浏览全部资源
扫码关注微信
1. 扬州大学信息工程学院,江苏 扬州 225127
2. 扬州大学广陵学院,江苏 扬州 225128
3. 福建师范大学计算机与网络空间安全学院,福建 福州 350007
4. 中国科学院信息安全国家重点实验室,北京 100093
[ "殷新春(1962- ),男,江苏泰州人,博士,扬州大学教授、博士生导师,主要研究方向为密码学、软件质量保障、高性能计算等" ]
[ "王梦宇(1997- ),男,江苏邳州人,扬州大学硕士生,主要研究方向为属性基加密、信息安全等" ]
[ "宁建廷(1988- ),男,浙江龙游人,博士,福建师范大学教授、博士生导师,主要研究方向为应用密码学与数据安全、区块链与机器学习安全、隐私保护技术等" ]
网络出版日期:2022-05,
纸质出版日期:2022-05-25
移动端阅览
殷新春, 王梦宇, 宁建廷. 轻量级可搜索医疗数据共享方案[J]. 通信学报, 2022,43(5):110-122.
Xinchun YIN, Mengyu WANG, Jianting NING. Lightweight searchable medical data sharing scheme[J]. Journal on communications, 2022, 43(5): 110-122.
殷新春, 王梦宇, 宁建廷. 轻量级可搜索医疗数据共享方案[J]. 通信学报, 2022,43(5):110-122. DOI: 10.11959/j.issn.1000-436x.2022090.
Xinchun YIN, Mengyu WANG, Jianting NING. Lightweight searchable medical data sharing scheme[J]. Journal on communications, 2022, 43(5): 110-122. DOI: 10.11959/j.issn.1000-436x.2022090.
支持策略隐藏和关键字搜索的属性基加密方案在医疗场景中具有良好的应用前景。然而,现有的此类方案大多不支持大属性域或采用“与门”结构,限制了访问控制的可扩展性和灵活性,并且许多方案无法抵抗离线字典猜测攻击。此外,属性基加密涉及大量的双线性配对运算,对于计算资源受限的用户设备来说使用非常不便。提出一种轻量级可搜索医疗数据共享方案。该方案在支持关键字搜索和策略隐藏的基础上采用大属性域和线性秘密共享结构,提高了访问控制的可扩展性和灵活性;采用Intel SGX技术对数据进行重加密,实现抗离线字典猜测攻击;将解密计算开销降低到恒定的常数级,适用于计算资源受限的用户设备。最后证明了所提方案具备选择明文不可区分安全性并且可以抵抗离线字典猜测攻击。
The attribute-based encryption scheme supporting policy hiding and keyword search had a good application prospect in medical scenarios.However
most of the existing schemes did not support large attribute university or adopt the "AND gate" structure
which limited their scalability and flexibility of access control
and many schemes could not resist offline dictionary guessing attacks.In addition
attribute-based encryption involved a large number of bilinear pairing operations
which was inconvenient for user equipment with limited computing resources.A lightweight searchable medical data sharing scheme was proposed.Based on the support for keyword search and policy hiding
a large attribute university and a linear secret sharing structure were adopted to improve the scalability and flexibility of access control.The Intel SGX was used to re-encrypt data to achieve anti-offline dictionary guessing attack.The computational overhead of decryption was reduced to a constant level
which was suitable for user equipment with limited computing resources.Finally
it is proved that the proposed scheme has the security of selecting plaintext indistinguishable and can resist offline dictionary guessing attacks.
WANG H J , NING J T , HUANG X Y , et al . Secure fine-grained encrypted keyword search for E-healthcare cloud [J ] . IEEE Transactions on Dependable and Secure Computing , 2021 , 18 ( 3 ): 1307 - 1319 .
WANG H J , DONG X L , CAO Z F . Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search [J ] . IEEE Transactions on Services Computing , 2020 , 13 ( 6 ): 1142 - 1151 .
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data [C ] // Proceeding of 2000 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2000 : 44 - 55 .
