Journal on Communications ›› 2022, Vol. 43 ›› Issue (5): 110-122.doi: 10.11959/j.issn.1000-436x.2022090
• Papers • Previous Articles Next Articles
Xinchun YIN1,2, Mengyu WANG3,4, Jianting NING1
Revised:
2022-03-19
Online:
2022-05-25
Published:
2022-05-01
Supported by:
CLC Number:
Xinchun YIN, Mengyu WANG, Jianting NING. Lightweight searchable medical data sharing scheme[J]. Journal on Communications, 2022, 43(5): 110-122.
"
方案 | Setup/ms | Encrypt/ms | ReEncrypt/ms | KeyGen/ms | TokenGen/ms | Search/ms | Decrypt/ms | 整体开销/ms |
Zhang等方案 | 57.6 | 2 905.2 | — | 1 173.9 | — | — | 694 | — |
Wang等方案 | 2 885 | 2 264.9 | — | 1 118.8 | 1 133.6 | 669.5 | 652 | 8 676.7 |
Miao等方案 | 2 776.9 | 1 186.4 | — | 1 186.8 | 1 151.2 | 652.4 | 31.6 | 7 001.5 |
本文方案 | 35 | 1 738.4 | 560.1 | 618.5 | 589.3 | 700.8 | 38.1 | 4 280.2 |
[1] | WANG H J , NING J T , HUANG X Y ,et al. Secure fine-grained encrypted keyword search for E-healthcare cloud[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(3): 1307-1319. |
[2] | WANG H J , DONG X L , CAO Z F . Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search[J]. IEEE Transactions on Services Computing, 2020,13(6): 1142-1151. |
[3] | SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// Proceeding of 2000 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2000: 44-55. |
[4] | KAMARA S , PAPAMANTHOU C , ROEDER T . Dynamic searchable symmetric encryption[C]// Proceedings of 2012 ACM Conference on Computer and Communications Security. New York:ACM Press, 2012: 965-976. |
[5] | CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 895-934. |
[6] | JIANG P , MU Y , GUO F C ,et al. Secure-channel free keyword search with authorization in manager-centric databases[J]. Computers & Security, 2017,69: 50-64. |
[7] | WANG H J , DONG X L , CAO Z F ,et al. Secure key-aggregation authorized searchable encryption[J]. Science China Information Sciences, 2019,62(3): 1-3. |
[8] | SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2005: 457-473. |
[9] | GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York:ACM Press, 2006: 89-98. |
[10] | BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// Proceedings of 2007 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2007: 321-334. |
[11] | ZHENG Q J , XU S H , ATENIESE G . VABKS:verifiable attribute-based keyword search over outsourced encrypted data[C]// Proceedings of IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2014: 522-530. |
[12] | SUN W H , YU S C , LOU W J ,et al. Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(4): 1187-1198. |
[13] | NISHIDE T , YONEYAMA K , OHTA K . Attribute-based encryption with partially hidden encryptor-specified access structures[C]// International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2008: 111-129. |
[14] | LAI J Z , DENG R H , LI Y J . Expressive CP-ABE with partially hidden access structures[C]// Proceedings of the 7th ACM Symposium on Information,Computer and Communications Security. New York:ACM Press, 2012: 18-19. |
[15] | CUI H , DENG R H , WU G W ,et al. An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures[C]// International Conference on Provable Security. Berlin:Springer, 2016: 19-38. |
[16] | QIU S , LIU J Q , SHI Y F ,et al. Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack[J]. Science China Information Sciences, 2016,60(5): 1-12. |
[17] | WANG S P , GAO T T , ZHANG Y L . Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage[J]. PLoS One, 2018,13(11): 1. |
[18] | MIAO Y , LIU X , CHOO K K R ,et al. Privacy-preserving attribute-based keyword search in shared multi-owner setting[J]. IEEE Transactions on Dependable and Secure Computing, 2019,18(3): 1080-1094. |
