支持屬性撤銷的可驗(yàn)證多關(guān)鍵詞搜索加密方案
doi: 10.11999/JEIT180237 cstr: 32379.14.JEIT180237
-
西安理工大學(xué) ??西安 ??710054
Verifiable Multi-keyword Search Encryption Scheme with Attribute Revocation
-
Xi’an University of Technology, Xi’an 710054, China
-
摘要:
近年來(lái),可搜索加密技術(shù)及細(xì)粒度訪問(wèn)控制的屬性加密在云存儲(chǔ)環(huán)境下得到廣泛應(yīng)用??紤]到現(xiàn)存的基于屬性的可搜索加密方案存在僅支持單關(guān)鍵詞搜索而不支持屬性撤銷的問(wèn)題,以及單關(guān)鍵詞搜索可能造成返回搜索結(jié)果部分錯(cuò)誤并導(dǎo)致計(jì)算和寬帶資源浪費(fèi)的缺陷,該文提出一種支持屬性撤銷的可驗(yàn)證多關(guān)鍵詞搜索加密方案。該方案允許用戶檢測(cè)云服務(wù)器搜索結(jié)果的正確性,同時(shí)在細(xì)粒度訪問(wèn)控制結(jié)構(gòu)中支持用戶屬性的撤銷,且在屬性撤銷過(guò)程中不需要更新密鑰和重加密密文。該文在隨機(jī)預(yù)言機(jī)模型下基于判定性線性假設(shè)被證明具有抵抗選擇關(guān)鍵詞集攻擊安全性及關(guān)鍵詞隱私性,同時(shí)從理論和實(shí)驗(yàn)兩方面分析驗(yàn)證了該方案具有較高的計(jì)算效率與存儲(chǔ)效率。
-
關(guān)鍵詞:
- 可搜索加密 /
- 屬性撤銷 /
- 多關(guān)鍵詞搜索 /
- 可證明安全
Abstract:In recent years, searchable encryption technology and fine-grained access control attribute encryption is widely used in cloud storage environment. Considering that the existing searchable attribute-based encryption schemes have some flaws: It only support single-keyword search without attribute revocation. The single-keyword search may result in the waste of computing and broadband resources due to the partial retrieval from search results. A verifiable multi-keyword search encryption scheme that supports revocation of attributes is proposed. The scheme allows users to detect the correctness of cloud server search results while supporting the revocation of user attributes in a fine-grained access control structure without updating the key or re-encrypting the ciphertext during revocation stage. The aforementioned scheme is proved by the deterministic linearity hypothesis, and the relevant analysis results indicate that it can resist the attacks of keyword selection and the privacy of keywords in the random oracle model with high computational efficiency and storage effectiveness.
-
Key words:
- Searchable encryption /
- Attribute revocation /
- Multi-keyword search /
- Provable security
-
表 2 存儲(chǔ)代價(jià)比較
方案 系統(tǒng)建立算法 密鑰生成算法 加密算法 陷門生成算法 文獻(xiàn)[6] $\left(4 + \sum\limits_{i = 1}^N {{n_i}} \right)|G| + \left(2 + \sum\limits_{i = 1}^N {{n_i}} \right)|{Z_p}|$ $(2N + 2)|G|$ $(2N + 2)|G|$ $(2N + 1)|G| + |{Z_p}|$ 文獻(xiàn)[9] $9|G| + 5|{Z_p}|$ $|G| + |{Z_p}|$ $(5m + 2)|G|$ $(6l + 2)|G| + |M|$ 文獻(xiàn)[12] $(3N + 2)|G| + (3N + 1)|{Z_p}|$ $(2N + 1)|G| + |{Z_p}|$ $(N + 2)|G|$ $(2N + 1)|G| + |{Z_p}|$ 本文方案 $7|G| + (|S| + 3)|{Z_p}|$ $(2|S| + 2)|G| + |{Z_p}|$ $(|S| + m + 2)|G|$ $(|S| + 4)|G|$ 下載: 導(dǎo)出CSV
表 3 計(jì)算代價(jià)比較
方案 系統(tǒng)建立算法 密鑰生成算法 加密算法 陷門生成算法 搜索算法 驗(yàn)證算法 文獻(xiàn)[6] $\left(2 + \sum\limits_{i = 1}^N {{n_i}} \right)E$ $(2N + 2)E$ $(2N + 2)E$ $(2N + 1)E$ $E + (2N + 1)P$ — 文獻(xiàn)[9] $5E$ $E$ $(6m + 3)E$ $(15l + 3)E$ $(l + 1)E + (6l + 1)P$ — 文獻(xiàn)[12] $\left(3N + 1\right)E + P$ $(2N + 3)E$ $(N + 2)E$ $(2N + 1)E$ $E + (N + 1)P$ — 本文方案 $3E$ $(2|S| + 2)E$ $(|S| + 3)E$ $(2|S| + 3)E$ $E + 3P$ $(\varphi + 1)E + 2P$ 下載: 導(dǎo)出CSV
-
