浏览全部资源
扫码关注微信
浙江工业大学 计算机学院,浙江 杭州 310000
[ "林鹏(1990-),男,浙江温州人,浙江工业大学硕士生,主要研究方向为信息安全。" ]
[ "江颉(1972-),女,浙江平湖人,博士,浙江工业大学副教授,主要研究方向为网络信息安全、数据挖掘。" ]
[ "陈铁明(1978-),男,浙江诸暨人,博士,浙江工业大学副教授,主要研究方向为网络信息安全。" ]
网络出版日期:2015-11,
纸质出版日期:2015-11-25
移动端阅览
林鹏, 江颉, 陈铁明. 云环境下关键词搜索加密算法研究[J]. 通信学报, 2015,36(Z1):259-265.
Peng LIN, Jie JIANG, Tie-ming CHEN. Application of keyword searchable encryption in cloud[J]. Journal on communications, 2015, 36(Z1): 259-265.
林鹏, 江颉, 陈铁明. 云环境下关键词搜索加密算法研究[J]. 通信学报, 2015,36(Z1):259-265. DOI: 10.11959/j.issn.1000-436x.2015307.
Peng LIN, Jie JIANG, Tie-ming CHEN. Application of keyword searchable encryption in cloud[J]. Journal on communications, 2015, 36(Z1): 259-265. DOI: 10.11959/j.issn.1000-436x.2015307.
现有方案将关键词搜索加密和属性基加密相结合,解决了云环境下访问控制问题,但是未充分考虑信道安全以及关键词猜测攻击等安全问题。针对上述问题,提出了一种指派搜索服务器的关键词搜索属性加密方案,实现了关键词搜索访问权限控制,且检索不需要安全信道,可抵抗离线/在线关键词猜测攻击。实验结果表明,方案性能方面可取得较好结果,可应用于云环境。
Recently
some schemes combined keyword searchable encryption with attribute based encryption
solved access control problem in cloud environment
but they didn’t consider security problems like keyword guessing attack and security channels
so they couldn’t be applied to cloud.A keyword searchable attribute based encryption scheme with a designated tester was proposed
which could be against online/offline keyword guessing attacks and without security channel.Moreover
the user was able to encrypt data by setting a fine-gained access control policy.The efficiency of the scheme is analyzed it can be applied to cloud.
BONEH D , DI CRESCENZO G , OSTROVSKY R , et al . Public key encryption with keyword search [A ] . Advances in Cryptology-Eurocrypt 2004 [C ] . Springer Berlin Heidelberg , 2004 . 506 - 522 .
ABDALLA M , BELLARE M , CATALANO D , et al . Searchable encryption revisited:consistency properties,relation to anonymous IBE,and extensions [A ] . Advances in Cryptology–CRYPTO 2005 [C ] . Springer Berlin Heidelberg , 2005 . 205 - 222 .
BYUN J W , RHEE H S , PARK H A , et al . Off-line keyword guessing attacks on recent keyword search schemes over encrypted data [A ] . Secure Data Management [C ] . Springer Berlin Heidelberg , 2006 . 75 - 83 .
RHEE H S , PARK J H , SUSILO W , et al . Trapdoor security in a searchable public-key encryption scheme with a designated tester [J ] . Journal of Systems and Software , 2010 , 83 ( 5 ): 763 - 771 .
HU C , LIU P . A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension [A ] . Advances in Computer Science,Environment,Ecoinformatics,and Education [C ] . Springer Berlin Heidelberg , 2011 . 131 - 136 .
TANG Q , CHEN L . Public-key encryption with registered keyword search [A ] . Public Key Infrastructures,Services and Applications [C ] . Springer Berlin Heidelberg , 2010 . 163 - 178 .
XU P , JIN H , WU Q , et al . Public-key encryption with fuzzy keyword search:a provably secure scheme under keyword guessing attack [J ] . IEEE Transactions on Computers , 2013 , 62 ( 11 ): 2266 - 2277 .
