Journal of Xidian University ›› 2022, Vol. 49 ›› Issue (1): 26-34.doi: 10.19665/j.issn1001-2400.2022.01.003
• Special Issue on Privacy Computing and Data Security • Previous Articles Next Articles
WANG Kaiwen1(),WANG Shulan1(),WANG Haiyan2(),DING Yong2,3()
Received:
2021-07-19
Online:
2022-02-20
Published:
2022-04-27
Contact:
Shulan WANG
E-mail:1910412010@stumail.sztu.edu.cn15200223103;wangshulan@email.szu.edu.cn;wanghy01@pcl.ac.cn;stone_dingy@126.com
CLC Number:
WANG Kaiwen,WANG Shulan,WANG Haiyan,DING Yong. Top-k multi-keyword ciphertext retrieval scheme supporting attribute revocation[J].Journal of Xidian University, 2022, 49(1): 26-34.
[1] | SONG D X, WAGNER D, PERRIG A. Practical Techniques for Searches on Encrypted Data[C]// Proceeding 2000 IEEE Symposium on Security and Privacy.S&P 2000.Piscataway:IEEE, 2000:44-55. |
[2] | GOH E J. Secure Indexes (2003)[J/OL]. [2003-10-07]. https://eprint.iacr.org/2003/216. |
[3] |
CAO N, WANG C, LI M, et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1):222-233.
doi: 10.1109/TPDS.2013.45 |
[4] |
MIAO Y, MA J, LIU X, et al. Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing[J]. IEEE Internet of Things Journal, 2018, 5(4):3008-3018.
doi: 10.1109/JIOT.2017.2779124 |
[5] | SAHAI A, WATERS B. Fuzzy Identity-Based Encryption[C]// Advances in Cryptoloty-EUROCRYPT 2005. New York: ACM, 2005,457-473. |
[6] |
ZHAO Y, REN M, JIANG S, et al. An Efficient and Revocable Storage CP-ABE Scheme in the Cloud Computing[J]. Computing, 2019, 101(8):1041-1065.
doi: 10.1007/s00607-018-0637-2 |
[7] | WATERS B. Ciphertext-Policy Attribute-Based Encryption (2011)[J/OL]. [2011-12-31]. http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=07869BBF42253321C865E1EE1EFC6FC2?doi=10.1.1.119.2179&rep=rep1&type=pdf. |
[8] |
JUNBEOM H. Improving Security and Efficiency in Attribute-Based Data Sharing[J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(10):2271-2282.
doi: 10.1109/TKDE.2011.78 |
[9] | CHEN N, LI J, ZHANG Y, et al. Efficient CP-ABE Scheme with Shared Decryption in Cloud Storage[J]. IEEE Transactions on Computers, 2020 ( Early Access ):1-11. |
[10] |
HUI C, DENG R H, LAI J, et al. An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures,Revisited[J]. Computer Networks, 2018, 133:157-165.
doi: 10.1016/j.comnet.2018.01.034 |
[11] | GENTRY C. A Fully Homomorphic Encryption Scheme[M]. Stanford: Stanford University, 2009:1-209. |
[12] |
COMINETTI E L, SIMPLICIO M A. Fast Additive Partially Homomorphic Encryption From the Approximate Common Divisor Problem[J]. IEEE Transactions on Information Forensics and Security, 2020, 15:2988-2998.
doi: 10.1109/TIFS.2020.2981239 |
[13] | 孙霓刚, 朱浩然, 汪伟昕. 一种适用于n bit的整数上全同态加密方案[J]. 计算机应用研究, 2018, 35(4):1179-1181. |
SUN Nigang, ZHU Haoran, WANG Weixin. Fully Homomorphic Encryption Scheme Applied to n bit[J]. Application Research of Computers, 2018, 35(4):1179-1181. | |
[14] | DUMAIS S T. Latent Semantic Analysis[J]. Annual Review of Information Science & Technology, 2013, 4(6):683-692. |
[15] |
ZHU Z, LIANG J, LI D, et al. Hot Topic Detection Based on a Refined TF-IDF Algorithm[J]. IEEE Access, 2019, 7:26996-27007.
