高级检索
    杜瑞忠, 王一, 李明月. 支持双向验证的动态密文检索方案[J]. 计算机研究与发展, 2022, 59(11): 2635-2647. DOI: 10.7544/issn1000-1239.20210153
    引用本文: 杜瑞忠, 王一, 李明月. 支持双向验证的动态密文检索方案[J]. 计算机研究与发展, 2022, 59(11): 2635-2647. DOI: 10.7544/issn1000-1239.20210153
    Du Ruizhong, Wang Yi, Li Mingyue. Dynamic Ciphertext Retrieval Scheme with Two-Way Verification[J]. Journal of Computer Research and Development, 2022, 59(11): 2635-2647. DOI: 10.7544/issn1000-1239.20210153
    Citation: Du Ruizhong, Wang Yi, Li Mingyue. Dynamic Ciphertext Retrieval Scheme with Two-Way Verification[J]. Journal of Computer Research and Development, 2022, 59(11): 2635-2647. DOI: 10.7544/issn1000-1239.20210153

    支持双向验证的动态密文检索方案

    Dynamic Ciphertext Retrieval Scheme with Two-Way Verification

    • 摘要: 动态可搜索加密技术实现了数据动态更新,可以应对更加灵活多变的应用挑战,但是对于数据更新时产生的隐私泄露以及用户与云服务器的不诚实性问题并没有解决.为了解决上述问题,提出了一种支持双向验证的动态密文检索方案,实现用户与云服务器之间的双向验证.首先,引入位图索引以及同态加法对称加密技术,使用位图索引表示单个关键字每次更新涉及的所有文档标识符,减少了云服务器搜索次数和本地索引加密次数,从而提高了搜索效率以及更新效率,并且利用同态加法对称加密对位图索引进行加密,可以有效地保护数据的安全更新.其次,将聚合消息认证码上传到区块链中,利用区块链对云服务器返回的结果进行正确性验证,防止用户和云服务器发生欺骗行为.最后,实验结果和安全分析表明,方案满足前向安全与后向安全,并且在索引生成、搜索、更新以及验证方面提高了效率.

       

      Abstract: The dynamic searchable encryption technology realizes the dynamic update of data, which can cope with more flexible application challenges, but the problem of privacy leakage and the dishonesty between users and cloud servers during data update have not been solved. In order to solve the above problem, a dynamic ciphertext retrieval scheme with two-way verification is proposed to achieve two-way verification between users and cloud servers. First, the introduction of bitmap index and homomorphic addition symmetric encryption technology, the use of bitmap index can represent all document identifiers involved in each update of a single keyword, reduce the number of cloud server searches and local index encryption times, thereby improve search and update efficiency, and the use of homomorphic addition symmetric encryption to encrypt the bitmap index can effectively protect the safe update of data. Secondly, the clients upload the aggregate MACs to the blockchain, and use the blockchain to verify the correctness of the results returned by the cloud server to prevent fraudulent behaviors between users and the cloud servers. Finally, the experimental results and security analysis show that the solution meets forward security and backward security, and improves efficiency in index building, search, update, and verification.

       

    /

    返回文章
    返回