李经纬 , 贾春福 , 刘皙理 , 等 . 可搜索加密技术研究综述 [J ] . 软件学报 , 2015 , 26 ( 1 ): 109 - 128 .
LI J W , JIA C F , LIU Z L , et al . Survey on the searchable encryption [J ] . Journal of Software , 2015 , 26 ( 1 ): 109 - 128 .
JEONG I R , KWON J O , HONG D , et al . Constructing PEKS schemes secure against keyword guessing attacks is possible [J ] . Computer Communications , 2009 , 32 ( 2 ): 394 - 396 .
CHEN Y C . SPEKs:secure server-designation public key encryption with keyword search against keyword guessing attacks [J ] . The Computer Journal , 2015 , 58 ( 4 ): 922 - 933 .
HWANG Y H , LEE P J . Public key encryption with conjunctive keyword search and its extension to a multi-user system [A ] . Pairing-Based Cryptography-Pairing 2007 [C ] . Springer Berlin Heidelberg , 2007 . 2 - 22 .
苏金树 , 曹丹 , 王小峰 , 等 . 属性基加密机制 [J ] . 软件学报 , 2011 , 22 ( 6 ): 1299 - 1315 .
SU J S , CAO D , WANG X F , et al . Attribute-based encryption schemes [J ] . Journal of Software , 2011 , 22 ( 6 ): 1299 - 1315 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [A ] . Security and Privacy,SP'07 [C ] . 2007 . 321 - 334 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [A ] . Proceedings of the 13th ACM Conference on Computer and Communications Security [C ] . ACM , 2006 . 89 - 98 .
HAN F , QIN J , ZHAO H , et al . A general transformation from KP-ABE to searchable encryption [J ] . Future Generation Computer Systems , 2014 ,( 30 ): 107 - 115 .
LV Z , HONG C , ZHANG M , et al . Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version) [R ] . Cryptology ePrint Archive,Report 2014/614 , 2014 .
LAI J , ZHOU X , DENG R H , et al . Expressive search on encrypted data [A ] . Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security [C ] . ACM , 2013 . 243 - 252 .
李双 , 徐茂智 . 基于属性的可搜索加密方案 [J ] . 计算机学报 , 2014 , 37 ( 5 ): 1017 - 1024 .
LI S , XU M Z . Attribute based public encryption with keyword search [J ] . Chinese Journal of Computers , 2014 , 37 ( 5 ): 1017 - 1024 .
WANG C , LI W , LI Y , et al . A ciphertext-policy attribute-based encryption scheme supporting keyword search function [A ] . Cyberspace Safety and Security [C ] . 2013 . 377 - 386 .
LI J , ZHANG L . Attribute-based keyword search and data access control in cloud [A ] . Computational Intelligence and Security (CIS),2014 Tenth International Conference [C ] . IEEE , 2014 . 382 - 386 .
LIU P , WANG J , MA H , et al . Efficient verifiable public key encryption with keyword search based on KP-ABE [A ] . Broadband and Wireless Computing,Communication and Applications (BWCCA),2014 Ninth International Conference on [C ] . IEEE , 2014 . 584 - 589 .
ZHENG Q , XU S , ATENIESE G . Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data [R ] . Cryptology ePrint Archive,Report 2013/462 , 2013 .
BONEH D , FRANKLIN M . Identity-based encryption from the weil pairing [A ] . Advances in Cryptology,CRYPTO 2001 [C ] . Springer Berlin Heidelberg , 2001 . 213 - 229 .
GOH E J , JARECKI S . A signature scheme as secure as the Diffie-Hellman problem [A ] . Advances in CryptologyEUROCRYPT 2003 [C ] . Springer Berlin Heidelberg , 2003 . 401 - 415 .
DE C A , IOVINO V . JPBC:Java pairing based cryptography [A ] . IEEE Symposium on Computers & Communications [C ] . IEEE Computer Society , 2011 . 850 - 855 .
0
浏览量
1623
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构