Research on Asymmetric Searchable Encryption

被引:0
|
作者
Yu, Zonghua [1 ]
Wu, Yudong [1 ]
机构
[1] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
关键词
Searchable encryption; Asymmetric searchable encryption; Cloud Server; Trapdoor; Key pair;
D O I
10.1063/1.4982555
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Cloud server side to ease the user's local storage pressure at the same time, there are hidden data on the hidden dangers, the user often choose to upload the data in the form of cipher text to the cloud server. However, the classic data encryption and decryption algorithms are not provided search function, affecting the user's efficiency. To this end, an asymmetric searchable encryption scheme is proposed. The scheme can be used for any person can generate a trapdoor, cipher text can be free modified, the key pair generated by the user themselves, encrypt the identity, S-shaped virtual and other five loopholes to improve. The analysis results show that the scheme solves the above five vulnerabilities in the original scheme, so that the information semantics of both parties of communication can be guaranteed.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Cryptanalysis of an Asymmetric Searchable Encryption Scheme
    Zare, Fahimeh
    Mala, Hamid
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 82 - 85
  • [2] An Improved Asymmetric Searchable Encryption Scheme
    Wu, Qi
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 39 - 44
  • [3] Asymmetric Searchable Encryption from Inner Product Encryption
    Xiao, Siyu
    Ge, Aijun
    Zhang, Jie
    Ma, Chuangui
    Wang, Xu'an
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 123 - 132
  • [4] Research on Searchable Symmetric Encryption
    Wang Y.
    Chen X.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (10): : 2374 - 2385
  • [5] Research on Searchable Symmetric Encryption
    Wang Yunling
    Chen Xiaofeng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (10) : 2374 - 2385
  • [6] Trapdoor Privacy in Asymmetric Searchable Encryption Schemes
    Arriaga, Afonso
    Tang, Qiang
    Ryan, Peter
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 31 - 50
  • [7] FEASE: Fast and Expressive Asymmetric Searchable Encryption
    Meng, Long
    Chen, Liqun
    Tian, Yangguang
    Manulis, Mark
    Liu, Suhui
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 2545 - 2562
  • [8] Research on Privacy Preserving of Searchable Encryption
    Feng, Tao
    He, Weiyou
    PROCEEDINGS OF THE 2018 2ND HIGH PERFORMANCE COMPUTING AND CLUSTER TECHNOLOGIES CONFERENCE (HPCCT 2018), 2018, : 58 - 68
  • [9] Research Advances on Secure Searchable Encryption
    Dong X.
    Zhou J.
    Cao Z.
    Cao, Zhenfu (zfcao@sei.ecnu.edu.cn), 1600, Science Press (54): : 2107 - 2120
  • [10] Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud
    Zhang, Jianyi
    Song, Chenggen
    Wang, Zhiqiang
    Yang, Tao
    Ma, Wenming
    IEEE ACCESS, 2018, 6 : 68384 - 68393