期刊文献+

多服务器可验证的属性基多关键字排序检索方案 被引量:2

Multi-Server Verifiable Attribute-Based Multi-Keyword Sorting Retrieval Scheme
下载PDF
导出
摘要 针对现有可搜索加密方案搜索行为不可控、搜索结果不可信以及搜索语义单一的问题,提出一种多服务器模式下可验证的属性基多关键字排序检索方案。构造多维B+树作为索引存储结构将索引和密文分开存储,并在检索时使用提前剪枝策略去除相关性较低的子树,实现快速多关键字排序查找。运用属性基加密技术实现搜索行为的授权,通过授权的验证服务器对检索结果进行验证,保证检索结果的正确性。安全性及效率分析结果表明,基于DL假设和q-BDHE假设,该方案在随机预言模型下可抵抗选择明文攻击和抗关键字猜测攻击,并且能够减小计算开销。 To solve the problems of uncontrollable search behavior,untrusted search results and unitary search semantics of existing searchable encryption schemes,this paper proposes a verifiable attribute-based multi-keyword sorting retrieval scheme under multi-server mode.In this scheme,the multi-dimensional B+tree is constructed as the index storage structure to store the index and ciphertext separately.The subtrees of low relevance is clipped by using the pruning strategy in advance,so as to realize fast multi-keyword sorting search.The attribute-based encryption technology is used to authorize the search behavior,and the retrieval results are verified by the authorized verification server to ensure the correctness of the retrieval results.The analysis results of security and efficiency show that,based on the DL assumption and q-BDHE assumption,under the random prediction model,the scheme can resist choice plaintext attacks and keyword guessing attacks,and can effectively reduce the computational cost.
作者 曹素珍 杜霞玲 王友琛 刘雪艳 CAO Suzhen;DU Xialing;WANG Youchen;LIU Xueyan(College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China;College of Mathematics and Statistics,Northwest Normal University,Lanzhou 730070,China)
出处 《计算机工程》 CAS CSCD 北大核心 2020年第3期120-128,共9页 Computer Engineering
基金 国家自然科学基金(61562077,61662071,61662069) 西北师范大学青年教师科研能力提升计划(NWNU-LKQN-14-7)。
关键词 猜测攻击 multi-server mode verifiability attribute-based encryption multi-keyword sorting keyword guessing attack
  • 相关文献

参考文献9

二级参考文献82

  • 1杨旸,林柏钢,马懋德.具有细粒度访问控制的隐藏关键词可搜索加密方案[J].通信学报,2013,34(S1):92-100. 被引量:5
  • 2王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 3张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 4林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 5Boneh D, Crescenzo G D, Ostrovsky R, Persiano G. Public key encryption with keyword searcb//Proceedings of the EUROCRYPT'04. Interlaken, Switzerland, 2004: 506-522.
  • 6Boneh D, Franklin M. Identity-based encryption from the weil pairing. Advances in Cryptology-Crypto, 2001, 2139 213-229.
  • 7Waters B R, Balfanz D, Durfee G, et al. Building an encrypted and searchable audit log//Proceedings of the Network and Distributed System Security Symposium 2004. San Diego, USA, 2004: 16-24.
  • 8Park D J, Kim K, Lee P J. Public key encryption with conjunctive field keyword search//Proceedings of the 5th International Workshop on Information Security Applications. Jeju Island, Korea, 2004: 73-86.
  • 9Abdalla M, Bellare M, Catalano D, et al. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Journal of Cryptology, 2008, 21 (3) : 350-391.
  • 10Boyen X, Waters B. Anonymous hierarchical identity-based encryption (without random oracles)//Proceedings of the CRYPTO 2006. Santa Barbara, USA, 2006:290-307.

共引文献270

同被引文献30

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部