• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Qiang, Zhou Fucai, Xuan Pengkai, Wu Qiyu. Publicly Verifiable Database Model with Full Operations Based on Bilinear Map[J]. Journal of Computer Research and Development, 2019, 56(3): 521-532. DOI: 10.7544/issn1000-1239.2019.20170839
Citation: Wang Qiang, Zhou Fucai, Xuan Pengkai, Wu Qiyu. Publicly Verifiable Database Model with Full Operations Based on Bilinear Map[J]. Journal of Computer Research and Development, 2019, 56(3): 521-532. DOI: 10.7544/issn1000-1239.2019.20170839

Publicly Verifiable Database Model with Full Operations Based on Bilinear Map

More Information
  • Published Date: February 28, 2019
  • The existing verifiable outsourced database schemes only support some kind of tailored queries with low efficiency and large data expanding rate. Besides, the overheads of verification and update of these schemes are unacceptable. As a result, they cannot be applied into practice. To resolve these problem, we propose a novel primitive called publicly verifiable outsourced database with full operations based on bilinear map. We present a system model and security model of our scheme. Based on bilinear map, we construct a publicly verifiable outsourced database scheme with full operations, and design each algorithm in detail. We present the rigorous security proof under q-BSDH assumption and VBDHE assumption. Finally, we make a comparison with other state of art schemes in two directions: functionality and performance. The theoretical analysis and simulation confirm that our scheme is more functional, efficient and practical. Furthermore, verification and update phases do not require data owner’s private key, and any client owning public key and digest can verify the correctness of query and update database. Therefore, our scheme supports public verification and public update.
  • Related Articles

    [1]Du Ruizhong, Wang Yi, Li Mingyue. Dynamic Ciphertext Retrieval Scheme with Two-Way Verification[J]. Journal of Computer Research and Development, 2022, 59(11): 2635-2647. DOI: 10.7544/issn1000-1239.20210153
    [2]Guo Sixu, He Shen, Su Li, Zhang Xing, Zhou Fucai, Zhang Xinyue. Top-k Boolean Searchable Encryption Scheme Based on Multiple Keywords[J]. Journal of Computer Research and Development, 2022, 59(8): 1841-1852. DOI: 10.7544/issn1000-1239.20200605
    [3]Yan Xincheng, Chen Yue, Ba Yang, Jia Hongyong, Wang Zhonghui. Updatable Attribute-Based Encryption Scheme Supporting Dynamic Change of User Rights[J]. Journal of Computer Research and Development, 2020, 57(5): 1057-1069. DOI: 10.7544/issn1000-1239.2020.20190254
    [4]Liu Yining, Zhou Yuanjian, Lan Rushi, Tang Chunming. Blockchain-Based Verification Scheme for Deletion Operation in Cloud[J]. Journal of Computer Research and Development, 2018, 55(10): 2199-2207. DOI: 10.7544/issn1000-1239.2018.20180436
    [5]Wu Qiyu, Zhou Fucai, Wang Qiang, Li Yuxi. Publicly Verifiable Databases Scheme with Efficient Updates and Low Storage Overhead[J]. Journal of Computer Research and Development, 2018, 55(8): 1800-1808. DOI: 10.7544/issn1000-1239.2018.20170320
    [6]Bao Yibao, Yin Lihua, Fang Binxing, Guo Li. Logic-Based Dynamical Security Policy Language and Verification[J]. Journal of Computer Research and Development, 2013, 50(5): 932-941.
    [7]Liu Xiaozhu, Peng Zhiyong. On-Line Dynamic Index Hybrid Update Scheme Based on Self-Learning of Allocated Space[J]. Journal of Computer Research and Development, 2012, 49(10): 2118-2130.
    [8]Xiang Sen, Chen Yiyun, Lin Chunxiao, and Li Long. Safety Verification of Dynamic Storage Management in Coq[J]. Journal of Computer Research and Development, 2007, 44(2): 361-367.
    [9]Zhao Xin, Li Xiaojian, and Wu Wei. A Centralized Warrant Distributing and Updating Approach for Secure Multicast Group Control[J]. Journal of Computer Research and Development, 2006, 43(8): 1391-1397.
    [10]Li Guohui, Wang Hongya, Liu Yunsheng. Updates Dissemination in Mobile Real-Time Database Systems[J]. Journal of Computer Research and Development, 2005, 42(11): 2004-2009.

Catalog

    Article views (975) PDF downloads (342) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return