一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問(wèn)題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

支持屬性撤銷的可驗(yàn)證多關(guān)鍵詞搜索加密方案

孫瑾 王小靜 王尚平 任利利

孫瑾, 王小靜, 王尚平, 任利利. 支持屬性撤銷的可驗(yàn)證多關(guān)鍵詞搜索加密方案[J]. 電子與信息學(xué)報(bào), 2019, 41(1): 53-60. doi: 10.11999/JEIT180237
引用本文: 孫瑾, 王小靜, 王尚平, 任利利. 支持屬性撤銷的可驗(yàn)證多關(guān)鍵詞搜索加密方案[J]. 電子與信息學(xué)報(bào), 2019, 41(1): 53-60. doi: 10.11999/JEIT180237
Jin SUN, Xiaojing WANG, Shangping WANG, Lili REN. Verifiable Multi-keyword Search Encryption Scheme with Attribute Revocation[J]. Journal of Electronics & Information Technology, 2019, 41(1): 53-60. doi: 10.11999/JEIT180237
Citation: Jin SUN, Xiaojing WANG, Shangping WANG, Lili REN. Verifiable Multi-keyword Search Encryption Scheme with Attribute Revocation[J]. Journal of Electronics & Information Technology, 2019, 41(1): 53-60. doi: 10.11999/JEIT180237

支持屬性撤銷的可驗(yàn)證多關(guān)鍵詞搜索加密方案

doi: 10.11999/JEIT180237 cstr: 32379.14.JEIT180237
基金項(xiàng)目: 國(guó)家自然科學(xué)青年基金(61303223),國(guó)家自然科學(xué)基金(61572019)
詳細(xì)信息
    作者簡(jiǎn)介:

    孫瑾:女,1977年生,博士,副教授,碩士生導(dǎo)師,研究方向?yàn)槊艽a理論與網(wǎng)絡(luò)安全

    王小靜:女,1992年生,碩士,研究方向?yàn)槊艽a理論與網(wǎng)絡(luò)安全

    王尚平:男,1963年生,博士,教授,博士生導(dǎo)師,研究方向?yàn)槊艽a理論與網(wǎng)絡(luò)安全

    任利利:女,1994年生,碩士,研究方向?yàn)槊艽a理論與網(wǎng)絡(luò)安全

    通訊作者:

    王小靜 wxjdyb@163.com

  • 中圖分類號(hào): TN918.1

Verifiable Multi-keyword Search Encryption Scheme with Attribute Revocation

Funds: The National Natural Science Youth Foundation of China (61303223), The National Natural Science Foundation of China (61572019)
  • 摘要:

    近年來(lái),可搜索加密技術(shù)及細(xì)粒度訪問(wèn)控制的屬性加密在云存儲(chǔ)環(huán)境下得到廣泛應(yīng)用??紤]到現(xiàn)存的基于屬性的可搜索加密方案存在僅支持單關(guān)鍵詞搜索而不支持屬性撤銷的問(wèn)題,以及單關(guān)鍵詞搜索可能造成返回搜索結(jié)果部分錯(cuò)誤并導(dǎo)致計(jì)算和寬帶資源浪費(fèi)的缺陷,該文提出一種支持屬性撤銷的可驗(yàn)證多關(guān)鍵詞搜索加密方案。該方案允許用戶檢測(cè)云服務(wù)器搜索結(jié)果的正確性,同時(shí)在細(xì)粒度訪問(wèn)控制結(jié)構(gòu)中支持用戶屬性的撤銷,且在屬性撤銷過(guò)程中不需要更新密鑰和重加密密文。該文在隨機(jī)預(yù)言機(jī)模型下基于判定性線性假設(shè)被證明具有抵抗選擇關(guān)鍵詞集攻擊安全性及關(guān)鍵詞隱私性,同時(shí)從理論和實(shí)驗(yàn)兩方面分析驗(yàn)證了該方案具有較高的計(jì)算效率與存儲(chǔ)效率。

  • 圖  1  系統(tǒng)模型

    圖  2  存儲(chǔ)代價(jià)與仿真時(shí)間對(duì)比

    表  1  功能比較

    方案多關(guān)鍵詞
    搜索
    屬性撤銷密鑰和密文
    不需更新
    結(jié)果可驗(yàn)證
    文獻(xiàn)[6]××××
    文獻(xiàn)[9]××××
    文獻(xiàn)[10]×××
    文獻(xiàn)[12]×××
    文獻(xiàn)[13]×××
    本文方案
    下載: 導(dǎo)出CSV

    表  2  存儲(chǔ)代價(jià)比較

    方案系統(tǒng)建立算法密鑰生成算法加密算法陷門生成算法
    文獻(xiàn)[6]$\left(4 + \sum\limits_{i = 1}^N {{n_i}} \right)|G| + \left(2 + \sum\limits_{i = 1}^N {{n_i}} \right)|{Z_p}|$$(2N + 2)|G|$$(2N + 2)|G|$$(2N + 1)|G| + |{Z_p}|$
    文獻(xiàn)[9]$9|G| + 5|{Z_p}|$$|G| + |{Z_p}|$$(5m + 2)|G|$$(6l + 2)|G| + |M|$
    文獻(xiàn)[12]$(3N + 2)|G| + (3N + 1)|{Z_p}|$$(2N + 1)|G| + |{Z_p}|$$(N + 2)|G|$$(2N + 1)|G| + |{Z_p}|$
    本文方案$7|G| + (|S| + 3)|{Z_p}|$$(2|S| + 2)|G| + |{Z_p}|$$(|S| + m + 2)|G|$$(|S| + 4)|G|$
    下載: 導(dǎo)出CSV

