作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2020, Vol. 46 ›› Issue (2): 175-182. doi: 10.19678/j.issn.1000-3428.0054040

• 网络空间安全 • 上一篇    下一篇

一种基于连接关键词的实用化可搜索加密方案

骆云鹏, 朱旎彤, 毛慈伟, 程晋雪, 许春根   

  1. 南京理工大学 理学院, 南京 210094
  • 收稿日期:2019-03-01 修回日期:2019-04-11 发布日期:2020-02-12
  • 作者简介:骆云鹏(1997-),男,本科生,主研方向为信息安全、计算机视觉;朱旎彤、毛慈伟,本科生;程晋雪,硕士研究生;许春根(通信作者),教授、博士。
  • 基金资助:
    中央高校基本科研业务费专项资金(30918012204);南京理工大学本科生科研训练"百千万"计划(201710288064)。

A Practical Searchable Encryption Scheme Based on Connection Keywords

LUO Yunpeng, ZHU Nitong, MAO Ciwei, CHENG Jinxue, XU Chungen   

  1. School of Science, Nanjing University of Science and Technology, Nanjing 210094, China
  • Received:2019-03-01 Revised:2019-04-11 Published:2020-02-12

摘要: 随着云存储技术的快速发展,越来越多的个人用户和企业将私密数据存储在云端。然而,多数云平台以明文形式存储数据信息,从而导致隐私泄露、非法访问等问题。为提高隐私数据的安全性,提出一种可搜索加密方案,在实现连接关键词搜索的基础上,完成一对多的文件共享。通过制作关键词的索引来避免记忆关键词的位置,在无需引入可信第三方的情况下进行文件的安全保密共享。随机预言机模型下的验证结果显示,该方案的安全性基于q-双线性Diffie-Hellman问题。通过Java编程语言实现本文方案,模拟用户和服务器间的交互,结果表明,该方案具有可行性,其效率优于GSW-1、GSW-2和FK方案。

关键词: 云存储技术, 可搜索加密, q-双线性Diffie-Hellman问题, 连接关键词, 文件共享

Abstract: With the rapid development of cloud storage technology,more and more individual users and companies store their private data in the cloud.However,most cloud platforms store data information in plaintext,resulting in problems such as privacy leakage,unauthorized access and so on.In order to improve the security of private data,this paper proposes a searchable encryption scheme.In this scheme,one-to-many file sharing is completed after connection keywords search is achieved.The index of keywords is made to avoid memorizing the location of keywords,and the secure and private file sharing is achieved without introducing a trusted third party.The verification results under the random oracle model show that the security of the scheme is based on the q-Bilinear Diffie-Hellman(q-BDH) problem.The scheme is achieved by Java programming language and the interaction between users and servers is simulated.Results show the feasibility of the proposed scheme,whose efficiency is better than those of the GSW-1,GSW-2 and FK schemes.

Key words: cloud storage technology, searchable encryption, q-Bilinear Diffie-Hellman(q-BDH) problem, connection keywords, file sharing

中图分类号: