• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Du Ruizhong, Wang Yi, Li Mingyue. Dynamic Ciphertext Retrieval Scheme with Two-Way Verification[J]. Journal of Computer Research and Development, 2022, 59(11): 2635-2647. DOI: 10.7544/issn1000-1239.20210153
Citation: Du Ruizhong, Wang Yi, Li Mingyue. Dynamic Ciphertext Retrieval Scheme with Two-Way Verification[J]. Journal of Computer Research and Development, 2022, 59(11): 2635-2647. DOI: 10.7544/issn1000-1239.20210153

Dynamic Ciphertext Retrieval Scheme with Two-Way Verification

Funds: This work was supported by the National Natural Science Foundation of China (61972073), the Key Research and Development Program of Hebei Province of China (22340701D), and the Natural Science Foundation of Hebei Province of China (F2022201005).
More Information
  • Published Date: October 31, 2022
  • The dynamic searchable encryption technology realizes the dynamic update of data, which can cope with more flexible application challenges, but the problem of privacy leakage and the dishonesty between users and cloud servers during data update have not been solved. In order to solve the above problem, a dynamic ciphertext retrieval scheme with two-way verification is proposed to achieve two-way verification between users and cloud servers. First, the introduction of bitmap index and homomorphic addition symmetric encryption technology, the use of bitmap index can represent all document identifiers involved in each update of a single keyword, reduce the number of cloud server searches and local index encryption times, thereby improve search and update efficiency, and the use of homomorphic addition symmetric encryption to encrypt the bitmap index can effectively protect the safe update of data. Secondly, the clients upload the aggregate MACs to the blockchain, and use the blockchain to verify the correctness of the results returned by the cloud server to prevent fraudulent behaviors between users and the cloud servers. Finally, the experimental results and security analysis show that the solution meets forward security and backward security, and improves efficiency in index building, search, update, and verification.
  • Related Articles

    [1]Li Yuxi, Chen Jingjing, Zhuo Fucai, Xu Jian, Ji Dong. Verifiable Boolean Searchable Encryption Based on Blockchain Index[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440501
    [2]Zhu Longlong, Chen Xiang, Chen Haodong, Niu Jitang, Liu Wenjing, Lin Shengrui, Zhang Dong, Wu Chunming. An Accurate Blockchain Anomaly Detection Mechanism Built on Approximate Sketch Algorithms[J]. Journal of Computer Research and Development, 2024, 61(10): 2526-2539. DOI: 10.7544/issn1000-1239.202440477
    [3]Ke Yuhong, Lin Chao, Huang Xinyi, Wu Wei, Chen Yujie. An Efficient Passwordless Authentication Scheme Based on Blockchain[J]. Journal of Computer Research and Development, 2024, 61(10): 2514-2525. DOI: 10.7544/issn1000-1239.202440468
    [4]Chen Xiao, Huang Muhong, Tian Yifan, Wang Yan, Cao Sheng, Zhang Xiaosong. Internet of Vehicles Data Sharing Scheme via Blockchain Sharding[J]. Journal of Computer Research and Development, 2024, 61(9): 2246-2260. DOI: 10.7544/issn1000-1239.202330899
    [5]He Yunhua, Luo Mingshun, Hu Qing, Wu Bin, Wang Chao, Xiao Ke. Research Progress on Security Technology for Cross-Chain Service of Energy Blockchain[J]. Journal of Computer Research and Development, 2024, 61(4): 1018-1037. DOI: 10.7544/issn1000-1239.202220892
    [6]Liu Wei, Tang Congke, Ma Jie, Tian Zhao, Wang Qi, She Wei. A Federated Learning Model for Privacy Protection Based on Blockchain and Dynamic Evaluation[J]. Journal of Computer Research and Development, 2023, 60(11): 2583-2593. DOI: 10.7544/issn1000-1239.202330269
    [7]Zhang Zelin, Wang Huaqun. Dynamic Key Management of Industrial Internet Based on Blockchain[J]. Journal of Computer Research and Development, 2023, 60(2): 386-397. DOI: 10.7544/issn1000-1239.202111095
    [8]Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei. One-Time Chameleon Hash Function and Its Application in Redactable Blockchain[J]. Journal of Computer Research and Development, 2021, 58(10): 2310-2318. DOI: 10.7544/issn1000-1239.2021.20210653
    [9]Huang Kezhen, Lian Yifeng, Feng Dengguo, Zhang Haixia, Liu Yuling, Ma Xiangliang. Cyber Security Threat Intelligence Sharing Model Based on Blockchain[J]. Journal of Computer Research and Development, 2020, 57(4): 836-846. DOI: 10.7544/issn1000-1239.2020.20190404
    [10]Liu Yining, Zhou Yuanjian, Lan Rushi, Tang Chunming. Blockchain-Based Verification Scheme for Deletion Operation in Cloud[J]. Journal of Computer Research and Development, 2018, 55(10): 2199-2207. DOI: 10.7544/issn1000-1239.2018.20180436
  • Cited by

    Periodical cited type(0)

    Other cited types(2)

Catalog

    Article views (126) PDF downloads (67) Cited by(2)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return