期刊文献+

适合移动云存储的基于属性的关键词搜索加密方案 被引量:5

Attribute-Based Encryption with Keyword Search in Mobile Cloud Storage
下载PDF
导出
摘要 近年来,随着移动设备性能的不断提升和移动互联网的迅猛发展,越来越多的移动终端参与云端数据存储与共享.为了更好地解决资源受限的移动设备参与云端数据共享的安全和效率问题,基于支持通配符的与门访问结构,提出了一种高效的基于属性的关键词搜索加密方案,并证明了其在标准模型下满足选择关键词明文攻击的不可区分安全性和关键词安全性.该方案采用韦达定理使得每个属性仅需用一个元素表示,方案中索引长度固定,陷门和密钥的长度及陷门算法和搜索算法的计算复杂度与访问结构中可使用的通配符数量上限成正比,同时,移除了索引和陷门传输过程中的安全信道,进一步降低了开销.效率分析表明:与其他方案相比,该方案的计算开销和通信开销较小,更加适用于移动云存储环境. In recent years,with the further improvement of mobile devices'performance and the rapid development of mobile Internet,more and more mobile terminals participate in cloud data storage and data sharing.In order to support mobile devices with constrained resource effectively in terms of sharing data safely and efficiently in the cloud,a secure and efficient attribute-based encryption scheme with keyword search(ABKS)is proposed in this paper.The proposed scheme is based on the AND gate access structure with wildcards,which is proven to be IND-CKA(indistinguishable against chosen keyword attack)secure and achieves keyword security under the standard model.The scheme adopts the Viète's formulas to make each attribute only be represented by one element,and the length of index is constant,the length of trapdoor and secret key and the computation complexity of trapdoor algorithm and search algorithm grow linearly with the maximum number of wildcards that can be used in the access structure,in addition,the scheme removes the secure channel,which reduces the communication overhead further during the transmission process of index and trapdoor.Efficiency analysis shows that compared with other schemes,the proposed scheme has less computation overhead and communication overhead,which is more suitable for mobile cloud storage environment.
出处 《计算机研究与发展》 EI CSCD 北大核心 2017年第10期2369-2377,共9页 Journal of Computer Research and Development
基金 国家重点研发计划项目(2016YFB0501900)~~
关键词 移动云存储 可搜索加密 属性基加密 移除安全信道 韦达定理 mobile cloud storage searchable encryption attribute-based encryption(ABE) secure channel free Viète's formulas
  • 相关文献

参考文献5

二级参考文献143

  • 1Yun A, Shi C, Kim Y. On protecting integrity and confidentiality of cryptographic file system for outsourced storage [C] //Proc of ACM Workshop Cloud Computing Security (CCSW 2009). New York: ACM, 2009:67-76.
  • 2Rackspace. JungleDisk [EB/OL]. 2010 [ 2011-01-09 ]. http://www, jungledisk, com/.
  • 3Vrable M, Savage S, Voelker G M. Cumulus: Filesystem Backup to the cloud [J]. ACM Trans on Storage, 2009, 5 (4): 1-28.
  • 4Cramer R, Shoup V. Design and analysis of practical public- key eneryption schemes secure against adaptive chosen ciphertext attack [J]. SIAM Journal on Computing, 2004, 33(1) : 167-226.
  • 5Hofheinz D, Eike K. Secure hybrid encryption from weakened key encapsulation [G] //LNCS 4622: Proc of CRYPTO 2007. Berlin: Springer,2007: 553-571.
  • 6Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography [G] //LNCS 1403: Proc of EUROCRYPT 1998. Berlin.. Springer, 1998:127-144.
  • 7Ateniese G, Fu K, Green M, et al. Improved proxy re- encryption schemes with applications to secure distributed storage [J]. ACM Trans on Information and System Security, 2006, 9(1): 1-30.
  • 8Green M, Ateniese G. Identity-based proxy re-encryption[G] //LNCS 4521: Proc of the 5th Applied Cryptography and Network Security Conf. Berlin: Springer, 2007: 288- 306.
  • 9Hohenberger S, Rothblum G, Shelat A, et al. Securely obfuscating reencryption [C] //Proc of the 4th Theory of Cryptography Conf. Berlin: Springer, 2007:233-252.
  • 10Canetti R, Hohenherger S. Chosen-ciphertext secure proxy re-encryption [C] //Proc of ACM CCS 2007. New York: ACM, 2007:185-194.

共引文献212

同被引文献33

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部