高级搜索

支持关键词搜索的属性代理重加密方案

刘振华 周佩琳 段淑红

引用本文: 刘振华, 周佩琳, 段淑红. 支持关键词搜索的属性代理重加密方案[J]. 电子与信息学报, 2018, 40(3): 683-689. doi: 10.11999/JEIT170448 shu
Citation:  LIU Zhenhua, ZHOU Peilin, DUAN Shuhong. Attribute-based Proxy Re-encryption Scheme with Keyword Search[J]. Journal of Electronics and Information Technology, 2018, 40(3): 683-689. doi: 10.11999/JEIT170448 shu

支持关键词搜索的属性代理重加密方案

摘要: 属性代理重加密机制既能实现数据共享又能实现数据转发,但这种机制通常并不支持数据检索功能,阻碍了属性代理重加密的发展应用。为了解决这一问题,该文提出一个支持关键词搜索的密文策略的属性代理重加密方案。通过将密钥分为属性密钥和搜索密钥,不仅可以实现关键词可搜索,而且实现了代理重加密。在验证阶段,云服务器既执行关键词验证,又可以对原始密文和重加密密文进行部分解密,从而减轻用户的计算负担。通过安全性分析,该方案可以实现数据安全性、检索分离、关键词隐藏和抗共谋攻击。

English

    1. [1]

      黄海平, 杜建澎, 戴华, 等. 一种基于云存储的多服务器多关键词可搜索加密方案[J]. 电子与信息学报, 2017, 39(2): 389-396. doi: 10.11999/JEIT160338.

    2. [2]

      YANG Chaowei, HUANG Qunying, LI Zhenlong, et al. Big data and cloud computing: Innovation opportunities and challenges[J]. International Journal of Digital Earth, 2017, 10(1): 13-53. doi: 10.1080/17538947.2016.1239771.

    3. [3]

      HUANG Haiping, DU Jianpeng, DAI Hua, et al. Multi-sever multi-keyword searchable encryption scheme based on cloud storage. Journal of Electronics Information Technology, 2017, 39(2): 389-396. doi: 10.11999/JEIT160338.

    4. [4]

      王光波, 王建华. 基于属性加密的云存储方案研究[J]. 电子与信息学报, 2016, 38(11): 29312939. doi: 10.11999/JEIT16006 4.

    5. [5]

      WANG Guangbo and WANG Jianhua. Research on cloud storage scheme with attribute-based encryption[J]. Journal of Electronics Information Technology, 2016, 38(11): 29312939. doi: 10.11999/JEIT160064.

    6. [6]

      ATTRAPADUNG N, HANAOKA G, MATSUMOTO T, et al. Attribute based encryption with direct efficiency tradeoff[C]. Proceedings of the 14th International Conference on Applied Cryptography and Network Security, London, United Kindom, 2016: 249-266. doi: 10.1007/978-3-319-39555-5_14.

    7. [7]

      SAHAI A and WATERS B. Fuzzy identity-based encryption[C]. Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 457-473. doi: 10.1007 /11426639_27.

    8. [8]

      GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2006: 89-98. doi: 10.1145/1180405.1180418.

    9. [9]

      WATERS B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization[C]. Proceedings of 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, 2011: 53-70. doi: 10.1007/978-3-642-19379-8_4.

    10. [10]

      GUO Shanqing, ZENG Yingpei, WEI Juan, et al. Attribute- based re-encryption scheme in the standard model[J]. Wuhan University Journal of Natural Sciences, 2008, 13(5): 621-625. doi: 10.1007/s11859-008-0522-5.

    11. [11]

      LIANG Xiaohui, CAO Zhenfu, LIN Huang, et al. Attribute based proxy re-encryption with delegating capabilities[C]. Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 2009: 276-286. doi: 10.1145/1533057. 1533094.

    12. [12]

      LIANG Kaitai, FANG Liming, SUSILO W, et al. A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security[C]. Proceedings of the 5th Intelligent Networking and Collaborative Systems (INCoS), Xian, China, 2013: 552-559. doi: 10.1109/INCoS.2013.103.

    13. [13]

      GE Chunpeng, SUSILO W, WANG Jiandong, et al. A key- policy aattribute-based proxy re-encryption without random oracles[J]. The Computer Journal, 2016, 59(7): 970-982. doi: 10.1093/comjnl/bxv100.

    14. [14]

      ZHANG Yinghui, LI Jin, CHEN Xiaofeng, et al. Anonymous attribute-based proxy re-encryption for access control in cloud computing[J]. Security and Communication Networks, 2016, 9(14): 2397-2411. doi: 10.1002/sec.1509.

    15. [15]

      SHI Yanfeng, LIU Jiqiang, HAN Zhen, et al. Attribute-based proxy re-rncryption with keyword search[J]. PloS One, 2014, 9(12): e116325(1-24). doi: 10.1371/journal.pone.0116325.

    16. [16]

      LIANG Kaitai and SUSILO W. Searchable attribute-based mechanism with efficient data sharing for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1981-1992. doi: 10.1109/TIFS.2015. 2442215.

    17. [17]

      WANG Changji, LI Wentao, LI Yuan, et al. A ciphertext- policy attribute-based encryption scheme supporting keyword search function[C]. Proceedings of the 5th International Symposium on Cyberspace Safety and Security (CSS), Hunan, China, 2013: 377-386. doi: 10.1007/978-3-319- 03584-0_28.

