高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

支持关键词搜索的属性代理重加密方案

刘振华 周佩琳 段淑红

刘振华, 周佩琳, 段淑红. 支持关键词搜索的属性代理重加密方案[J]. 电子与信息学报, 2018, 40(3): 683-689. doi: 10.11999/JEIT170448
引用本文: 刘振华, 周佩琳, 段淑红. 支持关键词搜索的属性代理重加密方案[J]. 电子与信息学报, 2018, 40(3): 683-689. doi: 10.11999/JEIT170448
LIU Zhenhua, ZHOU Peilin, DUAN Shuhong. Attribute-based Proxy Re-encryption Scheme with Keyword Search[J]. Journal of Electronics & Information Technology, 2018, 40(3): 683-689. doi: 10.11999/JEIT170448
Citation: LIU Zhenhua, ZHOU Peilin, DUAN Shuhong. Attribute-based Proxy Re-encryption Scheme with Keyword Search[J]. Journal of Electronics & Information Technology, 2018, 40(3): 683-689. doi: 10.11999/JEIT170448

支持关键词搜索的属性代理重加密方案

doi: 10.11999/JEIT170448
基金项目: 

国家重点研发计划(2017YFB0802000),国家自然科学基金(61472470),陕西省教育厅专项科研计划(17JK0362)

Attribute-based Proxy Re-encryption Scheme with Keyword Search

Funds: 

The National Key RD Program of China (2017YFB0802000), The National Natural Science Foundation of China (61472470), The Scientific Research Plan Project of Education Department of Shaanxi Province (17JK0362)

  • 摘要: 属性代理重加密机制既能实现数据共享又能实现数据转发,但这种机制通常并不支持数据检索功能,阻碍了属性代理重加密的发展应用。为了解决这一问题,该文提出一个支持关键词搜索的密文策略的属性代理重加密方案。通过将密钥分为属性密钥和搜索密钥,不仅可以实现关键词可搜索,而且实现了代理重加密。在验证阶段,云服务器既执行关键词验证,又可以对原始密文和重加密密文进行部分解密,从而减轻用户的计算负担。通过安全性分析,该方案可以实现数据安全性、检索分离、关键词隐藏和抗共谋攻击。
  • 黄海平, 杜建澎, 戴华, 等. 一种基于云存储的多服务器多关键词可搜索加密方案[J]. 电子与信息学报, 2017, 39(2): 389-396. doi: 10.11999/JEIT160338.
    YANG Chaowei, HUANG Qunying, LI Zhenlong, et al. Big data and cloud computing: Innovation opportunities and challenges[J]. International Journal of Digital Earth, 2017, 10(1): 13-53. doi: 10.1080/17538947.2016.1239771.
    HUANG Haiping, DU Jianpeng, DAI Hua, et al. Multi-sever multi-keyword searchable encryption scheme based on cloud storage. Journal of Electronics Information Technology, 2017, 39(2): 389-396. doi: 10.11999/JEIT160338.
    王光波, 王建华. 基于属性加密的云存储方案研究[J]. 电子与信息学报, 2016, 38(11): 29312939. doi: 10.11999/JEIT16006 4.
    WANG Guangbo and WANG Jianhua. Research on cloud storage scheme with attribute-based encryption[J]. Journal of Electronics Information Technology, 2016, 38(11): 29312939. doi: 10.11999/JEIT160064.
    ATTRAPADUNG N, HANAOKA G, MATSUMOTO T, et al. Attribute based encryption with direct efficiency tradeoff[C]. Proceedings of the 14th International Conference on Applied Cryptography and Network Security, London, United Kindom, 2016: 249-266. doi: 10.1007/978-3-319-39555-5_14.
    SAHAI A and WATERS B. Fuzzy identity-based encryption[C]. Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 457-473. doi: 10.1007 /11426639_27.
    GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2006: 89-98. doi: 10.1145/1180405.1180418.
    WATERS B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization[C]. Proceedings of 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, 2011: 53-70. doi: 10.1007/978-3-642-19379-8_4.
    GUO Shanqing, ZENG Yingpei, WEI Juan, et al. Attribute- based re-encryption scheme in the standard model[J]. Wuhan University Journal of Natural Sciences, 2008, 13(5): 621-625. doi: 10.1007/s11859-008-0522-5.
    LIANG Xiaohui, CAO Zhenfu, LIN Huang, et al. Attribute based proxy re-encryption with delegating capabilities[C]. Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 2009: 276-286. doi: 10.1145/1533057. 1533094.
    LIANG Kaitai, FANG Liming, SUSILO W, et al. A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security[C]. Proceedings of the 5th Intelligent Networking and Collaborative Systems (INCoS), Xian, China, 2013: 552-559. doi: 10.1109/INCoS.2013.103.
    GE Chunpeng, SUSILO W, WANG Jiandong, et al. A key- policy aattribute-based proxy re-encryption without random oracles[J]. The Computer Journal, 2016, 59(7): 970-982. doi: 10.1093/comjnl/bxv100.
    ZHANG Yinghui, LI Jin, CHEN Xiaofeng, et al. Anonymous attribute-based proxy re-encryption for access control in cloud computing[J]. Security and Communication Networks, 2016, 9(14): 2397-2411. doi: 10.1002/sec.1509.
    SHI Yanfeng, LIU Jiqiang, HAN Zhen, et al. Attribute-based proxy re-rncryption with keyword search[J]. PloS One, 2014, 9(12): e116325(1-24). doi: 10.1371/journal.pone.0116325.
    LIANG Kaitai and SUSILO W. Searchable attribute-based mechanism with efficient data sharing for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1981-1992. doi: 10.1109/TIFS.2015. 2442215.
    WANG Changji, LI Wentao, LI Yuan, et al. A ciphertext- policy attribute-based encryption scheme supporting keyword search function[C]. Proceedings of the 5th International Symposium on Cyberspace Safety and Security (CSS), Hunan, China, 2013: 377-386. doi: 10.1007/978-3-319- 03584-0_28.
    LI Jiazhi and ZHANG Lei. Attribute-based keyword search and data access control in cloud[C]. Proceedings of the 10th International Conference on Computational Intelligence and Security, Kunming, China, 2014: 382-386. doi: 10.1109/CIS. 2014.113.
    ZHENG Qingji, XU Shouhuai, and ATENIESE G. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data[C]. Proceedings of the IEEE Conference on Computer Communications, Toronto, Canada, 2014: 522-530. doi: 10.1109/INFOCOM.2014.6847976.
    SHAO Jun, CAO Zhenfu, LIANG Xiaohui, et al. Proxy re-encryption with keyword search[J]. Information Sciences, 2010, 180(13): 2576-2587. doi: 10.1016/j.ins.2010.03.026.
  • 加载中
计量
  • 文章访问数:  1733
  • HTML全文浏览量:  265
  • PDF下载量:  329
  • 被引次数: 0
出版历程
  • 收稿日期:  2017-05-11
  • 修回日期:  2017-12-13
  • 刊出日期:  2018-03-19

目录

    /

    返回文章
    返回