[19] | ZHANG Z S , ZHANG W , QIN Z G . A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing[J]. Future Generation Computer Systems, 2021,123: 181-195. |
[20] | MIAO Y B , MA J F , LIU X M ,et al. VMKDO:verifiable multi-keyword search over encrypted cloud data for dynamic data-owner[J]. Peer-to-Peer Networking and Applications, 2018,11(2): 287-297. |
[21] | SHINDE S , CHUA Z L , NARAYANAN V ,et al. Preventing page faults from telling your secrets[C]// Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. New York:ACM Press, 2016: 317-328. |
[22] | NING J T , HUANG X Y , SUSILO W ,et al. Dual access control for cloud-based data storage and sharing[J]. IEEE Transactions on Dependable and Secure Computing, 2022,19(2): 1036-1048. |
[23] | FISCH B , VINAYAGAMURTHY D , BONEH D ,et al. IRON:functional encryption using intel SGX[C]// Proceedings of 2017 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2017: 765-782. |
[1] | Xuejiao LIU, Tiancong CAO, Yingjie XIA. Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture [J]. Journal on Communications, 2023, 44(3): 186-197. |
[2] | Shuai LIU, Jie GUAN, Bin HU, Sudong MA. Differential analysis of lightweight cipher algorithm ACE based on MILP [J]. Journal on Communications, 2023, 44(1): 39-48. |
[3] | Yiliang HAN, Kaiyang GUO, Riming WU, Kai LIU. Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice [J]. Journal on Communications, 2023, 44(1): 75-88. |
[4] | Zhenyu WANG, Yang GUO, Shaoqing LI, Shen HOU, Ding DENG. Design of efficient anonymous identity authentication protocol for lightweight IoT devices [J]. Journal on Communications, 2022, 43(7): 49-61. |
[5] | Jie YANG, Biao DONG, Xue FU, Yu WANG, Guan GUI. Lightweight decentralized learning-based automatic modulation classification method [J]. Journal on Communications, 2022, 43(7): 134-142. |
[6] | Ruizhong DU, Tianhe ZHANG, Pengliang SHI. Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing [J]. Journal on Communications, 2022, 43(6): 168-178. |
[7] | Zilong JIANG, Chenhui JIN. Impossible differential cryptanalysis of Saturnin algorithm [J]. Journal on Communications, 2022, 43(3): 53-62. |
[8] | Jianhong ZHANG, Menglong WU, Jing WANG, Pei LIU, Zhengtao JIANG, Changgen PENG. Secure and verifiable multi-keyword searchable encryption scheme in cloud [J]. Journal on Communications, 2021, 42(4): 139-149. |
[9] | Wei LI, Menglin WANG, Dawu GU, Jiayao LI, Tianpei CAI, Guangwei XU. Ciphertext-only fault analysis of the TWINE lightweight cryptogram algorithm [J]. Journal on Communications, 2021, 42(3): 135-149. |
[10] | Bing ZHANG, Zheng WEN, Yuxuan ZHAO, Ning WANG, Jiadong REN. Dual-granularity lightweight model for vulnerability code slicing method assessment [J]. Journal on Communications, 2021, 42(11): 233-241. |
[11] | Min XIE,Jiaqi LI,Feng TIAN. Differential fault attack on FeW [J]. Journal on Communications, 2020, 41(4): 143-149. |
[12] | Xixi YAN,Xu HE,Tao LIU,Qing YE,Jinxia YU,Yongli TANG. Traceable attribute-based encryption scheme with key-delegation abuse resistance [J]. Journal on Communications, 2020, 41(4): 150-161. |
[13] | Rongna XIE,Hui LI,Guozhen SHI,Yunchuan GUO. Attribute-based lightweight reconfigurable access control policy [J]. Journal on Communications, 2020, 41(2): 112-122. |
[14] | Xixi YAN,Xiaohan YUAN,Yongli TANG,Yanli CHEN. Verifiable attribute-based searchable encryption scheme based on blockchain [J]. Journal on Communications, 2020, 41(2): 187-198. |
[15] | Yu ZHAO,Jie YANG,Miao LIU,Jinlong SUN,Guan GUI. Federated learning based intelligent edge computing technique for video surveillance [J]. Journal on Communications, 2020, 41(10): 109-115. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|