期刊文献+

无线体域网中公钥可搜索加密方案 被引量:3

Public Key Encryption with Keyword Search in Wireless Body Area Network
下载PDF
导出
摘要 无线体域网和云平台的结合使得数字化医疗和远程医疗成为可能,其隐私保护是十分重要的研究内容。针对无线体域网中加密数据的检索问题,提出使用可多关键词搜索的公钥加密算法,并通过让云服务商参与部分解密减轻移动设备的计算压力。用户可以在不泄露隐私的情况下对云端存储的加密数据进行搜索,且该方案适用于体域网设备运算能力不足的场景。从正确性、安全性和计算效率对方案进行分析。 The combination of wireless body area network(WBAN) and cloud computing makes digital health and remote treatment possible. Privacy protection is a major concern. Proposes to use a public key encryption with conjunctive keyword search scheme, which reduces the computational overhead of WBAN devices by enabling service provider to participate in partial decipherment. This scheme protects user data privacy during the search process, and it is suitable for the WBAN device. Analyzes the scheme in correctness, security and efficiency.
作者 张嘉懿
出处 《现代计算机(中旬刊)》 2017年第2期14-17,共4页 Modern Computer
关键词 无线体域网 公钥可搜索加密 隐私保护 云计算 WBAN PEKS Privacy Protection Cloud Computing
  • 相关文献

参考文献1

二级参考文献41

  • 1ARMBRUST M, FOX A, GRIFFITH R. Above the clouds: a berkeley view of cloud computing[EB/OL], http://www.eecs.berkeley.edu/Pubs/ TechRpts/2009/EEC S-2009-28.html, 2009. 被引量:1
  • 2BUGIEL S, NLrRNBERGER S, SADEGHI A. Twin clouds: an archi- tecture for secure cloud computing[A]. Workshop on Cryptography and Security in Clouds[C]. Zurich, Switzerland, 2011.1-11. 被引量:1
  • 3KAMARA S, LAUTER K. Cryptographic cloud storage[J]. Financial Cryptography and Data Security, 2010,6054:136-149. 被引量:1
  • 4LI J, KROHN M, MAZI D. Secure untrusted data repository (SUNDR)[A]. Proceedings of the 6th Symposium on Operating Sys- tems Design and Implementation[C]. San Francisco, CA, USA, 2004. 91-106. 被引量:1
  • 5GOH E J. Secure indexes[A]. Proceedings of the 2004 Workshop on Information Security Applications[C]. Jeju Island, Korea, 2004.73-86. 被引量:1
  • 6SONG D X, WAGNER D, PERRIG A. Practical techniques or searches on encrypted data[A]. Proceedings of the IEEE Symposium on Security and Privacy[C].CA,USA,2000.36-49. 被引量:1
  • 7BONEH D, CRESCENZO G D, OSTROVSKY R. Public key encryp- tion with keyword search[A]. Proc of EUROCRYP'04[C]. Interlaken, Switzerland, 2004.506-522.7. 被引量:1
  • 8PAILLIER P. Public-key cryptosystems based on composite degree residu- osity clmmes[A]. Proceedings of the International Conference on the Theory and Applications of Cryptograhic Techniques (EUROCRYPT'99)[C]. Prague, Czech Republic, 1999.223-238. 被引量:1
  • 9BETHENCOURT J, SONG D, WATERS B. New constructions and practical applications for private stream searching (extended ab- stract)[A]. Proceedings of the IEEE Symposium on Security and Pri- vacy (SP'06)[C]. Oakland, California, USA, 2006. 134-139. 被引量:1
  • 10BETHENCOURT J, SONG D, WATERS B. New techniques for private stream searching[J]. ACM Transactions on Information and System Security, 2009, 12(3): 1-32. 被引量:1

共引文献14

同被引文献25

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部