期刊文献+

基于可更新加密的保护搜索模式的动态可搜索加密方案

Dynamic Searchable Symmetric Encryption Based on Protected Search Mode of Updatable Encryption
下载PDF
导出
摘要 动态可搜索对称加密(Dynamic Searchable Symmetric Encryption,DSSE)技术作为静态可搜索加密技术的拓展,因解决了数据密态场景下的安全检索问题并支持数据动态更新而备受关注。众所周知,目前大多数DSSE方案会泄露一些额外的信息以寻求更好的效率,如搜索模式与访问模式。最近的研究表明,这些泄露的信息面临着严重的安全问题,拥有数据库背景知识的敌手可能利用这些泄露信息恢复查询或重构数据库。由于这些泄露是伴随着查询的过程泄露出来的,因此不少学者提出在搜索时更新加密数据库来降低上述潜在的风险,即用户下载搜索到的密文数据到本地,解密后重新加密再上传到云服务器端。但这种方法会导致巨大的客户端通信、存储和计算开销。针对这一问题,提出了一种基于可更新加密的保护搜索模式的DSSE方案,该方案可以在不泄露数据隐私的情况下直接在服务器端进行数据更新,从而降低传统更新方法的通信开销以及客户端的计算开销。安全性分析表明,所提方案能有效保护搜索模式泄露;性能分析表明,所提方案相比传统利用更新密文方法保护搜索模式的方案能有效降低通信开销。在关键词匹配100个文档的情况下,与下载到本地重加密重传方式相比,所提方案的通信开销降低了70.92%。 Dynamic searchable symmetric encryption(DSSE)technology,as an extension of static searchable encryption,has attracted much attention because it solves the problem of secure retrieval over encrypted data and supports data dynamicity.For practicality concerns,most current DSSE schemes leak extra information(e.g.,search patterns and access patterns)to fast search.Recent studies show that this leaked information poses serious security problems,the adversary with background know-ledge of the database may exploit the leaked information to recover the query or reconstruct the database.Since this information reveals along with the query process,scholars propose to refresh the encrypted database after the query to reduce the above potential risks.However,this approach leads to huge client-side communication,storage,and computation overheads.Because the client needs to download the results locally,decrypt them,re-encrypt them and finally upload them to the cloud.To address this problem,this paper proposes a new updatable DSSE scheme that hides all the above information including access pattern,search pattern.The scheme can update data directly at the server side without disclosing data privacy,thus reducing the communication overhead of traditional update methods of the client side.The security analysis shows that this scheme can hide the search pattern effectively.In addition,the communication cost of the proposed scheme is also significantly degraded when compared with the traditional scheme that executes ciphertext refreshing by the client.For example,in the case of keywords matching 100 documents,compared with downloading to local re-encryption and retransmission,the communication overhead of this scheme is reduced by 70.92%.
作者 徐承志 徐磊 许春根 XU Chengzhi;XU Lei;XU Chungen(School of Computer Science and Technology,Nanjing University of Science and Technology,Nanjing 210094,China;School of Mathematics and Statistics,Nanjing University of Science and Technology,Nanjing 210094,China)
出处 《计算机科学》 CSCD 北大核心 2024年第3期340-350,共11页 Computer Science
基金 国家自然科学基金(62202228,62072240) 江苏省自然科学基金(BK20210330)。
关键词 动态可搜索加密 可更新加密 前向安全 搜索模式 Dynamic searchable encryption Updatable encryption Forward secure Search pattern
  • 相关文献

参考文献4

二级参考文献22

  • 1WATERS B.Dual system encryption:realizing fully secure IBE and HIBE under simple assumptions. Advances in Cryptology-CRYPTO 2009 . 2009
  • 2Boneh D,Di Crescenzo G,Ostrovsky R,et al.Public key encryption with keyword search. Advances in Cryptology-Eurocrypt 2004 . 2004
  • 3Katz J,Sahai A,Waters B.Predicate encryption supporting disjunctions,polynomial equations,and inner products. Advances in Cryptology-EUROCRYPT 2008 . 2008
  • 4Reza Curtmola,Juan Garay,SenyKamara,Rafail Ostrovsky.Searchablesymmetric encryption: Improved defnitions and effcient constructions. CCS . 2006
  • 5Brent R Waters,Dirk Balfanz,Glenn Durfee,et al.Building an encrypted and searchable audit log. The 11th annual Network and Distributed system Security Symposium(NDS 2004) . 2004
  • 6Lewko A,Okamoto T,Sahai A,et al.Fully secure functional encryption:Attribute-based encryption and (hierarchical) inner product encryption. 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques . 2010
  • 7LEWKO A,WATER B.New techniques for dual system encryption:and fully secure HIBE with short ciphertexts. Theory of Cryptography . 2010
  • 8Groth J,Sahai A.Efficient non-interactive proof systems for bilinear groups. The 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques’’08 . 2008
  • 9Golle,P.,Staddon,J.,Waters,B.R.,Jakobsson,M.,Yung,M.,Zhou,J.Secure conjunctive keyword search over encrypted data. ACNS 04: 2nd International Conference on Applied Cryptography and Network Security . 2004
  • 10Chunxiang Gu,Yuefei Zhu,Heng Pan.Efficient public key encryption with keyword searchschemes from pairings. Information Security andCryptology . 2008

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部