浏览全部资源
扫码关注微信
1. 西北师范大学计算机科学与工程学院,甘肃 兰州 730070
2. 深圳技术大学大数据与互联网学院,广东 深圳 518118
[ "杨小东(1981- ),男,甘肃甘谷人,博士,西北师范大学教授,主要研究方向为信息安全及云计算安全" ]
[ "田甜(1998- ),女,甘肃兰州人,西北师范大学硕士生,主要研究方向为信息安全及密码学" ]
[ "王嘉琪(1997- ),女,甘肃兰州人,西北师范大学硕士生,主要研究方向为密码学及信息安全" ]
[ "李梅娟(1997- ),女,甘肃临洮人,西北师范大学硕士生,主要研究方向为密码学及信息安全" ]
[ "王彩芬(1963- ),女,河北安国人,博士,深圳技术大学教授,主要研究方向为密码学及信息安全" ]
网络出版日期:2022-05,
纸质出版日期:2022-05-25
移动端阅览
杨小东, 田甜, 王嘉琪, 等. 基于云边协同的无证书多用户多关键字密文检索方案[J]. 通信学报, 2022,43(5):144-154.
Xiaodong YANG, Tian TIAN, Jiaqi WANG, et al. Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration[J]. Journal on communications, 2022, 43(5): 144-154.
杨小东, 田甜, 王嘉琪, 等. 基于云边协同的无证书多用户多关键字密文检索方案[J]. 通信学报, 2022,43(5):144-154. DOI: 10.11959/j.issn.1000-436x.2022104.
Xiaodong YANG, Tian TIAN, Jiaqi WANG, et al. Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration[J]. Journal on communications, 2022, 43(5): 144-154. DOI: 10.11959/j.issn.1000-436x.2022104.
针对工业物联网环境中密文数据检索面临的单用户单关键字搜索、计算开销过大、安全等级较低等问题,提出了一种基于云边协同的无证书多用户多关键字密文检索方案。所提方案通过设定用户访问权限表并执行一次加密算法,实现了支持用户访问权限更新的多用户搜索。利用线性扫描方法进行关键字密文与陷门的匹配计算,并引入云边协同的计算模式提高计算效率,实现了关键字索引不完全包含检索关键字情况下的多关键字密文检索。基于无证书加密体制解决了密钥托管与证书管理问题,并使用数字签名技术确保了关键字密文的可认证性。安全分析结果表明,所提方案在随机预言模型下能抵抗内部关键字猜测攻击。仿真实验结果表明,与同类方案相比较,所提方案具有较高的计算效率。
To solve the problems of single-user search
single-keyword search
high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment
a certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration was proposed.A user access permissions table was set and once encryption algorithm was executed to realize multi-user search and update users’ access permissions.A cloud-side collaborative computing model was introduced to match keyword ciphertext and keyword trapdoor efficiently by a linear scanning method when the keyword ciphertext does not entirely contain the search keyword.Key escrow and certificate management problems were solved by utilizing certificateless encryption system.Keyword ciphertext authentication was ensured by using digital signature technology.The security analysis results show that the proposed scheme can resist internal keyword guessing attacks under the random oracle model.Simulation results show that the proposed scheme has higher computational efficiency compared with similar schemes.
WU H , TIAN H , NIE G F , et al . Wireless powered mobile edge computing for industrial Internet of things systems [J ] . IEEE Access , 2020 , 8 : 101539 - 101549 .
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data [C ] // Proceedings of 2000 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2000 : 44 - 55 .
LIU Z L , WENG J , LI J , et al . Cloud-based electronic health record system supporting fuzzy keyword search [J ] . Soft Computing , 2016 , 20 ( 8 ): 3243 - 3255 .
BONEH D , DI C G , OSTROVSKY R , et al . Public key encryption with keyword search [C ] // 2004 International Conference on the Theory and Applications of о Cryptographic Techniques . Berlin:Springer , 2004 : 506 - 522 .
