Research on Asymmetric Searchable Encryption

被引:0
|
作者
Yu, Zonghua [1 ]
Wu, Yudong [1 ]
机构
[1] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
关键词
Searchable encryption; Asymmetric searchable encryption; Cloud Server; Trapdoor; Key pair;
D O I
10.1063/1.4982555
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Cloud server side to ease the user's local storage pressure at the same time, there are hidden data on the hidden dangers, the user often choose to upload the data in the form of cipher text to the cloud server. However, the classic data encryption and decryption algorithms are not provided search function, affecting the user's efficiency. To this end, an asymmetric searchable encryption scheme is proposed. The scheme can be used for any person can generate a trapdoor, cipher text can be free modified, the key pair generated by the user themselves, encrypt the identity, S-shaped virtual and other five loopholes to improve. The analysis results show that the scheme solves the above five vulnerabilities in the original scheme, so that the information semantics of both parties of communication can be guaranteed.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Distributed Searchable Symmetric Encryption
    Bosch, Christoph
    Peter, Andreas
    Leenders, Bram
    Lim, Hoon Wei
    Tang, Qiang
    Wang, Huaxiong
    Hartel, Pieter
    Jonker, Willem
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 330 - 337
  • [22] A Survey on Searchable Symmetric Encryption
    Li, Feng
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Ximeng
    Ning, Jianting
    Deng, Robert H.
    ACM COMPUTING SURVEYS, 2024, 56 (05)
  • [23] Searchable Encryption in the Modern Era
    Curran, Kevin
    2017 INTERNATIONAL CONFERENCE ON SOCIAL MEDIA, WEARABLE AND WEB ANALYTICS (SOCIAL MEDIA), 2017,
  • [24] Cloud Architectures for Searchable Encryption
    Bloemer, Johannes
    Loeken, Nils
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [25] Searchable Encryption Through Dispersion
    Aiello, C.
    Vidal, L.
    Schwarz, T.
    IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (05) : 2479 - 2484
  • [26] Lightweight Verification for Searchable Encryption
    Wang, Boyang
    Fan, Xinxin
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 932 - 937
  • [27] Searchable Encryption in the Modern Era
    Curran, Kevin
    2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [28] Searchable Encryption in Apache Cassandra
    Waage, Tim
    Jhajj, Ramaninder Singh
    Wiese, Lena
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 286 - 293
  • [29] Deterministic and efficiently searchable encryption
    Bellare, Mihir
    Boldyreva, Alexandra
    O'Neill, Adam
    ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 535 - +
  • [30] Searchable Encryption with Access Control
    Loeken, Nils
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,