期刊文献+

一种基于对称加密的范围数据查询算法 被引量:5

Querying encrypted range data based on symmetric encryption
下载PDF
导出
摘要 为了弥补保序加密算法的隐私泄漏问题,结合对称可搜索加密技术基本思想,提出一种新型的具有隐私保护功能的范围数据加密查询算法。在该算法中,将数字范围转换为特殊关键字并放入布隆过滤器进行存储与命中判定,其中密文信息仅与值域相关,与具体数据无关,从而保证了语义安全性。实验结果表明,该算法计算负载仅为线性增长。综合而言,该算法具有更高的安全性与良好的运行效率。 To make up the information leakage of the order preserving encryption ( OPE ), based on the core concept of searchable encryption, this paper proposed a novel privacy preserving range query algorithm. In the algorithm, it transformed the queried range to a specific keyword which recorded in a bloom filter, and the querying became the searching for a match. The information of the ciphertext was only related to the domain, and therefore it guaranteed the semantic security. Experi- ments show that the algorithm is linear for the computational overhead. Overall, the algorithm is both secure and efficient.
出处 《计算机应用研究》 CSCD 北大核心 2014年第10期3087-3089,共3页 Application Research of Computers
基金 四川省2012年科技计划资助项目(2012GZ0088 2012FZ0064)
关键词 范围数据加密 加密查询 保序加密 可搜索加密 range data encryption encrypted query order preserving encryption(OPE) searchable encryption
  • 相关文献

参考文献9

  • 1AGRAWAL R, KIERAN J, SRIKANT R, et al.Order preserving encryption for numeric data[C]//Proc of ACM SIGMOD International Conference on Management of Data.New York:ACM Press,2004:563-574. 被引量:1
  • 2BOLDYREVA A, CHENETTE N, LEE Y, et al.Order-preserving symmetric encryption[C]//Advances in Cryptology.Berlin:Springer,2009:224-241. 被引量:1
  • 3BOLDYREVA A, CHENETTE N, ONEILL A.Order-preserving encryption revisited:improved security analysis and alternative solutions[C]//Advances in Cryptology.Berlin:Springer,2011:578-595. 被引量:1
  • 4BONETH D, CRESCENZO G D, OSTROVSKEY R, et al.Public key encryption with keyword search[C]//Proc of International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,2004:506-522. 被引量:1
  • 5BONEH D, WATERS B.Conjunctive, subset, and range queries on encrypted data[C]//Proc of the 4th Theory of Cryptography Confe-rence.Berlin:Springer,2007:535-554. 被引量:1
  • 6SHI E, BETHENCOURT J, CHAN T H H, et al.Multi-dimensional range query over encrypted data[C]//Proc of IEEE Symposium on Security and Privacy.Washington DC:IEEE Computer Society,2007:350-364. 被引量:1
  • 7ABDALLA M, BELLARE M, CATALANA D, et al.Searchable encryption revisited:consistency properties, relation to anonymous IBE, and extensions[C]//Proc of the 25th Annual International Cryptology Conference.Berlin:Springer,2006:205-222. 被引量:1
  • 8CURTMOLA R, GARAY J, KAMARA S, et al.Searchable symmetric encryption:improved definitions and efficient constructions[C]//Proc of the 13th ACM Conference on Computer and Communications Security.New York:ACM Press,2006:79-88. 被引量:1
  • 9BLOOM B H.Space/time trade-offs in hash coding with allowable errors[J].Communications of the ACM,1970,13(7):422-426. 被引量:1

同被引文献48

引证文献5

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部