《计算机应用》唯一官方网站 ›› 2023, Vol. 43 ›› Issue (3): 794-803.DOI: 10.11772/j.issn.1001-9081.2022020234

• 网络空间安全 • 上一篇    

可搜索公钥加密研究进展

宋文帅, 邓淼磊(), 马米米, 李昊宸   

  1. 河南工业大学 信息科学与工程学院,郑州 450001
  • 收稿日期:2022-03-02 修回日期:2022-05-13 接受日期:2022-05-13 发布日期:2022-08-16 出版日期:2023-03-10
  • 通讯作者: 邓淼磊
  • 作者简介:宋文帅(1998—),男,河南郑州人,硕士研究生,CCF会员,主要研究方向:信息安全、密码学
    邓淼磊(1977—),男,河南南阳人,教授,博士,CCF会员,主要研究方向:信息安全、密码学
    马米米(1987—),女,河南新乡人,讲师,博士,CCF会员,主要研究方向:信息安全、密码学
    李昊宸(1995—),男,河南郑州人,硕士研究生,CCF会员,主要研究方向:信息安全、密码学。
  • 基金资助:
    国家自然科学基金资助项目(61902111);河南省重大公益专项(201300311200)

Research progress in public-key encryption with keyword search

Wenshuai SONG, Miaolei DENG(), Mimi MA, Haochen LI   

  1. College of Information Science and Engineering,Henan University of Technology,Zhengzhou Henan 450001,China
  • Received:2022-03-02 Revised:2022-05-13 Accepted:2022-05-13 Online:2022-08-16 Published:2023-03-10
  • Contact: Miaolei DENG
  • About author:SONG Wenshuai, born in 1998, M. S. candidate. His research interests include information security, cryptography.
    MA Mimi, born in 1987, Ph. D., lecturer. Her research interests include information security, cryptography.
    LI Haochen, born in 1995, M. S. candidate. His research interests include information security, cryptography.
  • Supported by:
    National Natural Science Foundation of China(61902111);Major Public Welfare Project of Henan Province(201300311200)

摘要:

随着大数据和云计算技术的不断发展,云平台成为存储海量数据的首选,而用户数据隐私与安全是云计算环境中最重要的问题之一。为确保数据的安全,用户通常将敏感数据加密后再存储在云服务器中,如何在云上高效检索这些密文数据成为了挑战。可搜索加密技术允许用户通过关键词直接检索密文数据,为实现密文数据的高效检索提供了有效的办法,在保护数据隐私的同时减少了通信和计算开销。近几年,可搜索公钥加密(PEKS)技术为了应对不同平台和应用场景,出现了大量基于不同困难问题、查询方式、改变结构的扩展方案。因此针对安全扩展和功能扩展,围绕时下应用需求在权限共享、密钥管理问题、细粒度搜索和访问控制能力方面对PEKS扩展方案进行综述,并对具体阐述的方案性能进行深入对比分析,指出存在的优势与不足。最后对PEKS技术的发展趋势进行总结和展望。

关键词: 云安全, 数据隐私, 可搜索公钥加密, 关键词猜测攻击, 安全模型

Abstract:

With the continuous development of big data and cloud computing technology, cloud platforms have become the first choice for massive data storage, and user data privacy and security has become one of the most important issues in cloud computing environment. In order to ensure security of data, users usually encrypt sensitive data and then store it in cloud servers. And how to efficiently retrieve ciphertext data on the cloud becomes a challenge. Searchable encryption technology provides an effective method for solving efficient retrieval of ciphertext by allowing users to directly retrieve ciphertext data through keywords, which protects data privacy while reducing communication and computing overhead. In recent years, in order to cope with different platforms and application scenarios, Public-key Encryption with Keyword Search (PEKS) technology has produced a large number of extension schemes based on different difficult problems, query methods, and changing structures. For security extensions and functional extensions, PEKS extension schemes were reviewed in terms of permission sharing, key management issues, fine-grained search and access control capabilities of current application requirements, and the performance of the specifically described solutions were compared and analyzed in depth, pointing out the advantages and shortcomings. Finally, the development trends of PEKS technology was summarized and prospected.

Key words: cloud security, data privacy, Public-key Encryption with Keyword Search (PEKS), keyword guessing attack, security model

中图分类号: