期刊文献+

支持通配符和模糊搜索的加密方案

An encryption scheme supporting wildcard and fuzzy search
原文传递
导出
摘要 基于n-gram技术,提出了一个能够同时支持通配符和模糊搜索的加密方案。另外,利用布隆过滤器优化方案,减少了索引存储开销和搜索时间。安全性分析表明本文提出的方案是非适应性语义安全的,性能分析表明优化后的方案与已有方案相比在存储、通信及陷门生成方面都有更小的开销。 Based on n-gram technology,this paper proposes an encryption scheme that can support both wildcard and fuzzy search.In addition,using the Bloom filter optimization scheme,it reduces the index storage overhead and search time.The given security analysis shows that the scheme is non-adaptive semantic security.The performance analysis shows that the optimized scheme has less overhead in storage,communication and trapdoor generation than the previous schemes.
作者 赵博 秦静 刘晋璐 ZHAO Bo;QIN Jing;LIU Jinlu(School of Mathematics,Shandong University,Jinan 250100,Shandong,China;Chip and Security Department,Hua Kong Qing Jiao Information Technology Co.,Ltd.,Beijing 100093,China;State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China)
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2023年第9期28-38,共11页 Journal of Shandong University(Natural Science)
基金 国家自然科学基金资助项目(62072276,61772311)。
关键词 通配符搜索 模糊搜索 关键词特征 向量空间模型 布隆过滤器 wildcard search fuzzy search keyword feature vector space model Bloom filter
  • 相关文献

参考文献6

二级参考文献82

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1183

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部