浏览全部资源
扫码关注微信
1. 公共大数据国家重点实验室(贵州大学),贵州 贵阳 550025
2. 贵州大学计算机科学与技术学院,贵州 贵阳 550025
3. 贵州大学密码学与数据安全研究所,贵州 贵阳 550025
4. 贵州大学数学与统计学院,贵州 贵阳 550025
[ "田有亮(1982- ),男,贵州盘县人,博士,贵州大学教授、博士生导师,主要研究方向为算法博弈论、密码学与安全协议、大数据安全与隐私保护等" ]
[ "骆琴(1994- ),女,贵州贵阳人,贵州大学硕士生,主要研究方向为可搜索加密协议" ]
网络出版日期:2020-09,
纸质出版日期:2020-09-25
移动端阅览
田有亮, 骆琴. 基于改进Merkle-Tree认证方法的可验证多关键词搜索方案[J]. 通信学报, 2020,41(9):118-129.
Youliang TIAN, Qin LUO. Verifiable multi-keyword search scheme based on improved Merkle-Tree authentication method[J]. Journal on communications, 2020, 41(9): 118-129.
田有亮, 骆琴. 基于改进Merkle-Tree认证方法的可验证多关键词搜索方案[J]. 通信学报, 2020,41(9):118-129. DOI: 10.11959/j.issn.1000-436x.2020146.
Youliang TIAN, Qin LUO. Verifiable multi-keyword search scheme based on improved Merkle-Tree authentication method[J]. Journal on communications, 2020, 41(9): 118-129. DOI: 10.11959/j.issn.1000-436x.2020146.
针对可搜索加密方案中的结果验证方法复杂,搜索成本高且效率低,难以满足多关键词搜索结果高效验证和安全性需求的问题,提出了基于改进的 Merkle-Tree 认证方法的多关键词搜索方案。首先,利用双线性映射构造多关键词的可搜索算法,实现高效精准的多关键词搜索;其次,基于Bawa改进的Merkle-Tree认证方法构造搜索方案的验证及动态更新算法,将计算成本从经典的MHT的O(n)降低到O(log n),防止数据篡改、删除和伪造等不法操作的高效验证。在决策线性假设和CDH假设下,所提方案满足密文不可区分性和签名不可伪造性。
Aiming at the problem that the result verification method in the searchable encryption scheme was complicated
the search cost was high and the efficiency was low
it was difficult to meet the requirements of efficient verification and security of multi-keyword search results
a multi-keyword search scheme based on the improved Merkle-Tree authentication method was proposed.Firstly
a multi-keyword searchable algorithm was built to achieve efficient and accurate multi-keyword search by the bilinear mapping.Secondly
based on the improved Merkle-Tree authentication method of Bawa
the verification and dynamic update algorithm of the search scheme was constructed to reduce the calculation cost of the classic MHT to prevent the efficient verification and update of illegal operations such as data tampering
deletion
and forgery.Under the decision-type linear hypothesis and CDH hypothesis
the proof scheme meets the indistinguishability and unforgeability of ciphertext.
MELL P , GRANCE T . The NIST definition of cloud computing [J ] . National Institute of Standards and Technology , 2009 , 53 ( 6 ): 50 - 53 .
ARMBRUST M , FOX A , GRIFFITH R , et al . A view of cloud computing [J ] . Communications of the ACM , 2010 , 53 ( 4 ): 50 - 58 .
SAHAI A , WATERS B . Fuzzy identity-based encryption [C ] // Annual International Conference on the Theory and Applications of Cryptographic Techniques . Berlin:Springer , 2005 : 457 - 473 .
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data [C ] // Proceeding 2000 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2000 : 44 - 55 .
GOH E J . Secure indexes [J ] . IACR Cryptology ePrint Archive , 2003 , 6 ( 12 ): 12 - 22 .
CHANG Y C , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data [C ] // Applied Cryptography and Network Security . Berlin:Springer , 2005 : 442 - 455 .
