• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Dong Xiaolei, Zhou Jun, Cao Zhenfu. Research Advances on Secure Searchable Encryption[J]. Journal of Computer Research and Development, 2017, 54(10): 2107-2120. DOI: 10.7544/issn1000-1239.2017.20170627
Citation: Dong Xiaolei, Zhou Jun, Cao Zhenfu. Research Advances on Secure Searchable Encryption[J]. Journal of Computer Research and Development, 2017, 54(10): 2107-2120. DOI: 10.7544/issn1000-1239.2017.20170627

Research Advances on Secure Searchable Encryption

More Information
  • Published Date: September 30, 2017
  • With the development of big data and cloud computing, the issue of secure search via the technique of searchable encryption has increasingly been the focus of the researchers in cryptography and network security all over the world. In the light of the new theories, new solutions and new techniques of searchable encryption, this paper presents a survey mainly from the following four aspects: the modes, the security, the expressiveness and the efficiency of secure searchable encryption. It discusses the new theories which are essential to secure search for ubiquitous network, including searchable encryption, attribute-based encryption, and applying these cryptographic mechanisms to obtain the generalized solutions to the theoretical problems of secure search in types of new emerging network services. Based on the aforementioned theoretical results, this paper studies the new approaches to construct practical secure search for these network services, comprising the light-weight public-key cryptographic algorithms, reducing the times of applying the light-weight public-key cryptographic algorithms in secure search, and exploiting any public-key cryptographic algorithm only once to obtain new approaches for secure search in the environment of resource-constrained network applications. We also focus on studying how to apply the new theories and approaches to solve the problems associated to secure search in different kinds of networks, including body area network, wireless vehicular ad hoc network, smart grid and so on. It is traditionally required to apply inefficient public-key cryptographic algorithms a number of times to construct secure search protocols. How to manipulate the public-key cryptographic algorithms and make them suitable to be used in resource-constrained networks becomes the key issue. Light-weighting public-key cryptographic algorithms is certainly a convincing way to address it. On the other hand, minimizing the number (once would be ideal) of applying the light-weighted public-key cryptographic algorithms guarantees more efficient and practical solutions and thus is the key problem to address the issue. Finally, we suggest several interesting open research issues and the trend in the future.
  • Related Articles

    [1]Su Zelin, Zhang Wenfang, Wang Xiaomin. Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext[J]. Journal of Computer Research and Development, 2024, 61(12): 3088-3097. DOI: 10.7544/issn1000-1239.202220133
    [2]Zhu Liufu, Li Jiguo, Lu Yang, Zhang Yichen. Efficient and Forward-Secure Attribute-Based Sanitizable Signature Scheme[J]. Journal of Computer Research and Development, 2023, 60(12): 2737-2748. DOI: 10.7544/issn1000-1239.202220212
    [3]Niu Shufen, Xie Yaya, Yang Pingping, Du Xiaoni. Cloud-Assisted Attribute-Based Searchable Encryption Scheme on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(4): 811-821. DOI: 10.7544/issn1000-1239.2021.20200041
    [4]Qian Hanjia, Wang Yihuai, Peng Tao, Chen Cheng, Luo Xizhao. Efficient and Verifiable Encryption Scheme in Lightweight Narrowband Internet of Things Applications[J]. Journal of Computer Research and Development, 2019, 56(5): 1112-1122. DOI: 10.7544/issn1000-1239.2019.20180217
    [5]Zhao Zhiyuan, Wang Jianhua, Xu Kaiyong, Guo Songhui. Fully Outsourced Attribute-Based Encryption with Verifiability for Cloud Storage[J]. Journal of Computer Research and Development, 2019, 56(2): 442-452. DOI: 10.7544/issn1000-1239.2019.20170883
    [6]Xu Qian, Tan Chengxiang, Fan Zhijie, Feng Jun, Zhu Wenye, Xiao Ya. An Efficient Searchable Encryption Scheme with Designed Tester and Revocable Proxy Re-Encryption[J]. Journal of Computer Research and Development, 2018, 55(5): 994-1013. DOI: 10.7544/issn1000-1239.2018.20161051
    [7]Ye Qing, Hu Mingxing, Tang Yongli, Liu Kun, Yan Xixi. Efficient Hierarchical Identity-Based Encryption Scheme from Learning with Errors[J]. Journal of Computer Research and Development, 2017, 54(10): 2193-2204. DOI: 10.7544/issn1000-1239.2017.20170394
    [8]Zhang Kai, Wei Lifei, Li Xiangxue, Chen Jie, Qian Haifeng. An Efficient and Expressive Attribute-Based Encryption Scheme with Chosen Ciphertext Security[J]. Journal of Computer Research and Development, 2016, 53(10): 2239-2247. DOI: 10.7544/issn1000-1239.2016.20160430
    [9]Ma Haiying, Zeng Guosun, Bao Zhihua, Chen Jianping, Wang Jinhua, Wang Zhanjun. Attribute-Based Encryption Scheme Resilient Against Continuous Auxiliary-Inputs Leakage[J]. Journal of Computer Research and Development, 2016, 53(8): 1867-1878. DOI: 10.7544/issn1000-1239.2016.20140787
    [10]Zhang Xing, Wen Zilong, Shen Qingni, Fang Yuejian, Wu Zhonghai. Accountable Attribute-Based Encryption Scheme Without Key Escrow[J]. Journal of Computer Research and Development, 2015, 52(10): 2293-2303. DOI: 10.7544/issn1000-1239.2015.20150550

Catalog

    Article views (3110) PDF downloads (1477) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return