Journal of Xidian University ›› 2024, Vol. 51 ›› Issue (4): 151-169.doi: 10.19665/j.issn1001-2400.20240205
• Computer Science and Technology & Cyberspace Security • Previous Articles Next Articles
ZHAI Sheping1,2(), ZHANG Ruiting1(), YANG Rui1(), CAO Yongqiang1()
Received:
2023-11-23
Online:
2024-08-20
Published:
2024-03-08
Contact:
ZHANG Ruiting
E-mail:zhaisheping@xupt.edu.cn;18691729079@163.com;290934920@qq.com;2310380836@qq.com
CLC Number:
ZHAI Sheping, ZHANG Ruiting, YANG Rui, CAO Yongqiang. Blockchain searchable encryption scheme for multi-user environment[J].Journal of Xidian University, 2024, 51(4): 151-169.
[1] | SONG D X, WAGNER D, PERRIG A. Practical Techniques for Searches on Encrypted Data[C]//Proceeding 2000 IEEE Symposium on Security and Privacy.Piscataway:IEEE, 2000: 44-55. |
[2] | 李经纬, 贾春福, 刘哲理, 等. 可搜索加密技术研究综述[J]. 软件学报, 2015, 26(1):109-128. |
LI Jingwei, JIA Chunfu, LIU Zheli, et al. Research Review on Searchable Encryption Technology[J]. Journal of Software, 2015, 26(1):109-128. | |
[3] | BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public Key Encryption with Keyword Search[C]//Advances in Cryptology -EUROCRYPT 2004. Heidelberg:Springer, 2004:506-522. |
[4] | 张玉磊, 文龙, 王浩浩, 等. 多用户环境下无证书认证可搜索加密方案[J]. 电子与信息学报, 2020, 42(5):1094-1101. |
ZHANG Yulei, WEN Long, WANG Haohao, et al. A Searchable Encryption Scheme in a Multi-User Environment without Certificate Authentication[J]. Journal of Electronics and Information Technology, 2020, 42(5):1094-1101. | |
[5] | SUN L, CAO Z, DONG X, et al. LMCLAEKS:LWE-Assisted Multi-Recipient Certificateless Authenticated Encryption with Keyword Search[J]. Information Sciences, 2023,648:119554. |
[6] | VARRI U S, PASUPULETI S K, KADAMBARI K V. Practical Verifiable Multi-Keyword Attribute-Based Searchable Signcryption in Cloud Storage[J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14(9):11455-11467. |
[7] | CHAUDHARI P, DAS M L. Privacy Preserving Searchable Encryption with Fine-Grained Access Control[J]. IEEE Transactions on Cloud Computing, 2019, 9(2):753-762. |
[8] | CHU C K, WENG J, CHOW S S, et al. Conditional Proxy Broadcast Re-Encryption[C]//Australasian Conference on Information Security and Privacy. Heidelberg:Springer, 2009:327-342. |
[9] | 翟社平, 陆娴婧, 霍媛媛, 等. 一种改进条件广播代理重加密的数据共享方案[J]. 西安电子科技大学学报, 2024, 51(2):224-238. |
ZHAI Sheping, LU Xianjing, HUO Yuanyuan, et al. An Improved Conditions for Broadcasting Proxy Heavily Encrypted Data Sharing Scheme[J]. Journal of Xidian University, 2024, 51(2):224-238. | |
[10] | 杨亚涛, 蔡居良, 张筱薇, 等. 基于SM9算法可证明安全的区块链隐私保护方案[J]. 软件学报, 2019, 30(6):1692-1704. |
YANG Yatao, CAI Juliang, ZHANG Xiaowei, et al. A Provable Security Blockchain Privacy Protection Scheme Based on SM9 Algorithm[J]. Journal of Software, 2019, 30(6):1692-1704. | |
[11] | 张磊, 郑志勇, 袁勇. 基于区块链的电子医疗病历可控共享模型[J]. 自动化学报, 2021, 47(9):2143-2153. |
ZHANG Lei, ZHENG Zhiyong, YUAN Yong. Controllable Sharing Model of Electronic Medical Record Based on Blockchain[J]. Acta Automatica Sinica, 2021, 47(9):2143-2153. | |
[12] | 牛淑芬, 陈俐霞, 李文婷, 等. 基于区块链的电子病历数据共享方案[J]. 自动化学报, 2022, 48(8):2028-2038. |
NIU Shufen, CHEN Lixia, LI Wenting, et al. Electronic Medical Record Data Sharing Scheme Based on Blockchain[J]. Acta Automatica Sinica, 2022, 48(8):2028-2038. | |
[13] |
牛淑芬, 刘文科, 陈俐霞, 等. 基于联盟链的可搜索加密电子病历数据共享方案[J]. 通信学报, 2020, 41(8):204-214.
