行记录数据云存储安全通信研究[D].沈阳:沈阳航空航天大学,2014.
  • 7基于全同态加密算法的密文检索模型的设计与实现[D].西安:西安电子科技大学,2014.
  • 8Schmidt P. Fully Homomorphic Encryption: Overview and Crypt analysis [D]. Diploma Thesis, Technische Universitat Dort mund, 2011.
  • 9郭璐璐,许春根.云存储密文检索方法的研究[J].信息网络安全,2013(9):6-9. 被引量:3

二级参考文献36

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1105

同被引文献4

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部