doi: 10.1109/ACCESS.2019.2893980 |
[16] |
SUN J, REN L, WANG S, et al. Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage[J]. IEEE Access, 2019, 7:66655-66667.
doi: 10.1109/ACCESS.2019.2917772 |
[17] |
CAO L, KANG Y, WU Q, et al. Searchable Encryption Cloud Storage with Dynamic Data Update to Support Efficient Policy Hiding[J]. China Communications, 2020, 17(6):153-163.
doi: 10.23919/JCC.2020.06.013 |
[18] |
BOUCENNA F, NOUALI O, KECHID S, et al. Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management[J]. Journal of Computer Science and Technology, 2019, 34(1):133-154.
doi: 10.1007/s11390-019-1903-2 |
[19] | 李涵, 张晨, 黄荷姣, 等. 一种支持前向安全更新和验证的加密搜索算法[J]. 西安电子科技大学学报, 2020, 47(5):48-56. |
LI Han, ZHANG Chen, HUANG Hejiao, et al. Algorithm for Encrypted Search with Forward Secure Updates and Verification[J]. Journal of Xidian University, 2020, 47(5):48-56. | |
[20] |
ZHOU Y, ZHENG S, WANG L. Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud[J]. Cryptography, 2020, 4(4):28.
doi: 10.3390/cryptography4040028 |
[1] | DU Ruizhong,WANG Yi,TIAN Junfeng. Support dynamic and verifiable scheme for ciphertext retrieval [J]. Journal of Xidian University, 2022, 49(1): 35-46. |
[2] | YAN Xixi,ZHAO Qiang,TANG Yongli,LI Yingying,LI Jingran. Multi-keyword search encryption scheme supporting flexible access control [J]. Journal of Xidian University, 2022, 49(1): 55-66. |
[3] | CHE Xiaoliang,ZHOU Haonan,YANG Xiaoyuan,ZHOU Tanping,LIU Longfei,LI Ningbo. Efficient multi-key fully homomorphic encryption scheme from RLWE [J]. Journal of Xidian University, 2021, 48(1): 87-95. |
[4] | LI Han,ZHANG Chen,HUANG Hejiao,GUO Yu. Algorithm for encrypted search with forward secure updates and verification [J]. Journal of Xidian University, 2020, 47(5): 48-56. |
[5] | ZHAO Zijun,YING Zuobin,YANG Zhao,LIU Ximeng,MA Jianfeng. Recommendation of platoon members by combining the blockchain and vehicular social network [J]. Journal of Xidian University, 2020, 47(5): 122-129. |
[6] | YAN Xixi;LIU Yuan;LI Zichen;TANG Yongli;YE Qing. Multi-authority attribute-based encryption scheme from LWE problem [J]. Journal of Xidian University, 2018, 45(4): 129-136. |
[7] | YAN Xixi;LIU Yuan;LI Zichen;TANG Yongli. Multi-authority attribute-based encryption scheme with policy semi-hidden and dynamic updating [J]. Journal of Xidian University, 2018, 45(2): 122-128+147. |
[8] | MIAO Yinbin;MA Jianfeng;ZHANG Junwei;LIU Zhiquan. Efficient verifiable multi-keyword search over encrypted data [J]. Journal of Xidian University, 2017, 44(4): 18-23+68. |
[9] | HAN Kun;ZHANG Hailin;XIN Dan;WU Bo;KANG Yuanji. Design method of an identity-based fully homomorphic encryption library [J]. Journal of Xidian University, 2017, 44(4): 56-61. |
[10] | WU Qiying;MA Jianfeng;LI Hui;MIAO Yinbin. Certificateless conjunctive keyword search over encrypted data [J]. Journal of Xidian University, 2017, 44(3): 55-60. |
[11] | YING Zuobin;MA Jianfeng;CUI Jiangtao. Attribute-based encryption with location verification and policy adjusting supporting the cloud mobile office [J]. Journal of Xidian University, 2017, 44(2): 57-62+190. |
[12] | LI Haoxing;LI Fenghua;SONG Chenggen;SU Mang;LIU Xin. Public key encryption with multi-keywords search [J]. J4, 2015, 42(5): 20-25. |
|