[1]蒋 英,陈燕俐,高诗尧.文件分层-属性基多关键字可搜索加密方案[J].计算机技术与发展,2021,31(10):98-104.[doi:10. 3969 / j. issn. 1673-629X. 2021. 10. 017]
 JIANG Ying,CHEN Yan-li,GAO Shi-yao.File Hierarchy Attribute-based Multi-keyword Searchable Encryption Scheme[J].,2021,31(10):98-104.[doi:10. 3969 / j. issn. 1673-629X. 2021. 10. 017]
点击复制

文件分层-属性基多关键字可搜索加密方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
31
期数:
2021年10期
页码:
98-104
栏目:
网络与安全
出版日期:
2021-10-10

文章信息/Info

Title:
File Hierarchy Attribute-based Multi-keyword Searchable Encryption Scheme
文章编号:
1673-629X(2021)10-0098-07
作者:
蒋 英陈燕俐高诗尧
南京邮电大学 计算机学院、软件学院、网络空间安全学院,江苏 南京 210003
Author(s):
JIANG YingCHEN Yan-liGAO Shi-yao
School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
关键词:
属性加密云计算分层结构多关键字可搜索访问结构
Keywords:
attribute based encryptioncould computinghierarchy structuremulti-keyword searchableaccess structure
分类号:
TP309
DOI:
10. 3969 / j. issn. 1673-629X. 2021. 10. 017
摘要:
针对目前的文件分层的基于属性可搜索加密方案存在不支持 LSSS 访问结构以及多关键字密文较长等问题,提出了一个云环境下灵活高效、支持 LSSS 访问结构和文件分层的多关键字可搜索方案。 首先通过将秘密值分配的方法,将下层的秘密值直接嵌入上层的密文中,不仅缩短了分层加密文件的密文长度,还提高了加密、解密效率;其次通过对多关键字构造索引向量的方式,解决了目前多关键可搜索方案中关键字密文长度随关键字个数线性增加的问题,实现了关键字密文长度固定的多关键字搜索,并采用先关键字搜索,再解密的方式进一步提高了关键字的搜索效率。 最后通过将部分解密工作转移到云端,从而降低了用户的计算负担。 基于 q-parallel BDHE 假设下证明了该方案可抵抗选择明文安全攻击(CPA) , 理论分析和实验结果证明了方案的有效性。
Abstract:
In view of the problems of the current file hierarchy attribute based searchable encryption scheme which does not support LSSS access structure and has long keyword cipher text,a multi keyword searchable scheme supporting LSSS access structure and file hierarchy in cloud environment? is proposed. Firstly, the secret value of the lower layer is directly embedded into the upper layer cipher text by means of secret sharing,which not only shortens the length of the cipher text,but also improves the encryption and decryption efficiency of the hierarchical encrypted files. Secondly, by constructing index vector of multi-keywords,it solves the problem that the cipher text length of keywords in multi-keyword searchable scheme increases linearly with the number of keywords,realizes the fixed cipher text length of keywords,and keyword search first and then decryption is adopted to further improve the efficiency of keyword search. Finally, by transferring part of the decryption work to the cloud,the computing burden of users is reduced. Based on the assumption of q-parallel BDHE,it is proved that this scheme can resist chosen plain text attacks ( CPA) . Theoretical analysis and experimental results show the effectiveness of the scheme.

相似文献/References:

[1]王茜,朱志祥,史晨昱,等.应用于数据库安全保护的加解密引擎系统[J].计算机技术与发展,2014,24(01):143.
 WANG Qian[],ZHU Zhi-xiang[],SHI Chen-yu[],et al.Encryption and Decryption Engine System Applying to Database Security and Detection[J].,2014,24(10):143.
[2]陈丹伟 黄秀丽 任勋益.云计算及安全分析[J].计算机技术与发展,2010,(02):99.
 CHEN Dan-wei,HUANG Xiu-li,REN Xun-yi.Analysis of Cloud Computing and Cloud Security[J].,2010,(10):99.
[3]孙放 陈云芳 林杭锋.适用于富客户端的云计算模型[J].计算机技术与发展,2010,(08):96.
 SUN Fang,CHEN Yun-fang,LIN Hang-feng.Cloud Computing Model Applicable to Rich Client Applications[J].,2010,(10):96.
[4]郭苑 张顺颐 孙雁飞.物联网关键技术及有待解决的问题研究[J].计算机技术与发展,2010,(11):180.
 GUO Yuan,ZHANG Shun-yi,SUN Yan-fei.Research of Key Technologies and Unresolved Questions of Internet of Things[J].,2010,(10):180.
[5]李玲娟 张敏.云计算环境下关联规则挖掘算法的研究[J].计算机技术与发展,2011,(02):43.
 LI Ling-juan,ZHANG Min.Research on Algorithms of Mining Association Rule under Cloud Computing Environment[J].,2011,(10):43.
[6]王德政 申山宏 周宁宁.云计算环境下的数据存储[J].计算机技术与发展,2011,(04):81.
 WANG De-zheng,SHEN Shan-hong,ZHOU Ning-ning.Data Storage in Cloud Computing Environment[J].,2011,(10):81.
[7]宋丽华 姜家轩 张建成 田长录 马文征.黄河三角洲云计算平台关键技术的研究[J].计算机技术与发展,2011,(06):40.
 SONG Li-hua,JIANG Jia-xuan,ZHANG Jian-cheng,et al.Research of Key Technologies of Cloud Computing of Yellow River Delta[J].,2011,(10):40.
[8]田宏伟 解福 倪俊敏.云计算环境下基于粒子群算法的资源分配策略[J].计算机技术与发展,2011,(12):22.
 TIAN Hong-wei,XIE Fu,NI Jun-min.Resource Allocation Algorithm Based on Particle Swarm Algorithm in Cloud Computing Environment[J].,2011,(10):22.
[9]张慧 邢培振.云计算环境下信息安全分析[J].计算机技术与发展,2011,(12):164.
 ZHANG Hui,XING Pei-zhen.Information Security Analysis in Cloud Computing Environment[J].,2011,(10):164.
[10]张建成[] 宋丽华[] 鹿全礼[] 郭锐[] 刘永泉[].云计算方案分析研究[J].计算机技术与发展,2012,(01):165.
 ZHANG Jian-cheng,SONG Li-hua,LU Quan-li,et al.Study and Analysis of Cloud Computing Procedure[J].,2012,(10):165.

更新日期/Last Update: 2021-10-10