CURTMOLA R , GARAY J A , KAMARA S , et al . Searchable symmetric encryption:improved definitions and efficient constructions [C ] // ACM Conference Computer and Communication Security.New York:ACM Press . 2006 : 376 - 379 .
GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data [C ] // International Conference on Applied Cryptography and Network Security . Berlin:Springer , 2004 : 31 - 45 .
ZHENG Q , LI X , AZGIN A . CLKS:certificateless keyword search on encrypted data [C ] // International Conference on Network and System Security . Berlin:Springer , 2015 : 239 - 253 .
ZHANG W , LIN Y , XIAO S , et al . Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing [J ] . IEEE Transactions on Computers , 2015 , 65 ( 5 ): 1566 - 1577 .
YANG Y , MA M . Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds [J ] . IEEE Transactions on Information Forensics and Security , 2015 , 11 ( 4 ): 746 - 759 .
SHEN J , SHEN J , CHEN X , et al . An efficient public auditing protocol with novel dynamic structure for cloud data [J ] . IEEE Transactions on Information Forensics and Security , 2017 , 12 ( 10 ): 2402 - 2415 .
SUN W , WANG B , CAO N , et al . Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking [J ] . IEEE Transactions on Parallel and Distributed Systems , 2013 , 25 ( 11 ): 3025 - 3035 .
WANG J , CHEN X , HUANG X , et al . Verifiable auditing for outsourced database in cloud computing [J ] . IEEE Transactions on Computers , 2015 , 64 ( 11 ): 3293 - 3303 .
CHUM C S , ZHANG X . A new bloom filter structure for searchable encryption schemes [C ] // Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy . New York:ACM Press , 2017 : 143 - 145 .
MIAO Y , WENG J , LIU X , et al . Enabling verifiable multiple keywords search over encrypted cloud data [J ] . Information Sciences , 2018 , 465 ( 10 ): 21 - 37 .
BONEH D , CRESCENZO G D , OSTROVSKY R , et al . Public key encryption with keyword search [C ] // International Conference on the Theory and Applications of Cryptographic Techniques . Berlin:Springer , 2004 : 506 - 522 .
GUO Y , LI J , ZHANG Y , et al . Hierarchical attribute-based encryption with continuous auxiliary inputs leakage [J ] . Security & Communication Networks , 2016 , 9 ( 18 ): 4852 - 4862 .
MIAO Y , MA J , LIU X , et al . Practical attribute-based multi-keyword search scheme in mobile crowdsourcing [J ] . IEEE Internet of Things Journal , 2017 , 5 ( 4 ): 3008 - 3018 .
KUROSAWA K , OHTAKI Y . How to update documents verifiably in searchable symmetric encryption [C ] // International Conference on Cryptology and Network Security . Berlin:Springer , 2013 : 309 - 328 .
KUROSAWA K , . Garbled searchable symmetric encryption [C ] // International Conference on Financial Cryptography and Data Security . Berlin:Springer , 2014 : 234 - 251 .
GARG N , BAWA S . RITS-MHT:relative indexed and time stamped Merkle Hash tree based data auditing protocol for cloud computing [J ] . Journal of Network and Computer Applications , 2017 , 84 : 1 - 13 .
杨波 . 密码学中的可证明安全性 [M ] . 北京 : 清华大学出版社 , 2017 .
YANG B . Provable security in cryptography [M ] . Beijing : Tsinghua University PressPress , 2017 .
ZHENG Q , LI X , AZGIN A . CLKS:certificateless keyword search on encrypted data [C ] // International Conference on Network and System Security . Berlin:Springer , 2015 : 239 - 253 .
MIAO Y , MA J , LIU X , et al . VMKDO:verifiable multi-keyword search over encrypted cloud data for dynamic data-owner [J ] . Peer-to-peer Networking and Applications , 2018 , 11 ( 2 ): 287 - 297 .
0
浏览量
1021
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构