Journal of Xidian University ›› 2022, Vol. 49 ›› Issue (1): 26-34.doi: 10.19665/j.issn1001-2400.2022.01.003

• Special Issue on Privacy Computing and Data Security • Previous Articles     Next Articles

Top-k multi-keyword ciphertext retrieval scheme supporting attribute revocation

WANG Kaiwen1(),WANG Shulan1(),WANG Haiyan2(),DING Yong2,3()   

  1. 1. School of Big Data and Internet,Shenzhen University of Technology,Shenzhen 518118,China
    2. Pengcheng Laboratory,Cyberspace Security Department,Shenzhen 518000,China
    3. School of Computer and Information Security,Guilin University of Electronic Technology,Guilin 541010,China
  • Received:2021-07-19 Online:2022-02-20 Published:2022-04-27
  • Contact: Shulan WANG E-mail:1910412010@stumail.sztu.edu.cn15200223103;wangshulan@email.szu.edu.cn;wanghy01@pcl.ac.cn;stone_dingy@126.com

Abstract:

In recent years,the promotion of cloud computing has led to the great development of searchable encryption technology.However,most of the existing searchable encryption technologies generally only support single-keyword search and traversal ciphertext retrieval.The search process cannot be filtered and retrieved according to user needs,and does not support attribute revocation,which will return a large amount of irrelevant data and affect search users' experience.In order to solve the above problems,a top-k multi-keyword ciphertext retrieval scheme for supporting attribute revocation is proposed.On the basis of supporting multi-keyword retrieval,through the access strategy and semantic model of the attribute-based algorithm,the index table of attribute-file set mapping is constructed to realize fine-grained access control and authority management of the ciphertext,and supports top-k sorting and efficient retrieval.Homomorphic encrypted fuzzy data parameters are introduced to ensure encrypted data privacy and multi-user attribute authorization.Multi-layer data compression reduces the storage overhead,and can achieve attribute revocation with a low computational overhead.Theoretical analysis shows that the scheme has forward and backward security and keyword hiding,and can resist collusion attacks.The function and experimental evaluation of similar schemes have been carried out.The results prove that the scheme has a better comprehensive performance in terms of function and efficiency.

Key words: searchable encryption, homomorphic encryption, attribute based encryption, attribute revocation, top-k sorting

CLC Number: 

  • TN918.4