Journal of Xidian University ›› 2022, Vol. 49 ›› Issue (1): 35-46.doi: 10.19665/j.issn1001-2400.2022.01.004
• Special Issue on Privacy Computing and Data Security • Previous Articles Next Articles
DU Ruizhong1,2(),WANG Yi1,2(),TIAN Junfeng1,2()
Received:
2020-12-15
Online:
2022-02-20
Published:
2022-04-27
Contact:
Yi WANG
E-mail:drzh@hbu.edu.cn;allinone@stumail.hbu.edu.cn;tjf@hbu.cn
CLC Number:
DU Ruizhong,WANG Yi,TIAN Junfeng. Support dynamic and verifiable scheme for ciphertext retrieval[J].Journal of Xidian University, 2022, 49(1): 35-46.
"
符号 | 定义 | 符号 | 定义 |
---|---|---|---|
λ | 安全参数 | Nmax | 包含关键字的最大索引数量 |
h1,h2,h3,h4,h5,H1,H2,H3,G | 安全哈希函数 | M | MAC集合 |
P(P-1) | 伪随机置换函数 | AM | AMAC集合 |
F | 外包文档集合 | DB(wi)addition | 需要增加包含关键字wi的文档集合 |
C | 加密文档集合 | DB(wi)deletion | 需要删除包含关键字wi的文档集合 |
Km,Kf | 密钥 | (s | 版本指针c对应的更新状态 |
OP | 增加或者删除操作 | AM(wi) | 包含关键字wi的打包索引对应的AMAC集合 |
W | 关键字集合 | PDB(wi) | 包含关键字wi的打包索引集合 |
ID | 文档标识符集合 | EI | 对应的加密索引 |
[1] | SONG D X, WAGNER D, PERRIG A. Practical Techniques for Searches on Encrypted Data[C]// Proceeding 2000 IEEE Symposium on Security and Privacy.S&P 2000.Piscataway:IEEE, 2000:44-55. |
[2] | GOH E J. Secure Indexes (2003)[J/OL]. [2003-10-07]. https://eprint.iacr.org/2003/216. |
[3] |
CURTMOLA R, GARAY J, KAMARA S, et al. Searchable Symmetric Encryption:Improved Definitions and Efficient Constructions[J]. Journal of Computer Security, 2011, 19(5):895-934.
doi: 10.3233/JCS-2011-0426 |
[4] | KAMARA S, PAPAMANTHOU C, ROEDER T. Dynamic Searchable Symmetric Encryption[C]// Proceedings of the 2012 ACM Conference on Computer and Communications Security. New York: ACM, 2012:965-976. |
[5] | MIAO Y, TONG Q, DENG R, et al. Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage[J]. IEEE Transactions on Cloud Computing, 2020:1-14. |
[6] |
LIANG Y, LI Y, CAO Q, et al. VPAMS:Verifiable and Practical Attribute-Based Multi-Keyword Search over Encrypted Cloud Data[J]. Journal of Systems Architecture, 2020, 108:101741.
doi: 10.1016/j.sysarc.2020.101741 |
[7] |
YANG W, ZHU Y. A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud[J]. IEEE Transactions on Information Forensics and Security, 2020, 16:100-115.
doi: 10.1109/TIFS.2020.3001728 |
[8] | TONG Q, MIAO Y, LIU X, et al. VPSL:Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things[J]. IEEE Transactions on Cloud Computing, 2020 (Early Access):1-13. |
[9] | SHARMA D, JINWALA D. Simple Index Based Symmetric Searchable Encryption with Result Verifiability[J]. Frontiers of Computer Science, 2021, 15(2):1-3. |
[10] | KUROSAWA K, OHTAKI Y. How to Update Documents Verifiably in Searchable Symmetric Encryption[C]// International Conference on Cryptology and Network Security.Heidelberg:Springer, 2013:309-328. |
[11] |
ZHU J, LI Q, WANG C, et al. Enabling Generic,Verifiable,and Secure Data Search in Cloud Services[J]. IEEE Transactions on Parallel and Distributed Systems, 2018, 29(8):1721-1735.
doi: 10.1109/TPDS.2018.2808283 |
[12] | WANG B, FAN X. Lightweight Verification for Searchable Encryption[C]// 2018 17th IEEE International Conference on Trust,Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE).Piscataway:IEEE, 2018:932-937. |
[13] | STEFANOV E, PAPAMANTHOU C, SHI E. Practical Dynamic Searchable Encryption with Small Leakage (2013)[J/OL]. [2013-12-08]. https://eprint.iacr.org/2013/832. |
[14] | BOST R. ∑oφo: Forward Secure Searchable Encryption[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2016:1143-1154. |
[15] | YONEYAMA K, KIMURA S. Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency[C]// International Conference on Information and Communications Security.Heidelberg:Springer, 2017:489-501. |
[16] | BOST R, MINAUD B, OHRIMENKO O. Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2017:1465-1482. |
[17] | LI H, ZHANG F, HE J, et al. A Searchable Symmetric Encryption Scheme Using BlockChain (2017)[J/OL]. [2017-11-18]. https://arxiv.org/abs/1711.01030. |
[18] | HU S, CAI C, WANG Q, et al. Searching an Encrypted Cloud Meets Blockchain:A Decentralized,Reliable and Fair Realization[C]// IEEE INFOCOM 2018-IEEE Conference on Computer Communications.Piscataway:IEEE, 2018:792-800. |
[19] |
CHEN L, LEE W K, CHANG C H, et al. Blockchain Based Searchable Encryption for Electronic Health Record Sharing[J]. Future Generation Computer Systems, 2019, 95:420-429.
