期刊文献+

区块链上支持多关键字检索的可搜索加密方案 被引量:4

A searchable encryption scheme supporting multi-keyword retrieval on blockchain
下载PDF
导出
摘要 在基于云存储的单关键字可搜索加密中,云服务器不是完全可信的,且现有的单关键字检索不能精确地返回搜索结果。基于此,结合区块链技术提出了区块链上的多关键字可搜索加密方案。该方案采用对称加密算法提高了加密效率;利用区块链技术解决了云服务器不诚实搜索的问题;采用多关键字的索引结构提高了搜索结果的精确性。在随机预言模型下,证明了该方案在选择关键字攻击下是不可区分IND-CKA安全的,通过效率分析表明该方案具有更高的效率。 In cloud-based single-keyword searchable encryption schemes,cloud servers are not completely trusted,and the existing single-keyword retrieval cannot accurately return search results.Therefore,a multi-keyword searchable encryption scheme is constructed by using blockchain technology.Our scheme uses the symmetrical encryption algorithm to improve the encryption efficiency,takes advantage of blockchain technology to solve the problem of dishonest search in cloud server,and also improves the accuracy of search results based on multi-keyword index structure.The scheme is proved secure against indistinguishably chosen keyword attack(IND-CKA)under the random oracle model.Furthermore,the performance analysis shows that our proposals are secure and efficient.
作者 牛淑芬 王金风 王伯彬 陈敬民 杜小妮 NIU Shu-fen;WANG Jin-feng;WANG Bo-bin;CHEN Jing-min;DU Xiao-ni(School of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070;College of Mathematics and Statistics,Northwest Normal University,Lanzhou 730070,China)
出处 《计算机工程与科学》 CSCD 北大核心 2020年第11期2005-2012,共8页 Computer Engineering & Science
基金 国家自然科学基金(61562077,61662071,61662069,61772022) 西北师范大学青年教师科研提升计划(NWNU-LKQN-14-7) 国家留学基金资助项目。
关键词 可搜索加密 云存储 区块链 分布式账本 searchable encryption cloud storage blockchain distributed ledgers
  • 相关文献

参考文献6

二级参考文献28

  • 1余敏,李战怀,张龙波.P2P数据管理[J].软件学报,2006,17(8):1717-1730. 被引量:17
  • 2SONG D, WAGNER D, PERRIG A. Practical techniques for searcheson encrypted data[C]//The IEEE Symposium on Security and Pri-vacy(S&P’00). c2000:44-55.
  • 3BONEH D, CRESCENZOM G D, OSTROVSKY R, et al. Public keyencryption with keywordsearch[C]//The International Conference onthe Theory and Applications of Cryptographic Techniques(EUROCRYPT2004). Interlaken, Switzerland, c2004:506-522.
  • 4LEE C C, HSU S T, H M S. A study of conjunctive keyword search-able schemes[J]. International Journal of Network Security, 2013,15(5):321-330.
  • 5GOLLE P, STADDON J, WATERS B. Secure conjunctive keywordsearch over encrypted data[C]//Applied Cryptography and Network Se-curity Conference (ACNS 2004). Yellow Mountain, China, c2004;31-45.
  • 6PARK D J, KIM K, LEE P J. Public key encryption with conjunc-tive-field keyword search[C]//The 5th Information Security Applica-tions International Workshop (WISA 2004).Jeju Island, Korea,c2004:73-86.
  • 7HWANG Y H, LEE P J. Public key encryption with conjunctive key-word search and its extension to a multi-user system[C]//丁he first In-ternational Conference of Pairing-BasedCryptography (Pairing 2007).Tokyo, Japan, c2007:2-22.
  • 8BONEH D, WATERS B. Conjunctive, subset, and range queries onencrypted data[C]//The 4th Theory of Cryptography conference (TCC2007). Amsterdam, The Netherlands, c2007: 535-554.
  • 9KATZ J, SAHAI A, WATERS B. Predicate encryption supportingdisjunctions, polynomial equations, and inner products[C]//The 27thAnnual International Conference on the Theory and Applications ofCryptographic Techniques (EUROCRYPT 2008). Istanbul, Turkey,c2008:146-162.
  • 10CHEN Y C, HORNG G. Timestamped conjunctive keyword searchablepublic key encryption[C]//Fourth International Conference on Innova-tion Computing Information and Control (IC1CIC). Kaohsiung,c2009:729-932.

共引文献842

同被引文献16

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部