期刊文献+

支持关键字更新的基于属性可搜索加密方案 被引量:4

ATTRIBUTE-BASED SEARCHABLE ENCRYPTION SCHEME WITH SUPPORTING KEYWORD UPDATES
下载PDF
导出
摘要 针对云存储环境中重要通知、广播消息、数据共享等敏感性较高的数据访问控制需求,提出和设计出一种适用于云存储环境支持关键字更新的可搜索加密方案。方案中的文件明文采用基于属性的加密算法,可以实现文件密文只加密一次就可被多个用户私钥搜索,避免了针对不同用户数据拥有者需要多次加密的问题,降低了网络开销。但是现有的基于属性的可搜索加密方案无法实现文件索引的更新,针对此问题,采用带计数器的布隆过滤器对文件关键字进行处理,能够允许用户在索引密文中添加或者删除关键字,实现文件索引的动态更新,提高了检索效率。给出方案的正确性分析、安全分析以及效率分析。分析结果表明:文件索引和陷门经过带计数器的布隆过滤器并进行向量加密后,的确能够实现增加和删除关键字;采用对称加密的思想对文件和索引进行加密后,明文和索引也都是安全的;通过与其他方案的计算量和适应性对比,可以发现方案的计算量较低,适应性强。 Aiming at the high sensitive data access control requirements such as important notification,broadcast message and data sharing in cloud storage environment,a searchable encryption scheme was proposed and designed to support keyword updating in cloud storage environment.The file in the scheme adopted the attribute-based encryption algorithm plaintext,and achieved that the file ciphertext could be searched by multiple user private keys only once by encrypting.It avoided the need for multiple user data owners need to encrypt multiple times and reduced network overhead.However,existing attribute-based searchable encryption schemes did not allow file index updates.In order to solve this problem,we used the Bloom filter with counter to process the keyword of the file,which allowed users to add or delete the keyword in the index ciphertext,to dynamically update the file index and improved the retrieval efficiency.The correctness analysis,safety analysis and efficiency analysis were given.The analysis results showed that the file index and trapdoor could indeed add and delete keywords after passing through a Bloom filter with a counter and performing vector encryption.With the idea of symmetric encryption to encrypt files and indexes,both plaintext and index were also safe.Comparing with the computation and adaptability of other schemes,it could be found that the computational complexity of the scheme was low and the adaptability was strong.
作者 许盛伟 王荣荣 陈诚 Xu Shengwei;Wang Rongrong;Chen Cheng(School of Telecommunications Engineering,Xidian University,Xi an 710071,Shaanxi,China;Beijing Electronic Science and Technology Institute,Beijing 100070,China)
出处 《计算机应用与软件》 北大核心 2018年第3期327-333,共7页 Computer Applications and Software
关键词 云存储 基于属性 可搜索加密 布隆过滤器 Cloud storage Attribute-based Searchable encryption Bloom filter
  • 相关文献

参考文献5

二级参考文献66

  • 1Boneh D, Crescenzo G D, Ostrovsky R, Persiano G. Public key encryption with keyword searcb//Proceedings of the EUROCRYPT'04. Interlaken, Switzerland, 2004: 506-522.
  • 2Boneh D, Franklin M. Identity-based encryption from the weil pairing. Advances in Cryptology-Crypto, 2001, 2139 213-229.
  • 3Waters B R, Balfanz D, Durfee G, et al. Building an encrypted and searchable audit log//Proceedings of the Network and Distributed System Security Symposium 2004. San Diego, USA, 2004: 16-24.
  • 4Park D J, Kim K, Lee P J. Public key encryption with conjunctive field keyword search//Proceedings of the 5th International Workshop on Information Security Applications. Jeju Island, Korea, 2004: 73-86.
  • 5Abdalla M, Bellare M, Catalano D, et al. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Journal of Cryptology, 2008, 21 (3) : 350-391.
  • 6Boyen X, Waters B. Anonymous hierarchical identity-based encryption (without random oracles)//Proceedings of the CRYPTO 2006. Santa Barbara, USA, 2006:290-307.
  • 7Li J, Wang Q, Wang C, et al. Fuzzy keyword search over encrypted data in cloud computing//Proceedings of the 29th IEEE International Conference on Computer Communications. San Diego, USA, 2010: 1-5.
  • 8Cao N, Wang C, Li M, et al. Privacy-preserving multi- keyword ranked search over encrypted cloud data//Proceedings of the 30th IEEE International Conference on Computer Communications. Shanghai, China, 2011:829-837.
  • 9Goyal V, Pandey O, Sahai A, et al. Attribute-based encryp- tion for fine-grained access control of encrypted data//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York, USA, 2006:89 98.
  • 10Beimei A. Secure schemes for secret sharing and key distri- bution [Ph.D. dissertation]. Technion, Haifa, Israel: Israel Institute of Technology, 1996.

共引文献116

同被引文献15

引证文献4

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部