    18. [18]

      LI Jiazhi and ZHANG Lei. Attribute-based keyword search and data access control in cloud[C]. Proceedings of the 10th International Conference on Computational Intelligence and Security, Kunming, China, 2014: 382-386. doi: 10.1109/CIS. 2014.113.

    19. [19]

      ZHENG Qingji, XU Shouhuai, and ATENIESE G. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data[C]. Proceedings of the IEEE Conference on Computer Communications, Toronto, Canada, 2014: 522-530. doi: 10.1109/INFOCOM.2014.6847976.

    20. [20]

      SHAO Jun, CAO Zhenfu, LIANG Xiaohui, et al. Proxy re-encryption with keyword search[J]. Information Sciences, 2010, 180(13): 2576-2587. doi: 10.1016/j.ins.2010.03.026.

    1. [1]

      黄海平, 杜建澎, 戴华, 王汝传. 一种基于云存储的多服务器多关键词可搜索加密方案. 电子与信息学报, 2017, 39(2): 389-396.

    2. [2]

      张玉磊, 刘文静, 刘祥震, 张永洁, 王彩芬. 基于授权的多服务器可搜索密文策略属性基加密方案. 电子与信息学报, 2019, 41(8): 1808-1814.

    3. [3]

      张玉磊, 文龙, 王浩浩, 张永洁, 王彩芬. 多用户环境下无证书认证可搜索加密方案. 电子与信息学报, 2020, 42(0): 1-8.

    4. [4]

      张玉磊, 刘祥震, 郎晓丽, 张永洁, 陈文娟, 王彩芬. 云存储环境下多服务器的密钥聚合可搜索加密方案. 电子与信息学报, 2019, 41(3): 674-679.

    5. [5]

      赵志远, 朱智强, 王建华, 孙磊. 云存储环境下无密钥托管可撤销属性基加密方案研究. 电子与信息学报, 2018, 40(1): 1-10.

    6. [6]

      朱小玉, 刘琴, 王国军. 云存储中一种支持可验证的模糊查询加密方案. 电子与信息学报, 2017, 39(7): 1741-1747.

    7. [7]

      江明明, 郭宇燕, 余磊, 宋万干, 魏仕民. 有效的标准模型下格上基于身份的代理重加密. 电子与信息学报, 2019, 41(1): 61-66.

    8. [8]

      曹素珍, 郎晓丽, 刘祥震, 张玉磊, 王斐. 抗关键词猜测的授权可搜索加密方案. 电子与信息学报, 2019, 41(9): 2180-2186.

    9. [9]

      王尚平, 刘利军, 张亚玲. 一个高效的基于连接关键词的可搜索加密方案. 电子与信息学报, 2013, 35(9): 2266-2271.

    10. [10]

      孙瑾, 王小静, 王尚平, 任利利. 支持属性撤销的可验证多关键词搜索加密方案. 电子与信息学报, 2019, 41(1): 53-60.

    11. [11]

      刘西蒙, 马建峰, 熊金波, 贺拓, 李琦. 云计算环境下基于属性的可净化签名方案. 电子与信息学报, 2014, 36(7): 1749-1754.

    12. [12]

      赵志远, 王建华, 徐开勇. 定长密文且快速解密的分布式属性基加密方案研究. 电子与信息学报, 2017, 39(11): 2724-2732.

    13. [13]

      屠袁飞, 杨庚, 袁冯杰. 脑机接口技术中安全高效的属性基访问控制. 电子与信息学报, 2017, 39(10): 2495-2503.

    14. [14]

      赵斌, 肖创柏, 张问银, 古雪. 基于博弈理论的访问控制奖惩激励约束机制. 电子与信息学报, 2019, 41(4): 1002-1009.

    15. [15]

      纪倩, 杨超, 赵文红, 张俊伟. 一种新的云存储数据容错存储方式检验方法. 电子与信息学报, 2016, 38(10): 2640-2646.

    16. [16]

      潘颖, 元昌安, 李文敬, 程茂华. 一种支持更新操作的数据空间访问控制方法. 电子与信息学报, 2016, 38(8): 1935-1941.

    17. [17]

      刘建, 王会梅, 鲜明, 黄昆. 云存储中一种抗窃听攻击的弱安全再生码. 电子与信息学报, 2014, 36(5): 1221-1228.

    18. [18]

      牛淑芬, 王金风, 王伯彬, 贾向东, 杜小妮. 区块链上基于B+树索引结构的密文排序搜索方案. 电子与信息学报, 2019, 41(10): 2409-2415.

    19. [19]

      雒江涛, 何宸, 王俊霞. 命名数据网络中可追溯且轻量级的细粒度访问控制机制. 电子与信息学报, 2019, 41(10): 2428-2434.

    20. [20]

      付东来, 彭新光, 杨玉丽. 基于可信平台模块的外包数据安全访问方案. 电子与信息学报, 2013, 35(7): 1766-1773.

  • 加载中
计量
  • PDF下载量:  230
  • 文章访问数:  356
  • HTML全文浏览量:  34
文章相关
  • 收稿日期:  2017-05-11
  • 录用日期:  2017-12-13
  • 刊出日期:  2018-03-19
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

/

返回文章