doi: 10.1016/j.future.2019.01.018 |
[20] | JIANG S, LIU J, WANG L, et al. Verifiable Search Meets Blockchain:A Privacy-Preserving Framework for Outsourced Encrypted Data[C]// ICC 2019-2019 IEEE International Conference on Communications.Piscataway:IEEE, 2019:1-6. |
[21] | LI H, TIAN H, ZHANG F, et al. Blockchain-Based Searchable Symmetric Encryption Scheme[J]. Computers & Electrical Engineering, 2019, 73:32-45. |
[22] |
CHEN B, WU L, WANG H, et al. A Blockchain-Based Searchable Public-Key Encryption with Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks[J]. IEEE Transactions on Vehicular Technology, 2020, 69(6):5813-5825.
doi: 10.1109/TVT.2019.2959383 |
[23] | 李涵, 张晨, 黄荷姣, 等. 一种支持前向安全更新和验证的加密搜索算法[J]. 西安电子科技大学学报, 2020, 47(5):48-56. |
LI Han, ZHANG Chen, HUANG Hejiao, et al. Algorithm for Encrypted Search with Forward Secure Updates and Verification[J]. Journal of Xidian University, 2020, 47(5):48-56. |
[1] | LI Xuelian,ZHANG Xiachuan,GAO Juntao,XIANG Dengmei. Blockchain data sharing scheme supporting attribute and proxy re-encryption [J]. Journal of Xidian University, 2022, 49(1): 1-16. |
[2] | WANG Kaiwen,WANG Shulan,WANG Haiyan,DING Yong. Top-k multi-keyword ciphertext retrieval scheme supporting attribute revocation [J]. Journal of Xidian University, 2022, 49(1): 26-34. |
[3] | YAN Xixi,ZHAO Qiang,TANG Yongli,LI Yingying,LI Jingran. Multi-keyword search encryption scheme supporting flexible access control [J]. Journal of Xidian University, 2022, 49(1): 55-66. |
[4] | YANG Yanbo,ZHANG Jiawei,MA Jianfeng. Method for using the blockchain to protect data privacy of IoV [J]. Journal of Xidian University, 2021, 48(3): 21-30. |
[5] | LI Jinze,WANG Zhonghao,LI Mengheng,QIN Tuanfa. Spectrum sharing management method for the small-area-blockchain based on district partition [J]. Journal of Xidian University, 2020, 47(6): 122-130. |
[6] | ZHAI Sheping,WANG Yijing,CHEN Siji. Research on the application of blockchain technology in the sharing of electronic medical records [J]. Journal of Xidian University, 2020, 47(5): 103-112. |
[7] | ZHANG Yinghao,LIU Xiaofan. Preliminary research on the blockchain protocol in satellite broadcasting network environment [J]. Journal of Xidian University, 2020, 47(5): 11-18. |
[8] | LI Han,ZHANG Chen,HUANG Hejiao,GUO Yu. Algorithm for encrypted search with forward secure updates and verification [J]. Journal of Xidian University, 2020, 47(5): 48-56. |
[9] | DING Yong,XIANG Hengkui,LUO Decun,ZOU Xiuqing,LIANG Hai. Scheme for electronic certificate storage by combining Fabric technology [J]. Journal of Xidian University, 2020, 47(5): 113-121. |
[10] | ZHAO Zijun,YING Zuobin,YANG Zhao,LIU Ximeng,MA Jianfeng. Recommendation of platoon members by combining the blockchain and vehicular social network [J]. Journal of Xidian University, 2020, 47(5): 122-129. |
[11] | SI Chengxiang,GAO Feng,ZHU Liehuang,GONG Guopeng,ZHANG Can,CHEN Zhuo,LI Ruiguang. Covert data transmission mechanism based on dynamic label in blockchain [J]. Journal of Xidian University, 2020, 47(5): 94-102. |
[12] | LAN Yiqin,ZHANG Fangguo,TIAN Haibo. Using Monero to realize covert communication [J]. Journal of Xidian University, 2020, 47(5): 19-27. |
[13] | WANG Hui,WANG Licheng,BAI Xue,LIU Qinghua,SHEN Xiaoying. Research on key technology of blockchain privacy protection and scalability [J]. Journal of Xidian University, 2020, 47(5): 28-39. |
[14] | WANG Jiaheng,LE Yuwei,ZHANG Bowen,GUO Ruiwei,GAO Zheng,WANG Ziyue,LING Xintong. Blockchain radio access network:a new architecture for future mobile communications [J]. Journal of Xidian University, 2020, 47(5): 3-10. |
[15] | LIU Naian,CHEN Zhihao,LIU Guokun,LI Yang. Mechanism for proof-of-reputation consensus for blockchain validator nodes [J]. Journal of Xidian University, 2020, 47(5): 57-62. |
|