doi: 10.11959/j.issn.1000-436x.2020116 |
NIU Shufen, LIU Wenke, CHEN Lixia, et al. A Searchable Encrypted Electronic Medical Record Data Sharing Scheme Based on Alliance Chain[J]. Journal of Communications, 2020, 41(8):204-214. | |
[14] | TIAN M, ZHANG Y, ZHU Y, et al. BPPIR:Blockchain-Assisted Privacy-Preserving Similarity Image Retrieval over Multiple Clouds[J]. Journal of King Saud University-Computer and Information Sciences, 2023, 35(1):324-334. |
[15] |
杜瑞忠, 谭艾伦, 田俊峰. 基于区块链的公钥可搜索加密方案[J]. 通信学报, 2020, 41(4):114-122.
doi: 10.11959/j.issn.1000-436x.2020070 |
DU Ruizhong, TAN Ailun, TIAN Junfeng. Public Key Searchable Encryption Scheme Based on Blockchain[J]. Journal on Communications, 2020, 41(4):114-122.
doi: 10.11959/j.issn.1000-436x.2020070 |
|
[16] | 牛淑芬, 谢亚亚, 杨平平, 等. 加密邮件系统中基于身份的可搜索加密方案[J]. 电子与信息学报, 2020, 42(7):1803-1810. |
NIU Shufen, XIE Yaya, YANG Pingping, et al. Identity-Based Searchable Encryption Scheme in Encrypted Mail System[J]. Journal of Electronics and Information Technology, 2020, 42(7):1803-1810. | |
[17] |
郑东, 朱天泽, 郭瑞. 基于区块链的多用户环境中公钥可搜索加密方案[J]. 通信学报, 2021, 42(10):140-152.
doi: 10.11959/j.issn.1000-436x.2021130 |
ZHENG Dong, ZHU Tianze, GUO Rui. Public-Key Searchable Encryption Scheme in Multi-User Environment Based on Blockchain[J]. Journal of Communications, 2021, 42(10):140-152. | |
[18] | 牛淑芬, 韩松, 谢亚亚, 等. 基于区块链的多关键字属性基可搜索加密方案[J]. 信息安全学报, 2023, 8(1):131-143. |
NIU Shufen, HAN Song, XIE Yaya, et al. A Searchable Encryption Scheme Based on Multi-Keyword Attribute Base Based on Blockchain[J]. Journal of Information Security, 2023, 8(1):131-143. | |
[19] |
翟社平, 童彤, 白喜芳. 基于区块链的属性代理重加密数据共享方案[J]. 计算机工程与应用, 2023, 59(8):270-279.
doi: 10.3778/j.issn.1002-8331.2205-0115 |
ZHAI Sheping, TONG Tong, BAI Xifang. Reencryption Data Sharing Scheme of Attribute Proxy Based on Blockchain[J]. Computer Engineering and Applications, 2023, 59(8):270-279.
doi: 10.3778/j.issn.1002-8331.2205-0115 |
|
[20] | 韩笑, 曾琦, 曹永明. 一种有效的带关键字搜索的代理重加密方案[J]. 计算机与现代化, 2019(3):117-121. |
HAN Xiao, ZENG Qi, CAO Yongming. An Effective Proxy Re-Encryption Scheme with Keyword Search[J]. Computer and Modernization, 2019(3):117-121. | |
[21] | WANG Y H, CAI S B, LIN C L, et al. Study of Blockchain’s Consensus Mechanism Based on Credit[J]. IEEE Access, 2019,7:10224-10231. |
[22] | ZHU S C, ZHANG Z Y, CHEN L Q, et al. A PBFT Consensus Scheme with Reputation Value Voting Based on Dynamic Clustering[C]//Security and Privacy in Digital Economy: First International Conference,SPDE 2020.Heidelberg:Springer, 2020:336-354. |
[23] |
吴晓彤, 柳平增. 基于备选投票机制的低时延PBFT改进研究[J]. 计算机工程, 2021, 47(7):117-125,134.
