• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Guo Sixu, He Shen, Su Li, Zhang Xing, Zhou Fucai, Zhang Xinyue. Top-k Boolean Searchable Encryption Scheme Based on Multiple Keywords[J]. Journal of Computer Research and Development, 2022, 59(8): 1841-1852. DOI: 10.7544/issn1000-1239.20200605
Citation: Guo Sixu, He Shen, Su Li, Zhang Xing, Zhou Fucai, Zhang Xinyue. Top-k Boolean Searchable Encryption Scheme Based on Multiple Keywords[J]. Journal of Computer Research and Development, 2022, 59(8): 1841-1852. DOI: 10.7544/issn1000-1239.20200605

Top-k Boolean Searchable Encryption Scheme Based on Multiple Keywords

Funds: This work was supported by the Key Scientific and Technological Projects in Liaoning Province (2013217004), the Fundamental Research Funds for the Central Universities (N71704005), and the National Science and Technology Major Project (2013ZX03002006).
More Information
  • Published Date: July 31, 2022
  • In view of the searchable encryption technology in cloud storage services, this paper solves the following three problems:Firstly, most of the traditional searchable encryption methods only support single keyword search, and when the security index is too large, the search time cost is too high; Secondly, most of the existing schemes use inverted index for quick search, but inverted index does not support dynamic keyword update; Thirdly, most of the existing schemes can’t sort the search files efficiently according to the importance of keywords for some on-demand users. In this paper, a top-k boolean searchable encryption scheme based on multiple keywords (TBSE) is proposed. In the scheme, Goldwasser-Micalli and 2DNF encryption algorithms are used to construct a secure, index supporting dynamic update. Based on the set theory and boolean search, keyword intersection index and intersection search token are constructed to realize boolean search for multiple keywords. The top-k sorting is realized by fractional index constructed by using TF-IDF weighting technology and security coprocessor. The security analysis shows that the scheme can fully guarantee the security of the given ciphertext model and the known background model. The experiments prove that the scheme improves the efficiency of multi keywords Boolean search and index storage.
  • Related Articles

    [1]Jin Biao, Lin Xiang, Xiong Jinbo, You Weijing, Li Xuan, Yao Zhiqiang. Intellectual Property Protection of Deep Neural Network Models Based on Watermarking Technology[J]. Journal of Computer Research and Development, 2024, 61(10): 2587-2606. DOI: 10.7544/issn1000-1239.202440413
    [2]Zhang Yingjun, Chen Kai, Zhou Geng, Lü Peizhuo, Liu Yong, Huang Liang. Research Progress of Neural Networks Watermarking Technology[J]. Journal of Computer Research and Development, 2021, 58(5): 964-976. DOI: 10.7544/issn1000-1239.2021.20200978
    [3]Xu Tao, Wu Chuankun, Zhang Weiming. A White-Box-Cryptography-Based Scheme for the Secure Chip of DCAS Terminal[J]. Journal of Computer Research and Development, 2016, 53(11): 2465-2474. DOI: 10.7544/issn1000-1239.2016.20150546
    [4]Shi Hui, Li Mingchu. Safe Variable-Capacity Self-Recovery Watermarking Scheme[J]. Journal of Computer Research and Development, 2014, 51(8): 1715-1726. DOI: 10.7544/issn1000-1239.2014.20130232
    [5]Zeng Xiao, Chen Zhenyong, Chen Ming, and Xiong Zhang. Invertible Image Watermarking Based on Zero Coefficient Index[J]. Journal of Computer Research and Development, 2010, 47(7): 1304-1312.
    [6]Peng Hong, Wang Xun, Wang Weixing, Wang Jun, Hu Deyu. Audio Watermarking Approach Based on Audio Features in Multiwavelet Domain[J]. Journal of Computer Research and Development, 2010, 47(2): 216-222.
    [7]Xu Wenli, Yu Yeyun, Wang Yumin. Secure and Efficient Protocols for Watermark Verification[J]. Journal of Computer Research and Development, 2008, 45(3): 557-562.
    [8]Wang Rangding, Jiang Gangyi, Chen Jin'er, and Zhu Bin. An New Method of Audio-Digital Watermarking Based on Trap Strategy[J]. Journal of Computer Research and Development, 2006, 43(4): 613-620.
    [9]Yuan Jiesong, Wang Linzhang, Li Xuandong, and Zheng Guoliang. UMLTGF: A Tool for Generating Test Cases from UML Activity Diagrams Based on Grey-Box Method[J]. Journal of Computer Research and Development, 2006, 43(1): 46-53.
    [10]Yin Hao, Lin Chuang, Qiu Feng, and Ding Rong. A Survey of Digital Watermarking[J]. Journal of Computer Research and Development, 2005, 42(7): 1093-1099.
  • Cited by

    Periodical cited type(7)

    1. 朱诗能,韩萌,杨书蓉,代震龙,杨文艳,丁剑. 不平衡数据流的集成分类方法综述. 计算机工程与应用. 2025(02): 59-72 .
    2. 蔡博,张海清,李代伟,向筱铭,于曦,邓钧予. 基于增量加权的不平衡漂移数据流分类算法. 计算机应用研究. 2024(03): 854-860 .
    3. 郭虎升,刘艳杰,王文剑. 基于混合特征提取的流数据概念漂移处理方法. 计算机研究与发展. 2024(06): 1497-1510 . 本站查看
    4. 王婧,郭虎升,王文剑. 基于弱监督集成的概念演化自适应检测方法. 吉林大学学报(信息科学版). 2024(03): 406-420 .
    5. 郭虎升,张洋,王文剑. 面向不同类型概念漂移的两阶段自适应集成学习方法. 计算机研究与发展. 2024(07): 1799-1811 . 本站查看
    6. 马乾骏,郭虎升,王文剑. 在线深度神经网络的弱监督概念漂移检测方法. 小型微型计算机系统. 2024(09): 2094-2101 .
    7. 穆栋梁,韩萌,李昂,刘淑娟,高智慧. 概念漂移复杂数据流分类方法综述. 计算机应用. 2023(06): 1664-1675 .

    Other cited types(3)

Catalog

    Article views (134) PDF downloads (93) Cited by(10)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return