    表  3  計(jì)算代價(jià)比較

    方案系統(tǒng)建立算法密鑰生成算法加密算法陷門生成算法搜索算法驗(yàn)證算法
    文獻(xiàn)[6]$\left(2 + \sum\limits_{i = 1}^N {{n_i}} \right)E$$(2N + 2)E$$(2N + 2)E$$(2N + 1)E$$E + (2N + 1)P$
    文獻(xiàn)[9]$5E$$E$$(6m + 3)E$$(15l + 3)E$$(l + 1)E + (6l + 1)P$
    文獻(xiàn)[12]$\left(3N + 1\right)E + P$$(2N + 3)E$$(N + 2)E$$(2N + 1)E$$E + (N + 1)P$
    本文方案$3E$$(2|S| + 2)E$$(|S| + 3)E$$(2|S| + 3)E$$E + 3P$$(\varphi + 1)E + 2P$
    下載: 導(dǎo)出CSV
  • SONG D X, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. 2000 IEEE Symposium on Security and Privacy, Berkeley, USA, 2008: 44–55. doi: 10.1109/SECPRI.2000.848445.
    BONEH D, CRESCENZO G D, OSTROVSKY R, et al. Public key encryption with keyword search[C]. International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2004: 506–522. doi: 10.1007/978-3-540-24676-3_30.
    CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: Improved definitions and efficient constructions[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006: 79–88. doi: 10.1145/1180405.1180417.
    李雙, 徐智茂. 基于屬性的可搜索加密方案[J]. 計(jì)算機(jī)學(xué)報(bào), 2014, 37(5): 1018–1024. doi: 10.3724/SP.J.1016.2014.01017

    LI Shuang and XU Zhimao. Attribute-based public encryption with keyword search[J]. Chinese Journal of Computers, 2014, 37(5): 1018–1024. doi: 10.3724/SP.J.1016.2014.01017
    YANG Yang and MA Maode. Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for E-Health clouds[J]. IEEE Transactions on Information Forensics and Security, 2017, 11(4): 746–759. doi: 10.1109/TIFS.2015.2509912
    QIU Shuo, LIU Jiqiang, SHI Yanfeng, et al. Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack[J]. Science China (Information Sciences) , 2017, 60(5): 1–12. doi: 10.1007/s11432-015-5449-9
    MIAO Yinbin, MA Jianfeng, WEI Fushan, et al. VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel[J]. Peer-to-Peer Networking and Applications, 2017, 10(4): 995–1007. doi: 10.1007/s12083-016-0458-z
    MIAO Yinbin, MA Jianfeng, JIANG Qi, et al. Verifiable keyword search over encrypted cloud data in smart city[J]. Computers and Electrical Engineering, 2017, 65(1): 90–101. doi: 10.1016/j.compeleceng.2017.06.021
    CUI Hui, WAN Zhiguo, DENG R H, et al. Efficient and expressive keyword search over encrypted data in the cloud[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 15(3): 409–422. doi: 10.1109/TDSC.2016.2599883
    LI Runhe, ZHENG Dong, ZHANG Yinghui, et al. Attribute-based encryption with multi-keyword search[C]. IEEE Second International Conference on Data Science in Cyberspace, Shenzhen, China, 2017: 172–177. doi: 10.1109/DSC.2017.97.
    王尚平, 余小娟, 張亞玲. 具有兩個(gè)可撤銷屬性列表的密鑰策略的屬性加密方案[J]. 電子與信息學(xué)報(bào), 2016, 38(6): 1406–1411. doi: 10.11999/JEIT150845

    WANG Shangping, YU Xiaojuan, and ZHANG Yaling. Revocable key-policy attribute-based encryption scheme with two revocation lists[J]. Journal of Electronics &Information Technology, 2016, 38(6): 1406–1411. doi: 10.11999/JEIT150845
    SUN Wenhai, YU Shucheng, LOU Wenjing, et al. Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(4): 1187–1198. doi: 10.1109/TPDS.2014.2355202
    陳燕俐, 楊華山. 可支持屬性撤銷的基于CP-ABE可搜索加密方案[J]. 重慶郵電大學(xué)學(xué)報(bào)(自然科學(xué)版), 2016, 28(4): 545–554. doi: 10.3979/j.issn.1673-825X.2016.04.016

    CHEN Yanli and YANG Huashan. CP-ABE based searchable encryption with attribute revocation[J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2016, 28(4): 545–554. doi: 10.3979/j.issn.1673-825X.2016.04.016
    GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006: 89–98. doi: 10.1145/1180405.1180418.
    ZHENG Qingji, XU Shouhuai, and ATENIESE G. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data[C]. IEEE INFOCOM, Toronto, Canada, 2014: 522–530. doi: 10.1109/INFOCOM.2014.6847976.
  • 加載中
圖(2) / 表(3)
計(jì)量
  • 文章訪問(wèn)數(shù):  2027
  • HTML全文瀏覽量:  774
  • PDF下載量:  87
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2018-03-14
  • 修回日期:  2018-08-21
  • 網(wǎng)絡(luò)出版日期:  2018-08-31
  • 刊出日期:  2019-01-01

目錄

    /

    返回文章
    返回