doi: 10.19678/j.issn.1000-3428.0058362 |
WU Xiaotong, LIU Pingzeng. Research on Improvement of Low-Delay PBFT Based on Alternative Voting Mechanism[J]. Computer Engineering, 2021, 47(7):117-125,134.
doi: 10.19678/j.issn.1000-3428.0058362 |
|
[24] |
陈润宇, 王伦文, 朱然刚. 基于信誉值投票与随机数选举的PBFT共识算法[J]. 计算机工程, 2022, 48(6):42-49,56.
doi: 10.19678/j.issn.1000-3428.0063904 |
CHEN Runyu, WANG Lunwen, ZHU Rangang. PBFT Consensus AlgorithmBased on Reputation Voting and Random Number Election[J]. Computer Engineering, 2022, 48(6):42-49,56.
doi: 10.19678/j.issn.1000-3428.0063904 |
[1] | LI Xiaohan, YANG Yanbo, ZHANG Jiawei, LI Baoshan, MA Jianfeng. Graph neural network vulnerability detection for ethernet smart contracts [J]. Journal of Xidian University, 2024, 51(4): 139-150. |
[2] | PENG Yongxiang, MA Yong, LIU Zhiquan, WANG Libo, WU Yongdong, CHEN Ning, TANG Yong. Efficient smart contract testing scheme supporting transactions filtering [J]. Journal of Xidian University, 2024, 51(3): 194-202. |
[3] | ZHAI Sheping, LU Xianjing, HUO Yuanyuan, YANG Rui. Improved data sharing scheme based on conditional broadcast proxy re-encryptionn [J]. Journal of Xidian University, 2024, 51(2): 224-238. |
[4] | GUO Qing, TIAN Youliang. Medicaldata privacy protection scheme supporting controlled sharing [J]. Journal of Xidian University, 2024, 51(1): 165-176. |
[5] | PENG Yongxiang, LIU Zhiquan, WANG Libo, WU Yongdong, MA Jianfeng, CHEN Ning. Contract vulnerability repair scheme supporting inline data processing [J]. Journal of Xidian University, 2024, 51(1): 178-186. |
[6] | ZHOU Hao,MA Jianfeng,LIU Zhiquan,WANG Libo,WU Yongdong,FAN Wenjie. Blockchain-assisted solution for emergency message trust evaluation in the VANET [J]. Journal of Xidian University, 2023, 50(4): 148-156. |
[7] | LIU Yuanzhen, YANG Yanbo, ZHANG Jiawei, LI Baoshan, MA Jianfeng. Blockchain scheme for anti malicious nodes in distributed machine learning [J]. Journal of Xidian University, 2023, 50(2): 178-187. |
[8] | REN Yanli,ZHAI Mengjuan,HU Mingqi. Fair redactable blockchain supporting malicious punishment [J]. Journal of Xidian University, 2023, 50(1): 203-212. |
[9] | HE Yu,TIAN Youliang,WAN Liang,YANG Li. Multi-server dynamic searchable encryption scheme supporting result verification [J]. Journal of Xidian University, 2022, 49(5): 189-200. |
[10] | ZHANG Haibo,BIAN Xia,XU Yongjun,XIANG Shengting,HE Xiaofan. Blockchain-assisted vehicle reputation management method for VANET [J]. Journal of Xidian University, 2022, 49(4): 49-59. |
[11] | ZENG Huixiang,XI Ning,XIE Qingqing,LV Jing,CUI Zhihao,MA Jianfeng. Decentralized ciphertext sharing based on blockchain [J]. Journal of Xidian University, 2022, 49(2): 135-145. |
[12] | PAN Senshan,XU Lamei. DorChain:Utilization of dormant coins to improve the transaction verification efficiency [J]. Journal of Xidian University, 2022, 49(2): 182-189. |
[13] | LI Xuelian,ZHANG Xiachuan,GAO Juntao,XIANG Dengmei. Blockchain data sharing scheme supporting attribute and proxy re-encryption [J]. Journal of Xidian University, 2022, 49(1): 1-16. |
[14] | WANG Kaiwen,WANG Shulan,WANG Haiyan,DING Yong. Top-k multi-keyword ciphertext retrieval scheme supporting attribute revocation [J]. Journal of Xidian University, 2022, 49(1): 26-34. |
[15] | DU Ruizhong,WANG Yi,TIAN Junfeng. Support dynamic and verifiable scheme for ciphertext retrieval [J]. Journal of Xidian University, 2022, 49(1): 35-46. |
|