计算机应用 ›› 2014, Vol. 34 ›› Issue (7): 1878-1883.DOI: 10.11772/j.issn.1001-9081.2014.07.1878

• 计算机安全 • 上一篇    下一篇

关键词可检索的公钥加密技术综述

杨健1,杨邓奇1,王剑2   

  1. 1. 大理学院 数学与计算机学院,云南 大理 671003
    2. 河南科技大学 电子与信息工程学院,河南 洛阳 471003
  • 收稿日期:2014-01-08 修回日期:2014-02-24 出版日期:2014-07-01 发布日期:2014-08-01
  • 通讯作者: 杨健
  • 作者简介:杨健(1976-),男,浙江上虞人,副教授,博士,CCF会员,主要研究方向:云计算数据安全与隐私保护;杨邓奇(1979-),男(白族),云南大理人,副教授,博士,主要研究方向:信息安全、点对点网络;王剑(1978-),女,河南洛阳人,副教授,博士,主要研究方向:信息安全、可信计算。
  • 基金资助:

    国家自然科学基金资助项目;河南省科技创新人才计划杰出青年基金资助项目;河南省教育厅科学技术研究重点项目基础研究计划;大理学院博士科研启动基金资助项目

Overview of public-key encryption with keyword search

YANG Jian1,YANG Dengqi1,WANG Jian2   

  1. 1. College of Mathematics and Computer, Dali University, Dali Yunnan 671003, China;
    2. College of Electronics and Information Engineering, Henan University of Science and Technology, Luoyang Henan 471003, China
  • Received:2014-01-08 Revised:2014-02-24 Online:2014-07-01 Published:2014-08-01
  • Contact: YANG Jian

摘要:

随着云计算技术的深入研究与应用,远程数据云存储的安全与隐私保护问题已成为企业和学术界共同关注的问题。传统数据加密方法虽然能部分解决上述的问题,但这些方法同时也给远程用户的查询和使用造成很多阻碍。针对这个问题,可查询加密技术提出了可行的一个解决方向,允许用户对远程存储的加密数据进行检索,因而也成为目前信息安全领域的一个研究热点。对公钥可查询加密中带有关键词检索的公钥加密(PEKS)的起源、背景及近年来研究成果进行综述,给出PEKS的形式化定义和安全性定义,详细论述PEKS中的安全信道依赖问题、查询功能改进等方面的研究成果,最后提出PEKS未来的发展趋势和理论研究中的热点及开放性问题。

Abstract:

With the intensive research and application of cloud computing, the problems about the security and privacy protection of the data stored on the remote server become hot issues of business and academia. Traditional cryptography methods can partly solve the above problems, but bring lots of obstacles to the remote user for data query and usage as well. Searchable encryption is an option to solve this contradiction, because of which enables users to search encrypted data stored on remote server, and has become a research hotspot in the field of information security at present. An overview of the public key searchable encryption was made in this paper, of which especially focused on the origin, background and research results in recent years of the Public key Encryption with Keyword Search (PEKS). The PEKS formal definition and security model definitions were given, followed by the detail discussion about the other aspects of this domain, such as the PEKS secure channel dependency problem, the query functional improvement, et al. Finally, the future trends, hotspot and open-ended problems of this novel research area were put forward.

中图分类号: