期刊文献+

可隐藏搜索模式的对称可搜索加密方案 被引量:12

Searchable Symmetric Encryption with Hidden Search Pattern
在线阅读 下载PDF
导出
摘要 在云计算环境中,可搜索加密技术可以让云服务器直接在用户的数据密文上进行关键词搜索,同时尽量不泄露用户的数据和搜索条件信息。现有的对称可搜索加密方案视搜索模式和访问模式为必然泄露的信息,只要没有泄露其他信息,方案就是安全的。但研究表明,搜索模式和访问模式在一定条件下仍然会泄露明文或搜索条件的信息。文章给出了一种可隐藏搜索模式的对称可搜索加密方案,将明文中出现的单词进行分组,搜索结果相同的单词分为一组;同组单词在搜索时生成相同的陷门,从而使敌手无法区分。实验结果表明,该方案能有效地隐藏一半以上的单词的搜索模式,在文档长度越长的情况下,可隐藏搜索模式的单词比例越高;同时引入的客户端存储量不会显著增加。文章最后讨论了不同组单词隐藏搜索模式的思路。 In cloud computing environment, searchable encryption lets cloud server searching on users' encrypted data directly, without leaking the information of user data and searching criteria. Existing searchable symmetric encryption schemes believe that the access pattern and search pattern will be leaked inevitably, as long as no other information is leaked, the scheme will be secure. But recent research show that the acess pattern and search pattern can leak information about the user data and searching criteria under certain circumstance. In this paper, a new symmetric searchable encryption scheme which can hide search pattern is proposed. The scheme groups each distinct word appeared in user documents, lets the words with same searching results be in the same group, and constructs same trapdoors for the words in the same group, preventing the adversaries from distinguishing. The experiments show that the search pattern of at least one half of the words can be hidden. The proportion of search pattern hidden words will be increase as the size of the documents increasing, and the extra client side storage won't grow dramatically. Finally, a basic idea to hide search pattern of the words which have different search results is provided.
作者 陆海宁
出处 《信息网络安全》 CSCD 2017年第1期38-42,共5页 Netinfo Security
基金 教育部高等学校博士学科点专项科研基金[20120073110094]
关键词 可搜索加密 搜索模式 信息隐藏 searchable encryption search pattern information hiding
  • 相关文献

参考文献2

二级参考文献82

  • 1CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness. [EB/OL]http://competitions.cr.yp.to/caesar.hnnl.
  • 2Alizadeh J, Aref M 1k, Bagheri N. JHAE: An authenticated encryption mode based on JH [J]. IACR Cryptology ePrint Archive, 2014: 193-214, available from http://eprint.iacr.org.
  • 3Andreeva E, Bogdanov A. Parallelizable and authenticated online ciphers [C]. Sako K, Sarkar P (Eds.) ASIACRYPT 2013, 8269, 2013: 424-443.
  • 4Andreeva E, Bilgin B, Bogdanov A, et al. APE: authenticated permutation-based encryption for lightweight cryptography [J]. IACIZ Cryptology ePrint Archive, 2013(791), available from http://eprint.iacr.org.
  • 5Aoki K, Yasuda K. The security of the OCB mode of operation without the SPRP assumption [C]. ProvSec 2013, 8209, Springer-Verlag, 2013: 202-220.
  • 6Bertoni G, Daemen J. Permutation based encryption, authentication and authenticated encryption [J]. DIAC 2012, available from http://www. hyperelliptic.org.
  • 7Bellare M, Desai A, Jokipii E, et al. A Concrete Security treatment of symmetric encryption [C]. In Proceedings of the 38th symposiun on FOCS, IEEE, 1997: 394-403.
  • 8Bertoni G, Daemen J, Peeters M, et al. Duplexing the sponge: Single- pass authenticated encryption and other applications [C]. SAC 2011 , Springer, 2011: 320-337.
  • 9Bogdanov A, Mendel F, Regazzoni F. ALE: AES-based lightweight authenticated encryption [C]. In Fast Software Encryption, FSE 2013, Lecture Notes in Computer Science, Moriai S (ed.), Springer-Verlag, 2013.
  • 10Bellare M, Namprempre C. Authenticated encryption: Relations among notions and analysis of the genetic composition paradigm [C]. In Proc. ASIACRYPT, Okamoto T, Ed. Berlin, Germany: Springer-Verlag, 1976. 2000: 531-545.

共引文献32

同被引文献60

引证文献12

二级引证文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部