期刊文献+

可搜索加密研究进展综述 被引量:9

Overview of searchable encryption research
下载PDF
导出
摘要 随着云计算的迅速发展,为保护用户外包数据的安全和用户隐私,越来越多的企业和用户选择将数据加密后上传。因此,对云服务器上加密数据的有效搜索成为用户关注的重点。可搜索加密技术是允许用户对密文数据进行检索的密码原语,利用云服务器的强大计算资源进行关键词检索。根据使用密码体制的不同,介绍了可搜索加密的分类,将其分为对称可搜索加密和非对称可搜索加密。基于这种分类,首先介绍了典型方案,之后从可搜索加密的语句表达能力和安全性2方面进行介绍,并指出了该领域当前研究中急需解决的问题及未来研究方向。 With the development of cloud computing, there is an increasing number of companies and individuals outsourcing their data to cloud server in the encrypted form to protect data security and user privacy. As a result, efficient retrieval of encrypted data stored on cloud server has become the issue that users may pay attention to. Searchable encryption(SE) is a cryptographic primitive that supports keyword search over encrypted data, and migrates the cumbersome search operation to the cloud server to utilize its vast computational resources. Reviews previous research according to the different cryptosystems used, and divides SE into two groups, that is symmetric searchable encryption and asymmetric searchable encryption. Based on this classification, first introduces a typical program, and then introduces from the two aspects of the expression of searchable encryption and security.Finally, the need-to-be-solved problems and main research directions are discussed.
作者 李颖 马春光 LI Ying;MA Chunguang(School of Computer Science and Technology,Harbin Engineering University,Harbin 150000,China)
出处 《网络与信息安全学报》 2018年第7期13-21,共9页 Chinese Journal of Network and Information Security
基金 国家自然科学基金资助项目(No.61472097)~~
关键词 云计算 可搜索加密 对称可搜索加密 非对称可搜索加密 cloud computing searchable encryption symmetric searchable encryption asymmetric searchable encryption
  • 相关文献

参考文献8

二级参考文献120

  • 1张串绒,尹忠海,肖国镇.不使用Hash和Redundancy函数的认证加密方案[J].电子学报,2006,34(5):874-877. 被引量:6
  • 2ARMBRUST M, FOX A, GRIFFITH R. Above the clouds: a berkeley view of cloud computing[EB/OL], http://www.eecs.berkeley.edu/Pubs/ TechRpts/2009/EEC S-2009-28.html, 2009.
  • 3BUGIEL S, NLrRNBERGER S, SADEGHI A. Twin clouds: an archi- tecture for secure cloud computing[A]. Workshop on Cryptography and Security in Clouds[C]. Zurich, Switzerland, 2011.1-11.
  • 4KAMARA S, LAUTER K. Cryptographic cloud storage[J]. Financial Cryptography and Data Security, 2010,6054:136-149.
  • 5LI J, KROHN M, MAZI D. Secure untrusted data repository (SUNDR)[A]. Proceedings of the 6th Symposium on Operating Sys- tems Design and Implementation[C]. San Francisco, CA, USA, 2004. 91-106.
  • 6GOH E J. Secure indexes[A]. Proceedings of the 2004 Workshop on Information Security Applications[C]. Jeju Island, Korea, 2004.73-86.
  • 7SONG D X, WAGNER D, PERRIG A. Practical techniques or searches on encrypted data[A]. Proceedings of the IEEE Symposium on Security and Privacy[C].CA,USA,2000.36-49.
  • 8BONEH D, CRESCENZO G D, OSTROVSKY R. Public key encryp- tion with keyword search[A]. Proc of EUROCRYP'04[C]. Interlaken, Switzerland, 2004.506-522.7.
  • 9PAILLIER P. Public-key cryptosystems based on composite degree residu- osity clmmes[A]. Proceedings of the International Conference on the Theory and Applications of Cryptograhic Techniques (EUROCRYPT'99)[C]. Prague, Czech Republic, 1999.223-238.
  • 10BETHENCOURT J, SONG D, WATERS B. New constructions and practical applications for private stream searching (extended ab- stract)[A]. Proceedings of the IEEE Symposium on Security and Pri- vacy (SP'06)[C]. Oakland, California, USA, 2006. 134-139.

共引文献144

同被引文献43

引证文献9

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部