SONG D X, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. 2000 IEEE Symposium on Security and Privacy, Berkeley, USA, 2008: 44–55. doi: 10.1109/SECPRI.2000.848445. BONEH D, CRESCENZO G D, OSTROVSKY R, et al. Public key encryption with keyword search[C]. International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2004: 506–522. doi: 10.1007/978-3-540-24676-3_30. CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: Improved definitions and efficient constructions[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006: 79–88. doi: 10.1145/1180405.1180417. 李雙, 徐智茂. 基于屬性的可搜索加密方案[J]. 計(jì)算機(jī)學(xué)報(bào), 2014, 37(5): 1018–1024. doi: 10.3724/SP.J.1016.2014.01017LI Shuang and XU Zhimao. Attribute-based public encryption with keyword search[J]. Chinese Journal of Computers, 2014, 37(5): 1018–1024. doi: 10.3724/SP.J.1016.2014.01017 YANG Yang and MA Maode. Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for E-Health clouds[J]. IEEE Transactions on Information Forensics and Security, 2017, 11(4): 746–759. doi: 10.1109/TIFS.2015.2509912 QIU Shuo, LIU Jiqiang, SHI Yanfeng, et al. Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack[J]. Science China (Information Sciences) , 2017, 60(5): 1–12. doi: 10.1007/s11432-015-5449-9 MIAO Yinbin, MA Jianfeng, WEI Fushan, et al. VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel[J]. Peer-to-Peer Networking and Applications, 2017, 10(4): 995–1007. doi: 10.1007/s12083-016-0458-z MIAO Yinbin, MA Jianfeng, JIANG Qi, et al. Verifiable keyword search over encrypted cloud data in smart city[J]. Computers and Electrical Engineering, 2017, 65(1): 90–101. doi: 10.1016/j.compeleceng.2017.06.021 CUI Hui, WAN Zhiguo, DENG R H, et al. Efficient and expressive keyword search over encrypted data in the cloud[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 15(3): 409–422. doi: 10.1109/TDSC.2016.2599883 LI Runhe, ZHENG Dong, ZHANG Yinghui, et al. Attribute-based encryption with multi-keyword search[C]. IEEE Second International Conference on Data Science in Cyberspace, Shenzhen, China, 2017: 172–177. doi: 10.1109/DSC.2017.97. 王尚平, 余小娟, 張亞玲. 具有兩個(gè)可撤銷屬性列表的密鑰策略的屬性加密方案[J]. 電子與信息學(xué)報(bào), 2016, 38(6): 1406–1411. doi: 10.11999/JEIT150845WANG Shangping, YU Xiaojuan, and ZHANG Yaling. Revocable key-policy attribute-based encryption scheme with two revocation lists[J]. Journal of Electronics &Information Technology, 2016, 38(6): 1406–1411. doi: 10.11999/JEIT150845 SUN Wenhai, YU Shucheng, LOU Wenjing, et al. Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(4): 1187–1198. doi: 10.1109/TPDS.2014.2355202 陳燕俐, 楊華山. 可支持屬性撤銷的基于CP-ABE可搜索加密方案[J]. 重慶郵電大學(xué)學(xué)報(bào)(自然科學(xué)版), 2016, 28(4): 545–554. doi: 10.3979/j.issn.1673-825X.2016.04.016CHEN Yanli and YANG Huashan. CP-ABE based searchable encryption with attribute revocation[J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition) , 2016, 28(4): 545–554. doi: 10.3979/j.issn.1673-825X.2016.04.016 GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006: 89–98. doi: 10.1145/1180405.1180418. ZHENG Qingji, XU Shouhuai, and ATENIESE G. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data[C]. IEEE INFOCOM, Toronto, Canada, 2014: 522–530. doi: 10.1109/INFOCOM.2014.6847976. -