大数据环境下支持多关键字的可搜索公钥加密方案
作者:
基金项目:

国家自然科学基金(61572370,61572379,61501333,U1536204)


A public key encryption with multiple keywords scheme for big data
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    云计算为大数据提供了强大的数据处理平台,而数据的安全和隐私问题也引起了人们的高度关注.本文提出了一个新的大数据环境下支持多关键字的无需安全信道的无证书可搜索公钥加密方案,并且证明了在随机预言机模型下,本文方案能够抵抗关键字猜测攻击.同时,效率分析表明,与Peng等方案相比,本文方案降低了计算代价和通信代价.

    Abstract:

    The continuous improvement of information technology will inevitably promote the arrival of the era of big data.Cloud computing provides a powerful data processing platform for big data.However,data security and privacy issues have aroused great concern.In this paper,we propose a new certificateless public key encryption scheme with multiple keywords search and free of secure channel for big data.We also prove that the proposed scheme can resist chosen keyword attack in random oracle model.The performance analysis shows that,the proposed scheme reduces the computation cost as well as the communication cost compared with the scheme proposed by Peng et al.in 2014.

    参考文献
    [1] Mayer-Schönberger V,Cukier K.Big data:A revolution that will transform how we live,work,and think[M].Boston,NY:Houghton Mifflin Harcourt,2013
    [2] Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[C]//IEEE Symposium on Security and Privacy,2000:44-55
    [3] Boneh D,Di Crescenzo G,Ostrovsky R,et al.Public key encryption with keyword search[C]//International Conference on the Theory and Applications of Cryptographic Techniques,2004:506-522
    [4] Baek J,Safavi-Naini R,Susilo W.Public key encryption with keyword search revisited[C]//International Conference on Computational Science and Its Applications,2008:1249-1259
    [5] Rhee H S,Park J H,Susilo W,et al.Trapdoor security in a searchable public-key encryption scheme with a designated tester[J].Journal of Systems and Software,2010,83(5):763-771
    [6] Xu P,Jin H,Wu Q H,et al.Public-key encryption with fuzzy keyword search:A provably secure scheme under keyword guessing attack[J].IEEE Transactions on Com-puters,2013,62(11):2266-2277
    [7] Shamir A.Identity-based cryptosystems and signature schemes[C]//Workshop on the Theory and Application of Cryptographic Techniques,1984:47-53
    [8] Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]//International Conference on the Theory and Application of Cryptology and Information Security,2003:452-473
    [9] Peng Y G,Cui J T,Peng C G,et al.Certificateless public key encryption with keyword search[J].China Communications,2014,11(11):100-113
    [10] Wu T Y,Meng F,Chen C M,et al.On the security of a certificateless searchable public key encryption scheme[C]//International Conference on Genetic and Evolutionary Computing,2016:113-119
    [11] Golle P,Staddon J,Waters B.Secure conjunctive keyword search over encrypted data[C]//International Conference on Applied Cryptography and Network Security,2004:31-45
    [12] Chang Y C,Mitzenmacher M.Privacy preserving keyword searches on remote encrypted data[C]//International Conference on Applied Cryptography and Network Security,2005:442-455
    [13] Wang T,Au M H,Wu W.An efficient secure channel free searchable encryption scheme with multiple keywords[C]//International Conference on Network and System Security,2016:251-265
    [14] Chen R M,Mu Y,Yang G M,et al.Dual-server public-key encryption with keyword search for secure cloud storage[J].IEEE Transactions on Information Forensics and Security,2016,11(4):789-798
    [15] Jiang P,Mu Y,Guo F C,et al.Public key encryption with authorized keyword search[C]//Australasian Conference on Information Security and Privacy,2016:170-186
    [16] Chen R M,Mu Y,Yang G M,et al.Server-aided public key encryption with keyword search[J].IEEE Transactions on Information Forensics and Security,2016,11(12):2833-2842
    [17] Li J G,Lin X N,Zhang Y C,et al.KSF-OABE:Outsourced attribute-based encryption with keyword search function for cloud storage[C]//IEEE Transactions on Services Computing,2016,DOI:10.1109/TSC.2016.2542813
    [18] Shamus Software Ltd.MIRACL library[EB/OL].(2015-05-01).http://www.shamus.ie/index.php?page=home
    相似文献
    引证文献
引用本文

马米米,何德彪,陈建华,刘芹.大数据环境下支持多关键字的可搜索公钥加密方案[J].南京信息工程大学学报(自然科学版),2017,9(5):462-471
MA Mimi, HE Debiao, CHEN Jianhua, LIU Qin. A public key encryption with multiple keywords scheme for big data[J]. Journal of Nanjing University of Information Science & Technology, 2017,9(5):462-471

复制
分享
文章指标
  • 点击次数:1240
  • 下载次数: 2858
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2017-05-31
  • 在线发布日期: 2017-09-14

地址:江苏省南京市宁六路219号    邮编:210044

联系电话:025-58731025    E-mail:nxdxb@nuist.edu.cn

南京信息工程大学学报 ® 2025 版权所有  技术支持:北京勤云科技发展有限公司