期刊文献+

云存储中基于属性的关键词搜索加密方案研究 被引量:3

Research on attribute-based encryption with keyword search for cloud storage
下载PDF
导出
摘要 为保证云端敏感数据安全性的同时提高数据共享效率,提出了一种安全、灵活、高效的基于属性的关键词搜索加密方案。方案中设计了一种需要数据拥有者私钥参与的索引生成机制抵抗关键词猜测攻击,基于线性秘密共享访问结构描述用户的搜索权限,支持一对多应用场景,借鉴连接子集关键词搜索技术和在线/离线思想提高搜索的灵活性和效率。理论分析与实验评估结果表明,该方案具有较高的效率。 To safeguard the sensitive data stored on the cloud and promote the efficiency of data sharing simulta- neously, a secure flexible and efficient attribute-based encryption scheme with keyword search is proposed, which designs an index generation mechanism that requires the private key of data owner to resist the keyword guessing attack, supports one-to-many application scenarios based on the linear secret shared access structure, introduces the conjunctive subset keyword search technique and online/offline technique to improve search flexibility and efficien- cy. Theoretical analysis and experimental evaluation show that the proposed scheme enjoys high efficiency.
出处 《网络与信息安全学报》 2017年第11期1-11,共11页 Chinese Journal of Network and Information Security
基金 国家重点研发计划基金资助项目(No.2016YFB0501900)~~
关键词 可搜索加密 关键词猜测攻击 连接关键词 在线 离线 searchable encryption, keyword guessing attack, conjunctive keyword, online/offline
  • 相关文献

参考文献5

二级参考文献93

  • 1Song XD,Wagner D,Perrig A.Practical techniques for searches on encrypted data.In:Proc.of the IEEE Symp.on Security and Privacy.IEEE Press,2000.44-55.[doi:10.1109/SECPRI.2000.84B445]. 被引量:1
  • 2Boneh D,Di Crescenzo G,Ostrovsky R,Persiano G.Public key encryption with keyword search.In:Camenisch LJ,Cachin C,eds.Proc.of the Advances in Cryptology-EUROCRYPT 2004.LNCS 3027,Berlin:Springer-Verlag,2004.506-522.[doi:10.1007/978-3-540-24676-3J0]. 被引量:1
  • 3Feng DG,Zhang M,Zhang Y,Xu Z.Study on cloud computing security.Ruan Jian Xue Bao/Joumal of Softwase,2011,22(1):71-83(in Chinese with English abstract).http://www.jos.org.cn/1000-9B25/3958.htxn[doi:10.3724/SP.J.1001.2011.03958]. 被引量:1
  • 4Goh E.Secure indexes.Technical Report,20037216,IACR ePrint Cryptography Archive,2003.http://eprinUacr.org/2003/216. 被引量:1
  • 5Chang Y,Mitzenmacher M.Privacy preserving keyword searches on remote encrypted data.In:Ioannidis J,Keromytis A,Yung M,eds.Proc.of the Applied Cryptography and Network Security.LNCS 3531,Berlin:Springer-Verlag,2004.391-421.[doi:10.1007/11496137一30]. 被引量:1
  • 6Curtmola R,Garay J,Kamara S,Ostrovsky R.Searchable symmetric encryption:Improved definitions and efficient constructions.In:Proc.of the 13th ACM Conf.on Computer and Communications Security (CCS 2006).New York:ACM Press,2006.79-88. 被引量:1
  • 7Van Liesdonk P,Sedghi S,Doumen J,Hartel P,Jonker W.Computationally efficient searchable symmetric encryption.In:Jonker W,Petkovic M,eds.Proc.of the Secure Data Management.LNCS 6358,Berlin;Springer-Verlag,2010,87-100.[doi:10.1007/978-3-642-15546-8-7]. 被引量:1
  • 8Kamara S,Papamanthou C,Roeder T.Dynamic searchable symmetric encryption.In:Proc.of the 19th ACM Conf.on Computer and Communications Security (CCS 2012).New York:ACM Press,2012.965-976.[doi;10.1145/2382196.2382298]. 被引量:1
  • 9Kamara S,Papamanthou C.Parallel and dynamic searchable symmetric encryption.In:Sadeghi AR,ed.Proc.of the Financial Cryptography and Data Security.LNCS 7859,Berlin:Springer-Verlag,2013.258-274.[doi:10.1007/978-3-642-39884-122]. 被引量:1
  • 10Golle P,Staddon J,Waters B.Secure conjunctive keyword search over encrypted data.In:Jakobsson Mj Yung M,Zhou J,eds.Proc.of the Applied Cryptography and Network Security.LNCS 3089,Berlin:Springer-Verlag,2004.31-45.[doi:10.1007/978-3-540-24852-1一3]. 被引量:1

共引文献119

同被引文献11

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部