Research on Asymmetric Searchable Encryption

被引:0
|
作者
Yu, Zonghua [1 ]
Wu, Yudong [1 ]
机构
[1] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
关键词
Searchable encryption; Asymmetric searchable encryption; Cloud Server; Trapdoor; Key pair;
D O I
10.1063/1.4982555
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Cloud server side to ease the user's local storage pressure at the same time, there are hidden data on the hidden dangers, the user often choose to upload the data in the form of cipher text to the cloud server. However, the classic data encryption and decryption algorithms are not provided search function, affecting the user's efficiency. To this end, an asymmetric searchable encryption scheme is proposed. The scheme can be used for any person can generate a trapdoor, cipher text can be free modified, the key pair generated by the user themselves, encrypt the identity, S-shaped virtual and other five loopholes to improve. The analysis results show that the scheme solves the above five vulnerabilities in the original scheme, so that the information semantics of both parties of communication can be guaranteed.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Rethinking Searchable Symmetric Encryption
    Gui, Zichen
    Paterson, Kenneth G.
    Patranabis, Sikhar
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1401 - 1418
  • [32] Deniable Searchable Symmetric Encryption
    Li, Huige
    Zhang, Fangguo
    Fan, Chun-I
    INFORMATION SCIENCES, 2017, 402 : 233 - 243
  • [33] Searchable encryption on the cloud: a survey
    Nitish Andola
    Raghav Gahlot
    Vijay Kumar Yadav
    S. Venkatesan
    Shekhar Verma
    The Journal of Supercomputing, 2022, 78 : 9952 - 9984
  • [34] Searchable Encryption through Dispersion
    Aiello Montandon, Carlos
    Vidal Introini, Luis
    Schwarz S. J., Thomas L. E.
    2014 IEEE CENTRAL AMERICA AND PANAMA CONVENTION (CONCAPAN XXXIV), 2014,
  • [35] Searchable Encryption Taxonomy: Survey
    Noorallahzadeh, M. H.
    Alimoradi, R.
    Gholami, A.
    JOURNAL OF APPLIED SECURITY RESEARCH, 2022, : 880 - 924
  • [36] Searchable encryption on the cloud: a survey
    Andola, Nitish
    Gahlot, Raghav
    Yadav, Vijay Kumar
    Venkatesan, S.
    Verma, Shekhar
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (07): : 9952 - 9984
  • [37] Broadcast Searchable Keyword Encryption
    Ali, Mohamed Ali Hamza
    Zhong, Ting
    Li, Fagen
    Qin, Zhiguan
    Abdelrahaman, Ahmed A. A.
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1010 - 1016
  • [38] Searchable Encryption in the Modern Era
    Curran, Kevin
    2017 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2017,
  • [39] Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs
    Yang, Yan-Yan
    Gong, Bei
    Jia, Zhi-Juan
    Cheng, Ya-Ge
    He, Yu-Chu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [40] Verifiable dynamic searchable encryption
    Etemad, Mohammad
    Kupcu, Alptekin
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 27 (04) : 2606 - 2623