浏览全部资源
扫码关注微信
1. 中国电子科技集团公司第三十六研究所,浙江 嘉兴 314033
2. 电磁空间安全全国重点实验室,浙江 嘉兴 314033
[ "李志单(1989- ),男,博士,中国电子科技集团公司第三十六研究所工程师,主要研究方向为网络安全、信息安全、公钥密码等" ]
[ "陈勇群(1987- ),男,博士,中国电子科技集团公司第三十六研究所高级工程师,主要研究方向为网络安全、无线网络安全、网络协议分析" ]
[ "王巍(1980- ),男,博士,中国电子科技集团公司第三十六研究所研究员、技术创新部主任、电磁空间安全全国重点实验室常务副主任,主要研究方向为无线网络安全、网络协议分析、电子对抗网络安全等" ]
网络出版日期:2023-11,
纸质出版日期:2023-11-20
移动端阅览
李志单, 陈勇群, 王巍. 基于计数布隆过滤器的属性基多关键词可搜索加密方案[J]. 电信科学, 2023,39(11):116-127.
Zhidan LI, Yongqun CHEN, Wei WANG. Attribute-based multi-keyword searchable encryption scheme based on counting Bloom filters[J]. Telecommunications science, 2023, 39(11): 116-127.
李志单, 陈勇群, 王巍. 基于计数布隆过滤器的属性基多关键词可搜索加密方案[J]. 电信科学, 2023,39(11):116-127. DOI: 10.11959/j.issn.1000-0801.2023237.
Zhidan LI, Yongqun CHEN, Wei WANG. Attribute-based multi-keyword searchable encryption scheme based on counting Bloom filters[J]. Telecommunications science, 2023, 39(11): 116-127. DOI: 10.11959/j.issn.1000-0801.2023237.
为解决传统公钥密码体制下的可搜索加密方案检索效率低、关键词索引存储开销大、索引不支持动态更新等问题,基于计数布隆过滤器良好的空间和时间效率判断元素是否属于某个集合的特性,将此特性应用于可搜索加密建立关键词索引,即将关键词集合映射到一个二进制向量中,从而降低关键词存储开销;同时,利用计数布隆过滤器可删除的特性实现关键词索引的动态更新。此外,为防止敌手通过统计分析手段从二进制向量中推断出关键词明文信息,将二进制向量利用置换进行盲化,然后将置换利用属性加密进行秘密共享,合法用户正确生成关键词陷门后,服务商基于用户的关键词陷门帮助用户完成关键词匹配查询。最后,安全性分析和仿真实验证明了方案的安全性和高效性。
To address the problems of low retrieval efficiency of searchable encryption scheme under traditional public key cryptosystem
high storage overhead of keyword index
and index does not support dynamic update
based on the good space and time efficiency of counting Bloom filter to determine whether an element belongs to a certain set
the feature into searchable encryption was applied to establish keyword index
thus
the keyword set was mapped into a binary vector
thereby reducing the keyword storage cost.Simultaneously
the feature of counting Bloom filter can be deleted was used to realize the dynamic update of keyword index.In addition
to prevent adversaries from inferring keyword plaintext information from binary vectors through statistical analysis
the binary vector was blinded by permutation
and then the permutation was encrypted by attribute-based encryption for secret sharing.After legitimate users generated keyword traps correctly
the service provider helped users complete keyword matching queries based on the user’s keyword trapdoor.Finally
the security and efficiency of the scheme were proved through security analysis and simulation experiments.
ARMBRUST M , FOX A , GRIFFITH R , et al . A view of cloud computing [J ] . Communications of the ACM , 2010 , 53 ( 4 ): 50 - 58 .
YU Y , LI Y N , AU M H , et al . Public cloud data auditing with practical key update and zero knowledge privacy [M ] // Information security and privacy . Cham : Springer International Publishing , 2016 : 389 - 405 .
KAMARA S , LAUTER K . Cryptographic cloud storage [M ] // Financial cryptography and data security . Heidelberg : Springer , 2010 : 136 - 149 .
ARORA R , PARASHAR A . Secure user data in cloud computing using encryption algorithms [J ] . International Journal of Engineering Research and Applications , 2013 , 3 ( 4 ): 1922 - 1926 .
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data [C ] // Proceeding of 2000 IEEE Symposium on Security & Privacy . Piscataway:IEEE Press , 2000 .
BONEH D , DI CRESCENZO G , OSTROVSKY R , et al . Public key encryption with keyword search [C ] // Proceeding of 2004 International Conference on The Theory and Applications of Cryptographic Techniques . Heidelberg:Springer , 2004 : 506 - 522 .
MIAO Y B , MA J F , LIU X M , et al . m 2 -ABKS:attribute-based multi-keyword search over encrypted personal health records in multi-owner setting [J ] . Journal of Medical Systems , 2016 , 40 ( 11 ): 1 - 12 .
ZHANG R , XUE R , YU T , et al . PVSAE:a public verifiable searchable encryption service framework for outsourced encrypted data [C ] // Proceedings of 2016 IEEE International Conference on Web Services (ICWS) . Piscataway:IEEE Press , 2016 : 428 - 435 .
SUN W H , YU S C , LOU W J , et al . Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud [J ] . IEEE Transactions on Parallel and Distributed Systems , 2016 , 27 ( 4 ): 1187 - 1198 .
MIAO Y B , MA J F , LIU X M , et al . Practical attribute-based multi-keyword search scheme in mobile crowdsourcing [J ] . IEEE Internet of Things Journal , 2018 , 5 ( 4 ): 3008 - 3018 .
MIAO Y B , MA J F , LIU X M , et al . Attribute-based keyword search over hierarchical data in cloud computing [J ] . IEEE Transactions on Services Computing , 2020 , 13 ( 6 ): 985 - 998 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // Proceedings of 2007 IEEE Symposium on Security and Privacy (SP’07) . Piscataway:IEEE Press , 2007 : 321 - 334 .
ZHENG Q J , XU S H , ATENIESE G . VABKS:Verifiable attribute-based keyword search over outsourced encrypted data [C ] // Proceedings of IEEE INFOCOM 2014-IEEE Conference on Computer Communications . Piscataway:IEEE Press , 2014 : 522 - 530 .
张晓敏 . 基于布隆过滤器属性基的多关键词可搜索方案 [J ] . 计算机与现代化 , 2021 ( 8 ): 104 - 111 .
ZHANG X M . An attribute-based multi-keyword searchable scheme based on Bloom filters [J ] . Computer and Modernization , 2021 ( 8 ): 104 - 111 .
李志单 . 云存储中基于属性加密的数据访问控制和隐私保护研究 [D ] . 北京:北京邮电大学 , 2020 .
LI Z D . Research on data access control and privacy protection based on attribute-based encryption in cloud storage [D ] . Beijing:Beijing University of Posts and Telecommunications , 2020 .
0
浏览量
53
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构