期刊文献+

文件分层-属性基多关键字可搜索加密方案 被引量:1

File Hierarchy Attribute-based Multi-keyword Searchable Encryption Scheme
下载PDF
导出
摘要 针对目前的文件分层的基于属性可搜索加密方案存在不支持LSSS访问结构以及多关键字密文较长等问题,提出了一个云环境下灵活高效、支持LSSS访问结构和文件分层的多关键字可搜索方案。首先通过将秘密值分配的方法,将下层的秘密值直接嵌入上层的密文中,不仅缩短了分层加密文件的密文长度,还提高了加密、解密效率;其次通过对多关键字构造索引向量的方式,解决了目前多关键可搜索方案中关键字密文长度随关键字个数线性增加的问题,实现了关键字密文长度固定的多关键字搜索,并采用先关键字搜索,再解密的方式进一步提高了关键字的搜索效率。最后通过将部分解密工作转移到云端,从而降低了用户的计算负担。基于q-parallel BDHE假设下证明了该方案可抵抗选择明文安全攻击(CPA),理论分析和实验结果证明了方案的有效性。 In view of the problems of the current file hierarchy attribute based searchable encryption scheme which does not support LSSS access structure and has long keyword ciphertext,a multi keyword searchable scheme supporting LSSS access structure and file hierarchy in cloud environment is proposed.Firstly,the secret value of the lower layer is directly embedded into the upper layer ciphertext by means of secret sharing,which not only shortens the length of the ciphertext,but also improves the encryption and decryption efficiency of the hierarchical encrypted files.Secondly,by constructing index vector of multi-keywords,it solves the problem that the ciphertext length of keywords in multi-keyword searchable scheme increases linearly with the number of keywords,realizes the fixed ciphertext length of keywords,and keyword search first and then decryption is adopted to further improve the efficiency of keyword search.Finally,by transferring part of the decryption work to the cloud,the computing burden of users is reduced.Based on the assumption of q-parallel BDHE,it is proved that this scheme can resist chosen plaintext attacks(CPA).Theoretical analysis and experimental results show the effectiveness of the scheme.
作者 蒋英 陈燕俐 高诗尧 JIANG Ying;CHEN Yan-li;GAO Shi-yao(School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210003,China)
出处 《计算机技术与发展》 2021年第10期98-104,共7页 Computer Technology and Development
基金 国家自然科学基金资助项目(61572263,61272084)。
关键词 属性加密 云计算 分层结构 多关键字可搜索 访问结构 attribute based encryption could computing hierarchy structure multi-keyword searchable access structure
  • 相关文献

参考文献3

二级参考文献27

  • 1WAGNER S D, PERRIG A. Practical Techniques for Searches on Encrypted Data [C].Proceeding of the 2000 IEEE symposium on Security and Privacy. Berkeley, C A:IEEE Computer Society, 2000:44-55.
  • 2CHANG Y , MITZENMACHER M. Privacy preservingkeyword searches on remote encrypted data [C].Proceedingof the third International Conference on AppliedCryptography and Network Security, AC NS 2005. NewYork, USA: Springer Verlag, 2005: 442-455.
  • 3LI J, WANG Q, WANG C, et al. Fuzzy keyword searchover encrypted data in cloud computing [C].Proceedingof the 2010 INFO-COM IEEE conference on computercommunication. San Diego, C A: IEEE Computer Society,2010:l-5.
  • 4CURTMOLA R, GARAY J, KAMARA S, et al. Searchablesymmetric encryption: Improved definitions and efficientconstructions[C].Proceeding of ACM Conferenceon Computer and Communications Security. New Y ork:ACM, 2006:79-88.
  • 5BONEH D , FRANKLIN M. Identity-Based encryptionfrom the Weil pairing [C].Proceeding of 21st Annual InternationalCryptology Conference, CRYPTO 2001. SantaBarbara, C A: Springer Verlag,2001 :213-229.
  • 6BONEH D, CRESCENZO G, OSTROVSKY R, et al.Public key encryption with keyword search[C].Proceedingof 23rd International Conference on the Theory andApplications of Cryptographic Techniques, Eurocrypt. Interlaken, Switzerland: Springer Verlag, 2004:506-522.
  • 7GOLLE P, STADDON J, WATERS B. Secure conjunctivekeyword search over encrypted data [C].Proceedingof 2nd International Conference on Applied Cryptographyand Network Security, ACNS 2004. Yellow Mountain,China : Springer Verlag, 2004 : 31 -45.
  • 8KHADER D. Public key encryption with keyword searchbased on K-resilient IBE [C].Proceeding of ICCSA2006 : International Conference on Computational Scienceand Its Applications. Glasgows United kingdom: SpringerVerlag, 2006:298-308.
  • 9ABDALLA M , BELLARE M , CATALANO D, et al.Searchable encryption revisited: Consistency properties,relation to anonymous IBE , and extensions [J].SpringerNew York LLC , 2008:21(3) :350-391.
  • 10XU P, JIN H. Public-Key encryption with fuzzy keywordsearch:A provably secure scheme under keyword guessingattack[J].IEEE Computer Society,2013,62(11) :2266-2277.

共引文献15

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部