浏览全部资源
扫码关注微信
1. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
2. 西安电子科技大学通信工程学院,陕西 西安 710071
[ "伍祈应(1994-),女,湖南邵阳人,西安电子科技大学硕士生,主要研究方向为网络与信息安全。" ]
[ "马建峰(1963-),男,陕西西安人,西安电子科技大学教授、博士生导师,主要研究方向为密码学、无线和移动安全等。" ]
[ "李辉(1983-),男,湖北武汉人,博士,西安电子科技大学副教授,主要研究方向为社交网络的知识发现和挖掘、安全的数据管理和查询等。" ]
[ "张俊伟(1982-),男,陕西西安人,博士,西安电子科技大学副教授,主要研究方向为密码学、网络安全等。" ]
[ "姜奇(1983-),男,安徽全椒人,博士,西安电子科技大学副教授,主要研究方向为安全协议分析、无线网络安全。" ]
[ "苗银宾(1988-),男,河南驻马店人,博士,西安电子科技大学讲师,主要研究方向为应用密码学、无线网络安全。" ]
网络出版日期:2017-08,
纸质出版日期:2017-08-25
移动端阅览
伍祈应, 马建峰, 李辉, 等. 支持用户撤销的多关键字密文查询方案[J]. 通信学报, 2017,38(8):183-193.
Qi-ying WU, Jian-feng MA, Hui LI, et al. Multi-keyword search over encrypted data with user revocation[J]. Journal on communications, 2017, 38(8): 183-193.
伍祈应, 马建峰, 李辉, 等. 支持用户撤销的多关键字密文查询方案[J]. 通信学报, 2017,38(8):183-193. DOI: 10.11959/j.issn.1000-436x.2017094.
Qi-ying WU, Jian-feng MA, Hui LI, et al. Multi-keyword search over encrypted data with user revocation[J]. Journal on communications, 2017, 38(8): 183-193. DOI: 10.11959/j.issn.1000-436x.2017094.
在密文策略的属性加密技术上提出一种支持文件级别的访问授权和数据用户撤销的多关键字密文查询方案。该方案在多数据拥有者多数据用户的场景下不仅支持文件级别的访问授权,即数据用户能够获取不同数据拥有者用不同密钥加密的密文,而且该方案能实现数据用户撤销。该方案在随机预言模型下是抗选择关键字攻击的,且基于实际数据集的实验结果表明方案在实际应用中是可行的、高效的。
A mu1ti-keyword search over encrypted data was proposec1 with fi1e-1eve1 access authorization and data user revocation scheme through emp1oying ciphertext-po1icy attribute-based encryption(CP-ABE).The scheme supports fi1e-1eve1 access authorization in the mu1ti-owner mu1ti-user settings,which means that data users cou1d on1y gain the authorized fi1es encrypted by different data owners with different keys.Moreover,the scheme cou1d achieve data user revocation.Forma1 security ana1ysis shows that the proposed scheme cou1d resist the chosen keyword attack in random orac1e.Moreover,the experimenta1 study over rea1-wor1d dataset demonstrates its efficiency and feasibi1ity in practice.
JIANG Q , MA J F , WEI F S . On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services [J ] . IEEE Systems Journal , 2017 ,PP( 99 ): 1 - 4 .
JIANG Q , KHAN M K , LU X , et al . A privacy preserving three-factor authentication protocol for e-health clouds [J ] . Journal of Supercomputing , 2016 , 72 ( 10 ): 3826 - 3849 .
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data [C ] // IEEE Symposium on Security and Privacy . 2000 : 44 - 55 .
BONEH D , DI C G , OSTROVSKY R , et al . Public key encryption with keyword search [C ] // International Conference on the Theory and Applications of Cryptographic Techniques . 2004 : 506 - 522 .
LI J , WANG Q , WANG C , et al . Fuzzy keyword search over encrypted data in cloud computing [C ] // The 29th IEEE International Conference on Computer Communications . 2010 : 1 - 5 .
CHEN R , MU Y , YANG G , et al . Dual-server public-key encryption with keyword search for secure cloud storage [J ] . IEEE Transactions on Information Forensics and Security , 2016 , 11 ( 4 ): 789 - 798 .
MIAO Y , MA J , WEI F , et al . VCSE:verifiable conjunctive keywords search over encrypted data without secure-channel [J ] . Peer-to-Peer Networking and Applications , 2016 : 1 - 13 .
LI H , LIU D , JIA K , et al . Achieving authorized and ranked multi-keyword search over encrypted cloud data [C ] // IEEE International Conference on Communications . 2015 : 7450 - 7455 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // IEEE Symposium on Security and Privacy . 2007 : 321 - 334 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // The 13th ACM conference on Computer and communications security . 2006 : 89 - 98 .
ZHENG Q , XU S , ATENIESE G . VABKS:verifiable attribute-based keyword search over outsourced encrypted data [C ] // IEEE Conference on Computer Communications . 2014 : 522 - 530 .
LIU Z , WENG J , LI J , et al . Cloud-based electronic health record system supporting fuzzy keyword search [J ] . Soft Computing , 2015 : 1 - 13 .
MIAO Y , LIU J , MA J . Fine-grained searchable encryption over encrypted data in multi-clouds [C ] // The 10th International Conference on Wireless Algorithms,Systems,and Applications . 2015 : 407 - 416 .
QIAN H , LI J , ZHANG Y , et al . Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation [J ] . International Journal of Information Security . 2014 , 14 ( 6 ): 1 - 11 .
YANG Y . Attribute-based data retrieval with semantic keyword search for e-health cloud [J ] . Journal of Cloud Computing . 2015 , 4 ( 1 ): 1 - 6 .
LI M , YU S , CAO N , et al . Authorized private keyword search over encrypted data in cloud computing [C ] // International Conference on Distributed Computing Systems . 2011 : 383 - 392 .
SUN W , YU S , LOU W , et al . Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the Cloud [J ] . IEEE Transactions on Parallel and Distributed Systems , 2016 , 27 ( 4 ): 1187 - 1198 .
0
浏览量
1118
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构