首页 | 本学科首页   官方微博 | 高级检索  
     

公钥可搜索加密体制综述
作者姓名:秦志光  徐骏  聂旭云  熊虎
作者单位:电子科技大学信息与软件工程学院 成都 中国 610054,电子科技大学信息与软件工程学院 成都 中国 610054,电子科技大学信息与软件工程学院 成都 中国 610054,电子科技大学信息与软件工程学院 成都 中国 610054
基金项目:本课题得到国家自然科学基金(Nos.61370026,61672135);国家自然基金重点国际(地区)合作研究项目(No.61520106007);四川省科技支撑项目(No.2016GZ0065);国家高科技研究发展计划(863计划)(No.2015AA016007)资助。
摘    要:伴随着云计算技术的广泛应用,外包到云服务器存储的数据通常采用密文方式进行存储以确保数据安全和用户隐私。可搜索加密体制允许用户对密文数据通过关键词进行检索,从而极大减少了数据共享用户的通信和计算开销。基于公钥的可搜索加密体制解决了对称可搜索加密体制中的密钥分发问题而受到广泛关注。本文侧重于阐述公钥可搜索加密体制的研究进展,描述了它的形式化定义、安全模型;分析和讨论了典型的公钥可搜索加密体制的设计机理、相关的扩展方案以及它们的安全性问题。最后,本文还讨论了公钥可搜索加密体制的应用场景,并指出了未来可能的发展方向。

关 键 词:云安全  可搜索加密  公钥可搜索加密  关键词猜测攻击
收稿时间:2016/6/14 0:00:00
修稿时间:2017/3/24 0:00:00

A Survey of Public-Key Encryption with Keyword Search
Authors:QIN Zhiguang  XU Jun  NIE Xuyun and XIONG Hu
Affiliation:Department of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China,Department of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China,Department of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China and Department of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
Abstract:With the population of cloud computing technology, tremendous data is outsourced in the cloud server in the encrypted form to ensure data security and user privacy. Searchable encryption allows users to retrieve the encrypted data by keywords, thus greatly reduce the user''s communication and computation overhead. Public key cryptography based searchable encryption has solved the key distribution problem in symmetric key cryptography based searchable encryption and thus received a lot of attention recently. This paper focuses on the development of public-key encryption with keyword search (PEKS) by surveying the state-of-the-art of PEKS, describing the formal definition and security model of PEKS and analyzing the design philosophy of classical PEKS schemes. Furthermore, some extensions of PEKS in terms of function and security enhancement have also been given. Finally, this paper discusses the application scenario of PEKS, and demonstrates the future research directions of PEKS.
Keywords:cloud security  searchable encryption  public-key encryption with keyword search  keyword guessing attacks
点击此处可从《》浏览原始摘要信息
点击此处可从《》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号