期刊文献+

云环境下支持多用户的保序加密方案 被引量:1

Proxy encryption fuzzy retrieval algorithm based on local sensitive hashing in cloud computing
下载PDF
导出
摘要 提出一种适用于云环境下多用户场景的保序加密方案(OPESMU)。该方案将多用户问题定位到多对多模型,将原始明文空间随机分割成不同长度的连续区间,通过加密函数对明文进行加密;引入可信的密钥生成中心生成用户密钥和对应的辅助密钥,利用代理重加密机制将加密后的数据进行重加密,得到的重加密密文允许其他用户用自己的私钥去破解。安全性分析和实验结果验证了OPESMU方案的安全性和有效性。 An order preserving encryption scheme supporting multi-user in cloud environments( OPESMU) is proposed. This scheme locates the multi-user problem to the most common many-tomany model according to security requirements. Before encryption plaintext,the original plaintext is randomly divided into successive intervals having different lengths,and the plaintexts are encrypted by encryption function. Trusted key generation center is introduced by OPESMU algorithm,and the encrypted ciphertext are re-encrypted by proxy re-encryption. The re-encrypted ciphertexts allow user to decrypt by using own private key. Security analysis and experimental have verified the safety and effectiveness of the OPESMU scheme.
作者 李陶深 周雄 黄汝维 LI Tao-shen;ZHOU Xiong;HUANG Ru-wei(School of Computer and Electronic Information,Guangxi University,Nanning 530004;Guangxi Colleges and Universities Key Laboratory of Parallel and Distributed Computing Technology,Nanning 530004,China)
出处 《广西大学学报(自然科学版)》 CAS 北大核心 2018年第3期1044-1052,共9页 Journal of Guangxi University(Natural Science Edition)
基金 国家自然科学基金资助项目(61640203 61363067) 广西自然科学基金资助项目(2013GXNSFBA019281)
关键词 云计算 加密检索 代理加密 模糊检索 局部敏感哈希技术 cloud computing order preserving encryption muhi-user proxy re-encryption privacy protection
  • 相关文献

参考文献9

二级参考文献132

  • 1Hacigümüs H,Mehrotra S,Iyer B.Providing database as a service.In:Proc.of the Int'l Conf.on Data Engineering.Washington:IEEE Computer Society Press,2002.29-38.
  • 2Mykletun E,Narasimha M,Tsudik G.Authentication and integrity in outsourced databases.ACM Trans.on Storage,2006,2(2):107-138.
  • 3Schneier B,Wrote; Wu SZ,Zhu SX,Zhang WZ,Trans.Applied Cryptography-Protocols,Algorithms,and Source Code in C (Second Edition).Beijing:China Machine Press,2006 (in Chinese).
  • 4Shmueli E,Waisenberg R,Elovici Y,Gudes E.Designing secure indexes for encrypted databases.In:Proc.of the IFIP Conf.on Database and Applications Security.LNCS 3654,Heidelberg,Berlin:Springer-Verlag,2005.54-68.
  • 5Yang ZQ,Zhong S,Wright RN.Privacy-Preserving queries on encrypted data.In:Proc.of the 11th European Symp.on Research in Computer Security.LNCS 4189,Heidelberg,Berlin:Springer-Verlag,2006.479-495.
  • 6Davida GI,Wells DL,Kam JB.A database encryption system with subkeys.ACM Trans.on Database Systems,1981,6(2):312-328.[doi:10.1145/319566.319580].
  • 7Song DX,Wagner D,Perrig A.Practical techniques for searches on encrypted data.In:Proc.of 2000 IEEE Symp.on Research in Security and Privacy.Washington:IEEE Computer Society Press,2000.44-55.
  • 8Hacigümüs H,Iyer B,Mehrotra S,Li C.Executing SQL over encrypted data in the database service provider model.In:Proc.of the ACM SIGMOD Conf.New York:ACM Press,2002.216-227.
  • 9Ozsoyoglu G,Singer DA,Chung SS.Anti-Tamper databases:Querying encrypted databases.In:Proc.of the 17th Annual IFIP WG 11.3 Working Conf.on Database Applications and Security.Cleveland:Case Western Reserve University,2003.133-146.
  • 10Hore B,Mehrotra S,Tsudik G.A privacy-preserving index for range queries.In:Nascimento MA,-zsu MT,Kossmann D,Miller,Blakeley RJJA,Schiefer KB,eds.Proc.of the 13th Int'l Conf.on Very Large Data Bases.New York:ACM Press,2004.720-731.

共引文献105

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部