KAMARA S , PAPAMANTHOU C , ROEDER T . Dynamic searchable symmetric encryption [C ] // Proceedings of 2012 ACM Conference on Computer and Communications Security . New York:ACM Press , 2012 : 965 - 976 .
CURTMOLA R , GARAY J , KAMARA S , et al . Searchable symmetric encryption:improved definitions and efficient constructions [J ] . Journal of Computer Security , 2011 , 19 ( 5 ): 895 - 934 .
JIANG P , MU Y , GUO F C , et al . Secure-channel free keyword search with authorization in manager-centric databases [J ] . Computers & Security , 2017 , 69 : 50 - 64 .
WANG H J , DONG X L , CAO Z F , et al . Secure key-aggregation authorized searchable encryption [J ] . Science China Information Sciences , 2019 , 62 ( 3 ): 1 - 3 .
SAHAI A , WATERS B . Fuzzy identity-based encryption [C ] // Annual International Conference on the Theory and Applications of Cryptographic Techniques . Berlin:Springer , 2005 : 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // Proceedings of the 13th ACM Conference on Computer and Communications Security . New York:ACM Press , 2006 : 89 - 98 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // Proceedings of 2007 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2007 : 321 - 334 .
ZHENG Q J , XU S H , ATENIESE G . VABKS:verifiable attribute-based keyword search over outsourced encrypted data [C ] // Proceedings of IEEE Conference on Computer Communications . Piscataway:IEEE Press , 2014 : 522 - 530 .
SUN W H , YU S C , LOU W J , et al . Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud [J ] . IEEE Transactions on Parallel and Distributed Systems , 2016 , 27 ( 4 ): 1187 - 1198 .
NISHIDE T , YONEYAMA K , OHTA K . Attribute-based encryption with partially hidden encryptor-specified access structures [C ] // International Conference on Applied Cryptography and Network Security . Berlin:Springer , 2008 : 111 - 129 .
LAI J Z , DENG R H , LI Y J . Expressive CP-ABE with partially hidden access structures [C ] // Proceedings of the 7th ACM Symposium on Information,Computer and Communications Security . New York:ACM Press , 2012 : 18 - 19 .
CUI H , DENG R H , WU G W , et al . An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures [C ] // International Conference on Provable Security . Berlin:Springer , 2016 : 19 - 38 .
QIU S , LIU J Q , SHI Y F , et al . Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack [J ] . Science China Information Sciences , 2016 , 60 ( 5 ): 1 - 12 .
WANG S P , GAO T T , ZHANG Y L . Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage [J ] . PLoS One , 2018 , 13 ( 11 ): 1 .
MIAO Y , LIU X , CHOO K K R , et al . Privacy-preserving attribute-based keyword search in shared multi-owner setting [J ] . IEEE Transactions on Dependable and Secure Computing , 2019 , 18 ( 3 ): 1080 - 1094 .
ZHANG Z S , ZHANG W , QIN Z G . A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing [J ] . Future Generation Computer Systems , 2021 , 123 : 181 - 195 .
MIAO Y B , MA J F , LIU X M , et al . VMKDO:verifiable multi-keyword search over encrypted cloud data for dynamic data-owner [J ] . Peer-to-Peer Networking and Applications , 2018 , 11 ( 2 ): 287 - 297 .
SHINDE S , CHUA Z L , NARAYANAN V , et al . Preventing page faults from telling your secrets [C ] // Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security . New York:ACM Press , 2016 : 317 - 328 .
NING J T , HUANG X Y , SUSILO W , et al . Dual access control for cloud-based data storage and sharing [J ] . IEEE Transactions on Dependable and Secure Computing , 2022 , 19 ( 2 ): 1036 - 1048 .
FISCH B , VINAYAGAMURTHY D , BONEH D , et al . IRON:functional encryption using intel SGX [C ] // Proceedings of 2017 ACM SIGSAC Conference on Computer and Communications Security . New York:ACM Press , 2017 : 765 - 782 .
0
浏览量
495
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构