通信学报 ›› 2017, Vol. 38 ›› Issue (11): 161-170.doi: 10.11959/j.issn.1000-436x.2017225

• 学术通信 • 上一篇    下一篇

多数据拥有者认证的密文检索方案

伍祈应,马建峰,苗银宾,张俊伟,沈丽敏   

  1. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
  • 修回日期:2017-10-30 出版日期:2017-11-01 发布日期:2017-12-13
  • 作者简介:伍祈应(1994-),女,湖南邵阳人,西安电子科技大学硕士生,主要研究方向为网络与信息安全。|马建峰(1963-),男,陕西西安人,西安电子科技大学教授、博士生导师,主要研究方向为密码学、无线和移动安全等。|苗银宾(1988-),男,河南驻马店人,博士,西安电子科技大学讲师,主要研究方向为应用密码学、无线网络安全等。|张俊伟(1982-),男,陕西西安人,博士,西安电子科技大学副教授,主要研究方向为密码学、网络安全等。|沈丽敏(1978-),女,江苏南京人,西安电子科技大学博士生,主要研究方向为密码学、信息论等。
  • 基金资助:
    国家高技术研究发展计划(“863”计划)基金资助项目(2015AA016007);国家自然科学基金资助项目(61702404);国家自然科学基金资助项目(61472310);国家自然科学基金资助项目(U1405255);“111计划”基金资助项目(B16037)

Multi-owner accredited keyword search over encrypted data

Qi-ying WU,Jian-feng MA,Yin-bin MIAO,Jun-wei ZHANG,Li-min SHEN   

  1. School of Cyber Engineering,Xidian University,Xi’an 710071,China
  • Revised:2017-10-30 Online:2017-11-01 Published:2017-12-13
  • Supported by:
    The National High Technology Research and Development Program (863 Program)(2015AA016007);The National Natural Science Foundation of China(61702404);The National Natural Science Foundation of China(61472310);The National Natural Science Foundation of China(U1405255);China 111 Project(B16037)

摘要:

针对共享型多数据拥有者场景,即一个文件被多个数据拥有者拥有,已有可搜索加密方案不能同时支持密文检索和细粒度访问控制。为此,基于线性秘密共享和可搜索加密技术提出一种高效的多数据拥有者认证的密文检索方案,数据用户只有得到多个数据拥有者的授权才能解密返回的结果。严格的安全分析表明该方案在双线性Diffie-Hellman假设下能保证安全和隐私,且基于实际数据的实验结果表明本方案在实际应用中是高效、可行的。

关键词: 共享型多数据拥有者场景, 可搜索加密, 细粒度访问控制, 线性秘密共享

Abstract:

A sharing multi-owner setting where data was owned by a fixed number of data owners,the existing searchable encryption schemes could not support ciphertext retrieval and fine-grained access control at the same time.For this end,an efficient cryptographic primitive called as multi-owner accredited keyword search over encrypted data scheme was designed,through combining linear secret-sharing technique with searchable encryption schemes,only the data users authorized bymulti-owner by could decrypt the returned results.The formal security analysis shows that the scheme can protect security and privacy under the bilinear Diffie-Hellman assumption.As a further contribution,an empirical study over real-world dataset was conelucted to show the effectiveness and practicability of the scheme.

Key words: sharing multi-owner setting, searchable encryption, fine-grained access control, linear secret-sharing

中图分类号: 

No Suggested Reading articles found!