通信学报 ›› 2020, Vol. 41 ›› Issue (4): 14-26.doi: 10.11959/j.issn.1000-436x.2020086

• 专题:边缘计算关键技术 • 上一篇    下一篇

基于边缘计算的支持多密钥的加密图像检索

李颖莹1,2,马建峰1,2,苗银宾1   

  1. 1 西安电子科技大学网络与信息安全学院,陕西 西安 710071
    2 陕西省网络与系统安全重点实验室,陕西 西安 710071
  • 修回日期:2020-03-26 出版日期:2020-04-25 发布日期:2020-04-30
  • 作者简介:李颖莹(1995- ),女,陕西汉中人,西安电子科技大学博士生,主要研究方向为数据隐私保护、云计算安全|马建峰(1963- ),男,陕西西安人,博士,西安电子科技大学教授、博士生导师,主要研究方向为计算机系统安全、移动与无线安全、系统可生存性和可信计算|苗银宾(1988- ),男,河南驻马店人,博士,西安电子科技大学讲师,主要研究方向为应用密码学、无线网络安全
  • 基金资助:
    促进海峡两岸科技合作联合基金资助项目(U1405255);陕西省科技统筹创新工程计划基金资助项目(2016KTZDGY05-06);中央高校基本科研业务费基金资助项目(JB191506);国家自然科学基金资助项目(61702404);国家自然科学基金资助项目(61702105);国家自然科学基金资助项目(U1804263);国家自然科学基金资助项目(61972094);陕西省自然科学基金资助项目(2019JQ-005);中国博士后科学基金资助项目(2017M613080)

Encrypted image retrieval in multi-key settings based on edge computing

Yingying LI1,2,Jianfeng MA1,2,Yinbin MIAO1   

  1. 1 School of Cyber Engineering,Xidian University,Xi’an 710071,China
    2 Shaanxi Key Laboratory of Network and System Security,Xi’an 710071,China
  • Revised:2020-03-26 Online:2020-04-25 Published:2020-04-30
  • Supported by:
    The Key Program of NSFC Grant(U1405255);Shannxi Science & Technology Coordination & Innovation Project(2016KTZDGY05-06);Fundamental Research Funds for the Central Universities(JB191506);The National Natural Science Foundation of China(61702404);The National Natural Science Foundation of China(61702105);The National Natural Science Foundation of China(U1804263);The National Natural Science Foundation of China(61972094);The Natural Science Foundation of Shannxi Province(2019JQ-005);China Postdoctoral Science Foundation Funded Project(2017M613080)

摘要:

针对现有加密图像检索方案未考虑不同密钥加密图像集的情况,基于局部敏感哈希、安全近邻及代理重加密技术提出了基于边缘计算的支持多密钥的加密图像检索系统(包含基础方案和改进方案)。所提方案不但提高了图像查询效率、精度,而且降低了查询用户的额外计算开销。安全性分析表明,所提基础方案仅可抵抗已知密文攻击,而所提改进方案可抵抗已知背景攻击。基于实际数据集的实验性能测试表明,所提方案在实际应用场景中是可行的。

关键词: 多密钥, 局部敏感哈希, 代理重加密, 已知密文攻击, 已知背景攻击

Abstract:

Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.

Key words: multi-key, locality sensitive hashing, proxy re-encryption, known ciphertext attack

中图分类号: 

No Suggested Reading articles found!