浏览全部资源
扫码关注微信
1. 河北大学网络空间安全与计算机学院,河北 保定 071002
2. 河北省高可信信息系统重点实验室,河北 保定 071002
[ "杜瑞忠(1975- ),男,河北献县人,博士,河北大学教授、硕士生导师,主要研究方向为可信计算与信息安全" ]
[ "谭艾伦(1995- ),男,四川广安人,河北大学硕士生,主要研究方向为可信计算与信息安全" ]
[ "田俊峰(1964- ),河北蠡县人,博士,河北大学教授、博士生导师,主要研究方向为分布计算、可信计算与信息安全" ]
网络出版日期:2020-04,
纸质出版日期:2020-04-25
移动端阅览
杜瑞忠, 谭艾伦, 田俊峰. 基于区块链的公钥可搜索加密方案[J]. 通信学报, 2020,41(4):114-122.
Ruizhong DU, Ailun TAN, Junfeng TIAN. Public key searchable encryption scheme based on blockchain[J]. Journal on communications, 2020, 41(4): 114-122.
杜瑞忠, 谭艾伦, 田俊峰. 基于区块链的公钥可搜索加密方案[J]. 通信学报, 2020,41(4):114-122. DOI: 10.11959/j.issn.1000-436x.2020070.
Ruizhong DU, Ailun TAN, Junfeng TIAN. Public key searchable encryption scheme based on blockchain[J]. Journal on communications, 2020, 41(4): 114-122. DOI: 10.11959/j.issn.1000-436x.2020070.
针对公钥加密方案的陷门安全问题,引入随机数构造陷门与索引,用于抵御来自服务器内部的关键字猜测攻击,避免因服务器好奇行为带来的数据泄露。对第三方的可信问题进行研究,将区块链技术与可搜索加密方案相结合,使用智能合约作为可信第三方进行检索工作,既可以防止服务器内部的关键字猜测攻击,又可以保证检索结果的正确性,从而限制服务器在下发数据时的恶意行为。通过安全性分析,验证了所提方案满足IND-KGA安全性。经过与其他方案进行实验对比,证明了所提方案在时间开销上具有一定的优势。
Aiming at the trapdoor security problem of the public key encryption scheme
a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.Research on trusted issues of third parties
the blockchain mechanism with a searchable encryption scheme was combined
and smart contracts as trusted third parties for retrieval was used
which could prevent keyword guessing attacks inside the server and ensure retrieval.The correctness of the results
thereby limiting the malicious behavior of the server when sending data.The solution was analyzed for security and the verification scheme satisfies IND-KGA security.Experiments in real data sets
compared with other programs
prove that the program has certain advantages in time overhead.
DAWN S D , SONG D , WAGNER A P , et al . Practical techniques for searches on encrypted data [C ] // Proceedings of the 2000 IEEE Security and Privacy Symposium . Piscataway:IEEE Press , 2000 : 44 - 45 .
BONEH D , CRESCENZO G D , OSTROVSKY R , et al . Public key encryption with keyword search [C ] // International Conference on the Theory and Applications of Cryptographic Techniques . Berlin:Springer , 2004 : 506 - 522 .
CURTMOLA R , GARAY J , KAMARA S , et al . Searchable symmetric encryption :improved definitions and efficient constructions [J ] . Journal of Computer Security , 2011 , 19 ( 5 ): 895 - 934 .
WANG P , WANG H , PIEPRZYK J . Threshold privacy preserving keyword searches [C ] // Conference on Sofsem:Theory & Practice of Computer Science . Berlin:Springer , 2008 : 646 - 658 .
YUAN K , LIU Z L , JIA C F , et al . Public key timed-release searchable encryption in one-to-many scenarios [J ] . Tien Tzu Hsueh Pao/Acta Electronica Sinica , 2015 , 43 ( 4 ): 760 - 768 .
ZHONG H , CUI J , SHI R H , et al . Many-to-one homomorphic e-ncryption scheme [J ] . Security & Communication Networks , 2016 , 9 ( 10 ): 1007 - 1015 .
TANG Q , CHEN L Q . Public-key encryption with registered keyword search [C ] // 6th European Workshop Public Key Infrastructures . Berlin:Springer , 2009 : 163 - 178 .
FANG L M , SUSILO W , GE C , et al . Public key encryption with keyword search secure against keyword guessing attacks without random oracle [J ] . Information Sciences , 2013 , 238 : 221 - 241 .
XU P , JIN H , WU Q , et al . Public-key encryption with fuzzy keyword search:a provably secure scheme under keyword guessing attack [J ] . IEEE Transactions on Computers , 2013 , 62 ( 11 ): 2266 - 2277 .
CHEN R , MU Y , YANG G , et al . A new general framework for secure public key encryption with keyword search [C ] // Australasian Conference on Information Security and Privacy . Berlin:Springer , 2015 : 59 - 76 .
SHAO Z Y , YANG B . On security against the server in designated tester public key encryption with keyword search [J ] . Information Processing Letters , 2015 , 115 ( 12 ): 957 - 961 .
CHEN R , MU Y , YANG G , et al . Dual-server public-key encryption with keyword search for secure cloud storage [J ] . IEEE Transactions on Information Forensics and Security , 2016 , 11 ( 4 ): 789 - 798 .
HUANG Q , LI H . An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks [J ] . Information Sciences , 2017 ( 403-404 ): 1 - 14 .
KANG Y , LIU Z . A fully secure verifiable and out sourced decryption ranked searchable encryption scheme supporting synonym query [C ] // IEEE Second International Conference on Data Science in Cyberspace . Piscataway:IEEE Press , 2017 : 223 - 231 .
WU L , CHEN B , ZEADALLY S , et al . An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage [J ] . Soft Computing , 2018 , 22 ( 23 ): 7685 - 7696 .
WU L B , ZHANG Y B , MA M M , et al . Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of things [J ] . Annales des Télécommunications , 2019 , 74 ( 7-8 ): 423 - 434 .
MA M M , HE D B , KUMAR N , et al . Certificateless searchable public key encryption scheme for industrial Internet of things [J ] . IEEE Transactions on Industrial Informatics , 2018 , 14 ( 2 ): 759 - 767 .
LU Y , LI J G . Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems [J ] . Cluster Computing , 2019 , 22 ( 1 ): 285 - 299 .
LI H G , ZHANG F G , HE J J , et al . A searchable symmetric encryption scheme using blockchain [J ] . CoRR:abs/1711.01030 , 2017
LI H G , TIAN H B , ZHANG F G , et al . Blockchain-based searchable symmetric encryption scheme [J ] . Computers & Electrical Engineering , 2019 ( 73 ): 32 - 45 .
CHEN L X , LEE W K , CHANG C C , et al . Blockchain based searchable encryption for electronic health record sharing [J ] . Future Generation Computer System , 2019 ( 95 ): 420 - 429 .
0
浏览量
1695
下载量
16
CSCD
关联资源
相关文章
相关作者
相关机构