Journal on Communications ›› 2021, Vol. 42 ›› Issue (10): 140-152.doi: 10.11959/j.issn.1000-436x.2021130
Special Issue: 区块链
• Papers • Previous Articles Next Articles
Dong ZHENG, Tianze ZHU, Rui GUO
Revised:
2021-05-18
Online:
2021-10-25
Published:
2021-10-01
Supported by:
CLC Number:
Dong ZHENG, Tianze ZHU, Rui GUO. Public key searchable encryption scheme in blockchain-enabled multi-user environment[J]. Journal on Communications, 2021, 42(10): 140-152.
[1] | SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// Proceeding 2000 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2000: 44-55. |
[2] | BONEH D , DI CRESCENZO G , OSTROVSKY R ,et al. Public key encryption with keyword search[C]// Advances in Cryptology - EUROCRYPT 2004. Berlin:Springer, 2004: 506-522. |
[3] | BAEK J , SAFAVI-NAINI R , SUSILO W . Public key encryption with keyword search revisited[C]// Computational Science and Its Applications – ICCSA 2008. Berlin:Springer, 2008: 1249-1259. |
[4] | FANG L M , SUSILO W , GE C P ,et al. A secure channel free public key encryption with keyword search scheme without random oracle[C]// Cryptology and Network Security. Berlin:Springer, 2009: 248-258. |
[5] | FANG L M , WANG J D , GE C P ,et al. Decryptable public key encryption with keyword search schemes[J]. International Journal of Digital Content Technology and Its Applications, 2010,4(9): 141-150. |
[6] | BYUN J W , RHEE H S , PARK H A ,et al. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[C]// Secure Data Management. Berlin:Springer, 2006: 75-83. |
[7] | YAU W C , HENG S H , GOI B M . Off-line keyword guessing attacks on recent public key encryption with keyword search schemes[C]// Autonomic and Trusted Computing. Berlin:Springer, 2008: 100-105. |
[8] | RHEE H S , SUSILO W , KIM H J . Secure searchable public key encryption scheme against keyword guessing attacks[J]. IEICE Electronics Express, 2009,6(5): 237-243. |
[9] | TANG Q , CHEN L Q . Public-key encryption with registered keyword search[C]// Public Key Infrastructures,Services and Applications. Berlin:Springer, 2010: 163-178. |
[10] | RHEE H S , PARK J H , SUSILO W ,et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester[J]. Journal of Systems and Software, 2010,83(5): 763-771. |
[11] | QIN B D , CHEN Y , HUANG Q ,et al. Public-key authenticated encryption with keyword search revisited:security model and constructions[J]. Information Sciences, 2020,516: 515-528. |
[12] | ABDALLA M , BELLARE M , CATALANO D ,et al. Searchable encryption revisited:consistency properties,relation to anonymous IBE,and extensions[J]. Journal of Cryptology, 2008,21(3): 350-391. |
[13] | RHEE H S , PARK J H , LEE D H . Generic construction of designated tester public-key encryption with keyword search[J]. Information Sciences, 2012,205: 93-109. |
[14] | EMURA K , MIYAJI A , RAHMAN M S ,et al. Generic constructions of secure-channel free searchable encryption with adaptive security[J]. Security and Communication Networks, 2015,8(8): 1547-1560. |
[15] | SUZUKI T , EMURA K , OHIGASHI T . A generic construction of integrated secure-channel free PEKS and PKE and its application to EMRs in cloud storage[J]. Journal of Medical Systems, 2019,43(5): 128. |
[16] | 王少辉, 韩志杰, 肖甫 ,等. 指定测试者的基于身份可搜索加密方案[J]. 通信学报, 2014,35(7): 22-32. |
WANG S H , HAN Z J , XIAO F ,et al. Identity-based searchable encryption scheme with a designated tester[J]. Journal on Communications, 2014,35(7): 22-32. | |
[17] | MA M M , HE D B , KUMAR N ,et al. Certificateless searchable public key encryption scheme for industrial Internet of Things[J]. IEEE Transactions on Industrial Informatics, 2018,14(2): 759-767. |
[18] | 牛淑芬, 谢亚亚, 杨平平 ,等. 加密邮件系统中基于身份的可搜索加密方案[J]. 电子与信息学报, 2020,42(7): 1803-1810. |
NIU S F , XIE Y Y , YANG P P ,et al. Identity-based searchable encryption scheme for encrypted email system[J]. Journal of Electronics& Information Technology, 2020,42(7): 1803-1810. | |
[19] | 杨宁滨, 周权, 许舒美 . 无配对公钥认证可搜索加密方案[J]. 计算机研究与发展, 2020,57(10): 2125-2135. |
YANG N B , ZHOU Q , XU S M . Public-key authenticated encryption with keyword search without pairings[J]. Journal of Computer Research and Development, 2020,57(10): 2125-2135. | |
[20] | CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 895-934. |
