首页 | 本学科首页   官方微博 | 高级检索  
     

具有隐私保护的完整性可验证的关键字搜索方案
引用本文:刘雪艳,芦婷婷,杨晓涛.具有隐私保护的完整性可验证的关键字搜索方案[J].电子与信息学报,2021,43(1):218-225.
作者姓名:刘雪艳  芦婷婷  杨晓涛
作者单位:西北师范大学数学与统计学院 兰州 730070
基金项目:国家自然科学基金(61662071, 61562077)
摘    要:针对传统基于属性关键字搜索(ABKS)方案存在访问结构泄密、用户侧计算量高及缺乏完整性验证问题,该文提出具有隐私保护和完整性可验证的基于属性的关键字搜索方案。该方案提出了有序多值属性访问结构和有序多值属性集,固定每个属性的位置,减少参数及相关计算,提高了方案的效率,而在密钥生成时计算具体属性取值的哈希值,从而达到区别多值属性取值的不同。同时,采用Hash和对运算实现对访问结构的隐藏,防止访问结构泄密;采用倒序索引结构和Merkle树建立数据认证树,可验证云服务器返回文档和外包解密结果的正确性。此外,支持外包解密以降低用户侧的计算量。安全分析和实验表明所提方案实现云中共享数据的可验证性、关键字不可区分性和关键字不可链接性,且是高效的。

关 键 词:基于属性关键字搜索    有序多值属性集    隐藏访问结构    数据完整性认证    外包解密
收稿时间:2019-10-22

Verifiable Attribute-based Keyword Search Scheme with Privacy Preservation
Xueyan LIU,Tingting LU,Xiaotao YANG.Verifiable Attribute-based Keyword Search Scheme with Privacy Preservation[J].Journal of Electronics & Information Technology,2021,43(1):218-225.
Authors:Xueyan LIU  Tingting LU  Xiaotao YANG
Affiliation:School of Mathematics and Statistics, Northwest Normal University, Lanzhou 730070, China
Abstract:To address the problems of the leakage of access structure, high computation of user side and lack of integrity verification in current Attribute-Based Keyword Search (ABKS) scheme, a verifiable attribute-based keyword search scheme with privacy preservation is proposed. The scheme adopts the ordered multi-valued attribute access structure and ordered multi-valued attribute set, and fixes the position of each attribute to reduce the parameters and related computation cost and to improve the efficiency of the scheme, while in key generation, the Hash values of specific attributes are calculated to distinguish the different values of multi-valued attributes. At the same time, Hash and pair operation are used to hide the access structure and prevent the disclosure of the access structure. The inverted index structure and Merkle tree are used to establish the data authentication tree, which can verify the correctness of the document returned by the cloud server provider and the result of outsourced decryption. In addition, outsourced decryption is used to reduce the computation cost on the user side. Finally, formal proofs and experimental results show that the scheme achieve verifiability of shared data in the cloud, keyword undistinguishable and keyword unlinkable, and is efficient.
Keywords:
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号