浏览全部资源
扫码关注微信
西安电子科技大学网络与信息安全学院,陕西 西安 710071
[ "伍祈应(1994-),女,湖南邵阳人,西安电子科技大学硕士生,主要研究方向为网络与信息安全。" ]
[ "马建峰(1963-),男,陕西西安人,西安电子科技大学教授、博士生导师,主要研究方向为密码学、无线和移动安全等。" ]
[ "苗银宾(1988-),男,河南驻马店人,博士,西安电子科技大学讲师,主要研究方向为应用密码学、无线网络安全等。" ]
[ "张俊伟(1982-),男,陕西西安人,博士,西安电子科技大学副教授,主要研究方向为密码学、网络安全等。" ]
[ "沈丽敏(1978-),女,江苏南京人,西安电子科技大学博士生,主要研究方向为密码学、信息论等。" ]
网络出版日期:2017-11,
纸质出版日期:2017-11-25
移动端阅览
伍祈应, 马建峰, 苗银宾, 等. 多数据拥有者认证的密文检索方案[J]. 通信学报, 2017,38(11):161-170.
Qi-ying WU, Jian-feng MA, Yin-bin MIAO, et al. Multi-owner accredited keyword search over encrypted data[J]. Journal on communications, 2017, 38(11): 161-170.
伍祈应, 马建峰, 苗银宾, 等. 多数据拥有者认证的密文检索方案[J]. 通信学报, 2017,38(11):161-170. DOI: 10.11959/j.issn.1000-436x.2017225.
Qi-ying WU, Jian-feng MA, Yin-bin MIAO, et al. Multi-owner accredited keyword search over encrypted data[J]. Journal on communications, 2017, 38(11): 161-170. DOI: 10.11959/j.issn.1000-436x.2017225.
针对共享型多数据拥有者场景,即一个文件被多个数据拥有者拥有,已有可搜索加密方案不能同时支持密文检索和细粒度访问控制。为此,基于线性秘密共享和可搜索加密技术提出一种高效的多数据拥有者认证的密文检索方案,数据用户只有得到多个数据拥有者的授权才能解密返回的结果。严格的安全分析表明该方案在双线性Diffie-Hellman假设下能保证安全和隐私,且基于实际数据的实验结果表明本方案在实际应用中是高效、可行的。
A sharing multi-owner setting where data was owned by a fixed number of data owners
the existing searchable encryption schemes could not support ciphertext retrieval and fine-grained access control at the same time.For this end
an efficient cryptographic primitive called as multi-owner accredited keyword search over encrypted data scheme was designed
through combining linear secret-sharing technique with searchable encryption schemes
only the data users authorized bymulti-owner by could decrypt the returned results.The formal security analysis shows that the scheme can protect security and privacy under the bilinear Diffie-Hellman assumption.As a further contribution
an empirical study over real-world dataset was conelucted to show the effectiveness and practicability of the scheme.
WEI L , ZHU H , CAO Z , et al . Security and privacy for storage and computation in cloud computing [J ] . Information Sciences , 2014 , 258 : 371 - 386 .
MIAO Y , MA J , LIU Z . Revocable and anonymous searchable encryption in multi-user setting [J ] . Concurrency and Computation:Practice and Experience , 2016 , 28 ( 4 ): 1204 - 1218 .
REN K , WANG C , WANG Q . Security challenges for the public cloud [J ] . IEEE Internet Computing , 2012 , 16 ( 1 ): 69 - 73 .
LI J , MA R , GUAN H . Tees:an efficient search scheme over encrypted data on mobile cloud [J ] . IEEE Transactions on Cloud Computing , 2017 , 5 ( 1 ): 126 - 139 .
BONEH D , DI CRESCENZO G , OSTROVSKY R , et al . Public key encryption with keyword search [C ] // International Conference on the Theory and Applications of Cryptographic Techniques . 2004 : 506 - 522 .
GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data [C ] // Second International Conference on Applied Cryptography and Network Security . 2004 : 31 - 45 .
YANG Y , MA M . Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds [J ] . IEEE Transactions on Information Forensics and Security , 2016 , 11 ( 4 ): 746 - 759 .
WANG B , YU S , LOU W , et al . Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud [C ] // Conference on Computer Communications . 2014 : 2112 - 2120 .
XU P , JIN H , WU Q , et al . Public-key encryption with fuzzy keyword search:a provably secure scheme under keyword guessing attack [J ] . IEEE Transactions on Computers , 2013 , 62 ( 11 ): 2266 - 2277 .
XIA Z , WANG X , SUN X , et al . A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data [J ] . IEEE Transactions on Parallel and Distributed Systems , 2016 , 27 ( 2 ): 340 - 352 .
CAO N , WANG C , LI M , et al . Privacy-preserving multi-keyword ranked search over encrypted cloud data [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 1 ): 222 - 233 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // IEEE Symposium on Security and Privacy . 2007 : 321 - 334 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // The 13th ACM Conference on Computer and Communications Security . 2006 : 89 - 98 .
ZHENG Q , XU S , ATENIESE G . VABKS:verifiable attribute-based keyword search over outsourced encrypted data [C ] // IEEE Conference on Computer Communications . 2014 : 522 - 530 .
YIN H , QIN Z , ZHANG J , et al . Secure conjunctive multi-keyword search for multiple data owners in cloud computing [C ] // The 22th IEEE International Conference on Parallel and Distributed Systems . 2016 : 761 - 768 .
SUN W , YU S , LOU W , et al . Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud [J ] . IEEE Transactions on Parallel and Distributed Systems , 2016 , 27 ( 4 ): 1187 - 1198 .
LAYOUNI M , YOSHIDA M , OKAMURA S . Efficient multi- authorizer accredited symmetrically private information retrieval [C ] // The 10th International Conference on Information and Communications Security . 2008 : 387 - 402 .
SHAN Y , CAO Z . Extended attribute based encryption for private information retrieval [C ] // The 6th IEEE International Conference on Mobile Ad Hoc and Sensor Systems . 2009 : 702 - 707 .
DAN B , LYNN B , SHACHAM H . Short signatures from the weil pairing [J ] . Journal of Cryptology , 2004 , 17 ( 4 ): 297 - 319 .
0
浏览量
1002
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构