首页 | 本学科首页   官方微博 | 高级检索  
     

支持策略隐藏且密文长度恒定的可搜索加密方案
引用本文:杨小东,李婷,麻婷春,陈桂兰,王彩芬.支持策略隐藏且密文长度恒定的可搜索加密方案[J].电子与信息学报,2021,43(4):900-907.
作者姓名:杨小东  李婷  麻婷春  陈桂兰  王彩芬
作者单位:1.西北师范大学计算机科学与工程学院 兰州 7300702.深圳技术大学大数据与互联网学院 深圳 518118
基金项目:国家自然科学基金(61662069, 61562077),中国博士后科学基金(2017M610817),兰州市科技计划项目(2013-4-22),西北师范大学青年教师科研能力提升计划(NWNU-LKQN-14-7)
摘    要:属性加密体制是实现云存储中数据灵活访问控制的关键技术之一,但已有的属性加密方案存在密文存储开销过大和用户隐私泄露等问题,并且不能同时支持云端数据的公开审计。为了解决这些问题,该文提出一个新的可搜索属性加密方案,其安全性可归约到q-BDHE问题和CDH问题的困难性。该方案在支持关键词搜索的基础上,实现了密文长度恒定;引入策略隐藏思想,防止攻击者获取敏感信息,确保了用户的隐私性;通过数据公开审计机制,实现了云存储中数据的完整性验证。与已有的同类方案相比较,该方案有效地降低了数据的加密开销、关键词的搜索开销、密文的存储成本与解密开销,在云存储环境中具有较好的应用前景。

关 键 词:云存储    属性加密    密文长度恒定    关键词搜索    公开审计
收稿时间:2020-01-20

Searchable Encryption Scheme Supporting Policy Hiding and Constant Ciphertext Length
Xiaodong YANG,Ting LI,Tingchun MA,Guilan CHEN,Caifen WANG.Searchable Encryption Scheme Supporting Policy Hiding and Constant Ciphertext Length[J].Journal of Electronics & Information Technology,2021,43(4):900-907.
Authors:Xiaodong YANG  Ting LI  Tingchun MA  Guilan CHEN  Caifen WANG
Affiliation:1.College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China2.College of Big Data and Internet, Shenzhen Technology University, Shenzhen 518118, China
Abstract:The Attribute-Based Encryption (ABE) mechanism is one of the key technologies for implementing flexible access control of data in cloud storage. However, the existing ABE schemes have some problems, such as too much ciphertext storage overhead and user privacy leakage, and unsupported public auditing of cloud data. To solve these problems, a new searchable ABE scheme is proposed, and its security can be reduced to the difficulty of q-BDHE (q –decisional Bilinear Diffie-Hellman Exponent) problem and CDH (Computational Diffie-Hellman) problem. The proposed scheme achieves a constant ciphertext length on the basis of supporting keyword search. By introducing strategies to hide ideas, it prevents attackers from obtaining sensitive information and ensures the privacy of users. And the integrity of the data in cloud storage is verified through data public audit mechanism. Compared with the existing similar schemes, this scheme greatly reduces the data encryption overhead, keyword search overhead, ciphertext storage cost and decryption cost, which has a good application prospect to the cloud storage environment.
Keywords:
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号