Journal on Communications ›› 2020, Vol. 41 ›› Issue (4): 14-26.doi: 10.11959/j.issn.1000-436x.2020086

Special Issue: 边缘计算

• Topics: Key Technologies of Edge Computing • Previous Articles     Next Articles

Encrypted image retrieval in multi-key settings based on edge computing

Yingying LI1,2,Jianfeng MA1,2,Yinbin MIAO1   

  1. 1 School of Cyber Engineering,Xidian University,Xi’an 710071,China
    2 Shaanxi Key Laboratory of Network and System Security,Xi’an 710071,China
  • Revised:2020-03-26 Online:2020-04-25 Published:2020-04-30
  • Supported by:
    The Key Program of NSFC Grant(U1405255);Shannxi Science & Technology Coordination & Innovation Project(2016KTZDGY05-06);Fundamental Research Funds for the Central Universities(JB191506);The National Natural Science Foundation of China(61702404);The National Natural Science Foundation of China(61702105);The National Natural Science Foundation of China(U1804263);The National Natural Science Foundation of China(61972094);The Natural Science Foundation of Shannxi Province(2019JQ-005);China Postdoctoral Science Foundation Funded Project(2017M613080)

Abstract:

Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.

Key words: multi-key, locality sensitive hashing, proxy re-encryption, known ciphertext attack

CLC Number: 

No Suggested Reading articles found!