PENG Y G , CUI J T , PENG C G , et al . Certificateless public key encryption with keyword search [J ] . China Communications , 2014 , 11 ( 11 ): 100 - 113 .
ZHENG Q J , LI X X , AZGIN A . CLKS:certificateless keyword search on encrypted data [M ] . Cham : Springer International Publishing , 2015 .
MA M M , HE D B , KHAN M K , et al . Certificateless searchable public key encryption scheme for mobile healthcare system [J ] . Computers & Electrical Engineering , 2018 , 65 : 413 - 424 .
WU T Y , MENG C , CHEN C M , et al . On the security of a certificateless public key encryption with keyword search [C ] // Advances in Intelligent Information Hiding and Multimedia Signal Processing . Berlin:Springer , 2017 : 191 - 197 .
GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data [C ] // Applied Cryptography and Network Security . Berlin:Springer , 2004 : 31 - 45 .
CURTMOLA R , GARAY J , KAMARA S , et al . Searchable symmetric encryption:improved definitions and efficient constructions [J ] . Journal of Computer Security , 2011 , 19 ( 5 ): 895 - 934 .
张玉磊 , 文龙 , 王浩浩 , 等 . 多用户环境下无证书认证可搜索加密方案 [J ] . 电子与信息学报 , 2020 , 42 ( 5 ): 1094 - 1101 .
ZHANG Y L , WEN L , WANG H H , et al . Certificateless authentication searchable encryption scheme for multi-user [J ] . Journal of Electronics & Information Technology , 2020 , 42 ( 5 ): 1094 - 1101 .
SUN L X , XU C X , LI C , et al . Server-aided searchable encryption in multi-user setting [J ] . Computer Communications , 2020 , 164 : 25 - 30 .
MA M M , FAN S Q , FENG D G . Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine [J ] . Journal of Information Security and Applications , 2020 ,55:102652.
PAN X Y , LI F G . Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability [J ] . Journal of Systems Architecture , 2021 ,115:102075.
WU L B , ZHANG Y B , MA M M , et al . Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things [J ] . Annals of Telecommunications , 2019 , 74 ( 7/8 ): 423 - 434 .
CHENAM V B , ALI S T . A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA [J ] . Computer Standards & Interfaces , 2022 ,81:103603.
PAKNIAT N , SHIRALY D , ESLAMI Z . Certificateless authenticated encryption with keyword search:enhanced security model and a concrete construction for industrial IoT [J ] . Journal of Information Security and Applications , 2020 ,53:102525.
MA M M , HE D B , KUMAR N , et al . Certificateless searchable public key encryption scheme for industrial Internet of things [J ] . IEEE Transactions on Industrial Informatics , 2018 , 14 ( 2 ): 759 - 767 .
黄海平 , 杜建澎 , 戴华 , 等 . 一种基于云存储的多服务器多关键字可搜索加密方案 [J ] . 电子与信息学报 , 2017 , 39 ( 2 ): 389 - 396 .
HUANG H P , DU J P , DAI H , et al . Multi-sever multi-keyword searchable encryption scheme based on cloud storage [J ] . Journal of Electronics & Information Technology , 2017 , 39 ( 2 ): 389 - 396 .
张强 , 王国军 , 张少波 . 基于多边缘服务器的个性化搜索隐私保护方法 [J ] . 通信学报 , 2019 , 40 ( 2 ): 40 - 50 .
ZHANG Q , WANG G J , ZHANG S B . Method of privacy protection based on multiple edge servers in personalized search [J ] . Journal on Communications , 2019 , 40 ( 2 ): 40 - 50 .
SHAO J , CAO Z F , WANG L C , et al . Proxy re-signature schemes without random oracles [R ] . IACR Cryptology EPrint Archive , 2007 .
HUANG Q , LI H B . An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks [J ] . Information Sciences , 2017 , 403/404 : 1 - 14 .
0
浏览量
520
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构