Advanced Search
Volume 41 Issue 9
Sep.  2019
Turn off MathJax
Article Contents
Suzhen CAO, Xiaoli LANG, Xiangzhen LIU, Yulei ZHANG, Fei WANG. Delegate Searchable Encryption Scheme Resisting Keyword Guess[J]. Journal of Electronics & Information Technology, 2019, 41(9): 2180-2186. doi: 10.11999/JEIT181103
Citation: Suzhen CAO, Xiaoli LANG, Xiangzhen LIU, Yulei ZHANG, Fei WANG. Delegate Searchable Encryption Scheme Resisting Keyword Guess[J]. Journal of Electronics & Information Technology, 2019, 41(9): 2180-2186. doi: 10.11999/JEIT181103

Delegate Searchable Encryption Scheme Resisting Keyword Guess

doi: 10.11999/JEIT181103
Funds:  The National Natural Science Foundation of China (61662071, 61662069, 61462077);The Higher Educational Scientific Research Foundation of Gansu Province (2017A-003, 2018A-207)
  • Received Date: 2018-11-28
  • Rev Recd Date: 2019-03-12
  • Available Online: 2019-03-28
  • Publish Date: 2019-09-10
  • Most existing searchable encryption schemes only support the search for keyword sets, and the data users can not quickly identify the file keyword information returned by the server. Meanwhile, considering the server has strong computing power, it may judge keyword information from single keywords and the identity of the data consumer is not verified. In this paper, the data user and data owner are delegated server to verify whether the data ueer is a legitimate user; if legal, the delegated server can detect the validity of the return ciphertext with data user. The data user uses the server public key, keywords and pseudo-keywords to generate trapdoor, in order to ensure the indistinguishable of the keywords, a delegated multi-keyword searchable encryption scheme is designed, which is resistant to keyword guessing of data user authentication. Meanwhile, when the data owner encrypts, the public key of the cloud server, the delegated server, and the data user can be used to prevent collusion attacks. In the random oracle model the security of the proposed scheme is proved. The experiment results show that the scheme is efficient under the multi-keyword environment.
  • loading
  • SONG D X, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. Proceedings of 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2000: 44–55.
    LIU Zheli, WENG Jian, LI Jin, et al. Cloud-based electronic health record system supporting fuzzy keyword search[J]. Soft Computing, 2016, 20(8): 3243–3255. doi: 10.1007/s00500-015-1699-0
    王尚平, 刘利军, 张亚玲. 一个高效的基于连接关键词的可搜索加密方案[J]. 电子与信息学报, 2013, 35(9): 2266–2271. doi: 10.3724/SP.J.1146.2012.01036

    WANG Shangping, LIU Lijun, and ZHANG Yaling. An efficient conjunctive keyword searchable encryption scheme[J]. Journal of Electronics &Information Technology, 2013, 35(9): 2266–2271. doi: 10.3724/SP.J.1146.2012.01036
    黄海平, 杜建澎, 戴华, 等. 一种基于云存储的多服务器多关键词可搜索加密方案[J]. 电子与信息学报, 2017, 39(2): 389–396. doi: 10.11999/JEIT160338

    HUANG Haiping, DU Jianpeng, DAI Hua, et al. Multi-sever multi-keyword searchable encryption scheme based on cloud storage[J]. Journal of Electronics &Information Technology, 2017, 39(2): 389–396. doi: 10.11999/JEIT160338
    刘振华, 周佩琳, 段淑红. 支持关键词搜索的属性代理重加密方案[J]. 电子与信息学报, 2018, 40(3): 683–689. doi: 10.11999/JEIT170448

    LIU Zhenhua, ZHOU Peilin, and DUAN Shuhong. Attribute-based proxy re-encryption scheme with keyword search[J]. Journal of Electronics &Information Technology, 2018, 40(3): 683–689. doi: 10.11999/JEIT170448
    TARIQ H and AGARWAL P. Secure keyword search using dual encryption in cloud computing[J]. International Journal of Information Technology, 2018(7): 1–10. doi: 10.1007/s41870-018-0091-6
    CHEN Rongmao, MU Yi, YANG Guomin, et al. Dual-server public-key encryption with keyword search for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(4): 789–798. doi: 10.1109/TIFS.2015.2510822
    MIAO Yinbin, MA Jianfeng, LIU Ximeng, et al. VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings[J]. Science China Information Sciences, 2017, 60(12): 122105. doi: 10.1007/s11432-016-0540-x
    CUI Baojiang, LIU Zheli, and WANG Lingyu. Key-Aggregate Searchable Encryption (KASE) for group data sharing via cloud storage[J]. IEEE Transactions on Computers, 2016, 65(8): 2374–2385. doi: 10.1109/TC.2015.2389959
    ZHOU Rang, ZHANG Xiaosong, DU Xiaojiang, et al. File-centric multi-key aggregate keyword searchable encryption for industrial internet of things[J]. IEEE Transactions on Industrial Informatics, 2018, 14(8): 3648–3658. doi: 10.1109/TII.2018.2794442
    RHEE H S, PARK J H, SUSILO W, et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester[J]. Journal of Systems and Software, 2010, 83(5): 763–771. doi: 10.1016/j.jss.2009.11.726
    赵洋, 包文意, 熊虎, 等. 云计算里一种陷门无法识别的公钥搜索加密方案[J]. 信息网络安全, 2016(1): 1–5. doi: 10.3969/j.issn.1671-1122.2016.01.001

    ZHAO Yang, BAO Wenyi, XIONG Hu, et al. A scheme of public encryption keyword search with indistinguishable trapdoor[J]. Netinfo Security, 2016(1): 1–5. doi: 10.3969/j.issn.1671-1122.2016.01.001
    陆海宁. 可隐藏搜索模式的对称可搜索加密方案[J]. 信息网络安全, 2017(1): 38–42. doi: 10.3969/j.issn.1671-1122.2017.01.006

    LU Haining. Searchable symmetric encryption with hidden search pattern[J]. Netinfo Security, 2017(1): 38–42. doi: 10.3969/j.issn.1671-1122.2017.01.006
    IBRAIMI L, NIKOVA S, HARTEL P, et al. Public-key encryption with delegated search[C]. The 9th International Conference on Applied Cryptography and Network Security, Nerja, Spain, 2011: 532–549.
    TANG Qiang, MA Hua, and CHEN Xiaofeng. Extend the concept of public key encryption with delegated search[J]. The Computer Journal, 2015, 58(4): 724–734. doi: 10.1093/comjnl/bxt102
    WANG Wei, XU Peng, LI Hui, et al. Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts[J]. Future Generation Computer Systems, 2016, 55: 353–361. doi: 10.1016/j.future.2014.07.008
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(3)  / Tables(2)

    Article Metrics

    Article views (2608) PDF downloads(96) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return