[21] | 杜瑞忠, 谭艾伦, 田俊峰 . 基于区块链的公钥可搜索加密方案[J]. 通信学报, 2020,41(4): 114-122. |
DU R Z , TAN A L , TIAN J F . Public key searchable encryption scheme based on blockchain[J]. Journal on Communications, 2020,41(4): 114-122. | |
[22] | 张玉磊, 文龙, 王浩浩 ,等. 多用户环境下无证书认证可搜索加密方案[J]. 电子与信息学报, 2020,42(5): 1094-1101. |
ZHANG Y L , WEN L , WANG H H ,et al. Certificateless authentication searchable encryption scheme for multi-user[J]. Journal of Electronics & Information Technology, 2020,42(5): 1094-1101. | |
[23] | 王文明, 施重阳, 王英豪 ,等. 基于区块链技术的交易及其安全性研究[J]. 信息网络安全, 2019(5): 1-9. |
WANG W M , SHI C Y , WANG Y H ,et al. Research on transaction and security based on blockchain technology[J]. Netinfo Security, 2019(5): 1-9. | |
[24] | 马春光, 安婧, 毕伟 ,等. 区块链中的智能合约[J]. 信息网络安全, 2018(11): 8-17. |
MA C G , AN J , BI W ,et al. Smart contract in blockchain[J]. Netinfo Security, 2018(11): 8-17. | |
[25] | ZHANG A Q , LIN X D . Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain[J]. Journal of Medical Systems, 2018,42(8): 140. |
[26] | 高梦婕, 王化群 . 基于区块链的可搜索医疗数据共享方案[J]. 南京邮电大学学报(自然科学版), 2019,39(6): 94-103. |
GAO M J , WANG H Q . Blockchain-based searchable medical data sharing scheme[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), 2019,39(6): 94-103. | |
[27] | LI H G , ZHANG F G , HE J J . A searchable symmetric encryption scheme using blockchain[J]. arXiv Preprint,arXiv:1711.01030, 2017. |
[28] | LI H G , TIAN H B , ZHANG F ,et al. Blockchain-based searchable symmetric encryption scheme[J]. Computers & Electrical Engineering, 2019,73: 32-45. |
[29] | CHEN L X , LEE W K , CHANG C C ,et al. Blockchain based searchable encryption for electronic health record sharing[J]. Future Generation Computer Systems, 2019,95: 420-429. |
[30] | 牛淑芬, 刘文科, 陈俐霞 ,等. 基于联盟链的可搜索加密电子病历数据共享方案[J]. 通信学报, 2020,41(8): 204-214. |
NIU S F , LIU W K , CHEN L X ,et al. Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain[J]. Journal on Communications, 2020,41(8): 204-214. |
[1] | Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG. Distributed trust management scheme based on blockchain in Internet of vehicles [J]. Journal on Communications, 2023, 44(5): 148-157. |
[2] | Xuejiao LIU, Qiang ZHONG, Yingjie XIA. Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain [J]. Journal on Communications, 2023, 44(5): 213-223. |
[3] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[4] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[5] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[6] | Li JIANG, Shengli XIE, Hui TIAN. Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network [J]. Journal on Communications, 2023, 44(3): 12-23. |
[7] | Qianyi DAI, Bin ZHANG, Song GUO, Kaiyong XU. Blockchain network layer anomaly traffic detection method based on multiple classifier integration [J]. Journal on Communications, 2023, 44(3): 66-80. |
[8] | Pujie JING, Liangmin WANG, Xuewen DONG, Yushu ZHANG, Qian WANG, Sohail Muhammad. CHA: cross-chain based hierarchical architecture for practicable blockchain regulatory [J]. Journal on Communications, 2023, 44(3): 93-104. |
[9] | Xuejiao LIU, Tiancong CAO, Yingjie XIA. Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture [J]. Journal on Communications, 2023, 44(3): 186-197. |
[10] | Dongyan HUANG, Kun LI. Research on multi-address time-based blockchain covert communication method [J]. Journal on Communications, 2023, 44(2): 148-159. |
[11] | Yatao YANG, Deli LIU, Peihe LIU, Ping ZENG, Song XIAO. BFV-Blockchainvoting: blockchain-based electronic voting systems with BFV full homomorphic encryption [J]. Journal on Communications, 2022, 43(9): 100-111. |
[12] | Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG. Distributed anonymous authentication scheme based on the blockchain in VANET [J]. Journal on Communications, 2022, 43(9): 134-147. |
[13] | Leixiao LI, Jinze DU, Hao LIN, Haoyu GAO, Yanyan YANG, Jing GAO. Research progress of blockchain network covert channel [J]. Journal on Communications, 2022, 43(9): 209-223. |
[14] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[15] | Lizhi XIONG, Rong ZHU, Zhangjie FU. Covert communication method of blockchain network based on transaction construction and forwarding mechanism [J]. Journal on Communications, 2022, 43(8): 176-187. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|