期刊文献+

支持属性撤销的可验证多关键词搜索加密方案 被引量:11

Verifiable Multi-keyword Search Encryption Scheme with Attribute Revocation
下载PDF
导出
摘要 近年来,可搜索加密技术及细粒度访问控制的属性加密在云存储环境下得到广泛应用。考虑到现存的基于属性的可搜索加密方案存在仅支持单关键词搜索而不支持属性撤销的问题,以及单关键词搜索可能造成返回搜索结果部分错误并导致计算和宽带资源浪费的缺陷,该文提出一种支持属性撤销的可验证多关键词搜索加密方案。该方案允许用户检测云服务器搜索结果的正确性,同时在细粒度访问控制结构中支持用户属性的撤销,且在属性撤销过程中不需要更新密钥和重加密密文。该文在随机预言机模型下基于判定性线性假设被证明具有抵抗选择关键词集攻击安全性及关键词隐私性,同时从理论和实验两方面分析验证了该方案具有较高的计算效率与存储效率。 In recent years,searchable encryption technology and fine-grained access control attribute encryption is widely used in cloud storage environment.Considering that the existing searchable attribute-based encryption schemes have some flaws:It only support single-keyword search without attribute revocation.The single-keyword search may result in the waste of computing and broadband resources due to the partial retrieval from search results.A verifiable multi-keyword search encryption scheme that supports revocation of attributes is proposed.The scheme allows users to detect the correctness of cloud server search results while supporting the revocation of user attributes in a fine-grained access control structure without updating the key or re-encrypting the ciphertext during revocation stage.The aforementioned scheme is proved by the deterministic linearity hypothesis,and the relevant analysis results indicate that it can resist the attacks of keyword selection and the privacy of keywords in the random oracle model with high computational efficiency and storage effectiveness.
作者 孙瑾 王小静 王尚平 任利利 SUN Jin;WANG Xiaojing;WANG Shangping;REN Lili(Xi’an University of Technology,Xi’an 710054,China)
机构地区 西安理工大学
出处 《电子与信息学报》 EI CSCD 北大核心 2019年第1期53-60,共8页 Journal of Electronics & Information Technology
基金 国家自然科学青年基金(61303223) 国家自然科学基金(61572019)~~
关键词 可搜索加密 属性撤销 多关键词搜索 可证明安全 Searchable encryption Attribute revocation Multi-keyword search Provable security
  • 相关文献

参考文献4

二级参考文献46

  • 1Boneh D, Crescenzo G D, Ostrovsky R, Persiano G. Public key encryption with keyword searcb//Proceedings of the EUROCRYPT'04. Interlaken, Switzerland, 2004: 506-522.
  • 2Boneh D, Franklin M. Identity-based encryption from the weil pairing. Advances in Cryptology-Crypto, 2001, 2139 213-229.
  • 3Waters B R, Balfanz D, Durfee G, et al. Building an encrypted and searchable audit log//Proceedings of the Network and Distributed System Security Symposium 2004. San Diego, USA, 2004: 16-24.
  • 4Park D J, Kim K, Lee P J. Public key encryption with conjunctive field keyword search//Proceedings of the 5th International Workshop on Information Security Applications. Jeju Island, Korea, 2004: 73-86.
  • 5Abdalla M, Bellare M, Catalano D, et al. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Journal of Cryptology, 2008, 21 (3) : 350-391.
  • 6Boyen X, Waters B. Anonymous hierarchical identity-based encryption (without random oracles)//Proceedings of the CRYPTO 2006. Santa Barbara, USA, 2006:290-307.
  • 7Li J, Wang Q, Wang C, et al. Fuzzy keyword search over encrypted data in cloud computing//Proceedings of the 29th IEEE International Conference on Computer Communications. San Diego, USA, 2010: 1-5.
  • 8Cao N, Wang C, Li M, et al. Privacy-preserving multi- keyword ranked search over encrypted cloud data//Proceedings of the 30th IEEE International Conference on Computer Communications. Shanghai, China, 2011:829-837.
  • 9Goyal V, Pandey O, Sahai A, et al. Attribute-based encryp- tion for fine-grained access control of encrypted data//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York, USA, 2006:89 98.
  • 10Beimei A. Secure schemes for secret sharing and key distri- bution [Ph.D. dissertation]. Technion, Haifa, Israel: Israel Institute of Technology, 1996.

共引文献60

同被引文献63

引证文献11

二级引证文献65

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部