期刊文献+

一种轻量级的对称可搜索加密方案 被引量:4

A lightweight symmetric searchable encryption scheme
下载PDF
导出
摘要 针对对称可搜索加密技术在密文检索方面效率不足的问题,提出一种轻量级的对称可搜索加密方案。将包含相同关键词的密文文件进行分类存储,构建一种隐藏结构,并在原基础上添加包含相同关键词的密文文件,不需重新构建;检索时,服务器通过查找首个包含关键词的密文文件,便可根据相关性查找到其余包含该关键词的密文文件。仿真结果表明,该方案在具有较高的索引生成效率与令牌生成效率的同时也具有高效的密文检索效率。 To deal with insufficient efficiency of current symmetric searchable encryption technology in searching on encrypted data,a lightweight symmetric searchable encryption scheme is proposed.In this scheme,a ciphertext file containing the same keywords is classified and stored,and a hidden structure is built.When adding a ciphertext file containing the same keywords,it can be added on the original basis without rebuilding.The server can find the rest of the ciphertext files containing the keywords based on the relevance after finding out the first ciphertext file containing keywords.Simulation results show that the proposed scheme has high index generation efficiency and token generation efficiency,and also has efficient ciphertext retrieval efficiency.
作者 郑东 王清瀚 秦宝东 ZHENG Dong;WANG Qinghan;QIN Baodong(School of Cyberspace Security,Xi'an University of Posts and Telecommunications,Xi'an 710121,China)
出处 《西安邮电大学学报》 2020年第3期1-6,共6页 Journal of Xi’an University of Posts and Telecommunications
基金 国家自然科学基金项目(61872292)。
关键词 对称可搜索加密 轻量级 云计算 symmetric searchable encryption lightweight cloud computing
  • 相关文献

参考文献3

二级参考文献120

  • 1ZHENG Dong,LI Xiangxue,CHEN Kefei.LFSR-based Ring Signature Scheme[J].Chinese Journal of Electronics,2007,16(3):397-400. 被引量:3
  • 2方黎明.带关键字搜索公钥加密的研究[D].南京:南京航空航天大学,2012.
  • 3Song XD,Wagner D,Perrig A.Practical techniques for searches on encrypted data.In:Proc.of the IEEE Symp.on Security and Privacy.IEEE Press,2000.44-55.[doi:10.1109/SECPRI.2000.84B445].
  • 4Boneh D,Di Crescenzo G,Ostrovsky R,Persiano G.Public key encryption with keyword search.In:Camenisch LJ,Cachin C,eds.Proc.of the Advances in Cryptology-EUROCRYPT 2004.LNCS 3027,Berlin:Springer-Verlag,2004.506-522.[doi:10.1007/978-3-540-24676-3J0].
  • 5Feng DG,Zhang M,Zhang Y,Xu Z.Study on cloud computing security.Ruan Jian Xue Bao/Joumal of Softwase,2011,22(1):71-83(in Chinese with English abstract).http://www.jos.org.cn/1000-9B25/3958.htxn[doi:10.3724/SP.J.1001.2011.03958].
  • 6Goh E.Secure indexes.Technical Report,20037216,IACR ePrint Cryptography Archive,2003.http://eprinUacr.org/2003/216.
  • 7Chang Y,Mitzenmacher M.Privacy preserving keyword searches on remote encrypted data.In:Ioannidis J,Keromytis A,Yung M,eds.Proc.of the Applied Cryptography and Network Security.LNCS 3531,Berlin:Springer-Verlag,2004.391-421.[doi:10.1007/11496137一30].
  • 8Curtmola R,Garay J,Kamara S,Ostrovsky R.Searchable symmetric encryption:Improved definitions and efficient constructions.In:Proc.of the 13th ACM Conf.on Computer and Communications Security (CCS 2006).New York:ACM Press,2006.79-88.
  • 9Van Liesdonk P,Sedghi S,Doumen J,Hartel P,Jonker W.Computationally efficient searchable symmetric encryption.In:Jonker W,Petkovic M,eds.Proc.of the Secure Data Management.LNCS 6358,Berlin;Springer-Verlag,2010,87-100.[doi:10.1007/978-3-642-15546-8-7].
  • 10Kamara S,Papamanthou C,Roeder T.Dynamic searchable symmetric encryption.In:Proc.of the 19th ACM Conf.on Computer and Communications Security (CCS 2012).New York:ACM Press,2012.965-976.[doi;10.1145/2382196.2382298].

共引文献151

同被引文献42

引证文献4

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部