引用本文: |
-
秦志光,徐骏,聂旭云,熊虎.公钥可搜索加密体制综述[J].信息安全学报,2017,2(3):1-12 [点击复制]
- QIN Zhiguang,XU Jun,NIE Xuyun,XIONG Hu.A Survey of Public-Key Encryption with Keyword Search[J].Journal of Cyber Security,2017,2(3):1-12 [点击复制]
|
|
摘要: |
伴随着云计算技术的广泛应用,外包到云服务器存储的数据通常采用密文方式进行存储以确保数据安全和用户隐私。可搜索加密体制允许用户对密文数据通过关键词进行检索,从而极大减少了数据共享用户的通信和计算开销。基于公钥的可搜索加密体制解决了对称可搜索加密体制中的密钥分发问题而受到广泛关注。本文侧重于阐述公钥可搜索加密体制的研究进展,描述了它的形式化定义、安全模型;分析和讨论了典型的公钥可搜索加密体制的设计机理、相关的扩展方案以及它们的安全性问题。最后,本文还讨论了公钥可搜索加密体制的应用场景,并指出了未来可能的发展方向。 |
关键词: 云安全 可搜索加密 公钥可搜索加密 关键词猜测攻击 |
DOI:10.19363/j.cnki.cn10-1380/tn.2017.07.001 |
投稿时间:2016-06-14修订日期:2017-03-24 |
基金项目:本课题得到国家自然科学基金(Nos.61370026,61672135);国家自然基金重点国际(地区)合作研究项目(No.61520106007);四川省科技支撑项目(No.2016GZ0065);国家高科技研究发展计划(863计划)(No.2015AA016007)资助。 |
|
A Survey of Public-Key Encryption with Keyword Search |
QIN Zhiguang, XU Jun, NIE Xuyun, XIONG Hu
|
(Department of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China) |
Abstract: |
With the population of cloud computing technology, tremendous data is outsourced in the cloud server in the encrypted form to ensure data security and user privacy. Searchable encryption allows users to retrieve the encrypted data by keywords, thus greatly reduce the user's communication and computation overhead. Public key cryptography based searchable encryption has solved the key distribution problem in symmetric key cryptography based searchable encryption and thus received a lot of attention recently. This paper focuses on the development of public-key encryption with keyword search (PEKS) by surveying the state-of-the-art of PEKS, describing the formal definition and security model of PEKS and analyzing the design philosophy of classical PEKS schemes. Furthermore, some extensions of PEKS in terms of function and security enhancement have also been given. Finally, this paper discusses the application scenario of PEKS, and demonstrates the future research directions of PEKS. |
Key words: cloud security searchable encryption public-key encryption with keyword search keyword guessing attacks |