引用本文
  • 秦志光,徐骏,聂旭云,熊虎.公钥可搜索加密体制综述[J].信息安全学报,2017,2(3):1-12    [点击复制]
  • QIN Zhiguang,XU Jun,NIE Xuyun,XIONG Hu.A Survey of Public-Key Encryption with Keyword Search[J].Journal of Cyber Security,2017,2(3):1-12   [点击复制]
【打印本页】 【下载PDF全文】 查看/发表评论下载PDF阅读器关闭

←前一篇|后一篇→

过刊浏览    高级检索

本文已被:浏览 10391次   下载 11712 本文二维码信息
码上扫一扫!
公钥可搜索加密体制综述
秦志光, 徐骏, 聂旭云, 熊虎
0
(电子科技大学信息与软件工程学院 成都 中国 610054)
摘要:
伴随着云计算技术的广泛应用,外包到云服务器存储的数据通常采用密文方式进行存储以确保数据安全和用户隐私。可搜索加密体制允许用户对密文数据通过关键词进行检索,从而极大减少了数据共享用户的通信和计算开销。基于公钥的可搜索加密体制解决了对称可搜索加密体制中的密钥分发问题而受到广泛关注。本文侧重于阐述公钥可搜索加密体制的研究进展,描述了它的形式化定义、安全模型;分析和讨论了典型的公钥可搜索加密体制的设计机理、相关的扩展方案以及它们的安全性问题。最后,本文还讨论了公钥可搜索加密体制的应用场景,并指出了未来可能的发展方向。
关键词:  云安全  可搜索加密  公钥可搜索加密  关键词猜测攻击
DOI:10.19363/j.cnki.cn10-1380/tn.2017.07.001
投稿时间:2016-06-14修订日期:2017-03-24
基金项目:本课题得到国家自然科学基金(Nos.61370026,61672135);国家自然基金重点国际(地区)合作研究项目(No.61520106007);四川省科技支撑项目(No.2016GZ0065);国家高科技研究发展计划(863计划)(No.2015AA016007)资助。
A Survey of Public-Key Encryption with Keyword Search
QIN Zhiguang, XU Jun, NIE Xuyun, XIONG Hu
(Department of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China)
Abstract:
With the population of cloud computing technology, tremendous data is outsourced in the cloud server in the encrypted form to ensure data security and user privacy. Searchable encryption allows users to retrieve the encrypted data by keywords, thus greatly reduce the user's communication and computation overhead. Public key cryptography based searchable encryption has solved the key distribution problem in symmetric key cryptography based searchable encryption and thus received a lot of attention recently. This paper focuses on the development of public-key encryption with keyword search (PEKS) by surveying the state-of-the-art of PEKS, describing the formal definition and security model of PEKS and analyzing the design philosophy of classical PEKS schemes. Furthermore, some extensions of PEKS in terms of function and security enhancement have also been given. Finally, this paper discusses the application scenario of PEKS, and demonstrates the future research directions of PEKS.
Key words:  cloud security  searchable encryption  public-key encryption with keyword search  keyword guessing attacks