《计算机应用》唯一官方网站 ›› 2025, Vol. 45 ›› Issue (9): 2882-2892.DOI: 10.11772/j.issn.1001-9081.2024081223
• 网络空间安全 • 上一篇
收稿日期:
2024-08-29
修回日期:
2024-10-30
接受日期:
2024-11-11
发布日期:
2024-11-19
出版日期:
2025-09-10
通讯作者:
闫润雨
作者简介:
郭瑞(1984—),男,河南洛阳人,副教授,博士,CCF会员,主要研究方向:可搜索加密、云计算安全、数据共享基金资助:
Runyu YAN1,2(), Rui GUO1,2, Yongbo YAN1,2, Guangjun LIU3
Received:
2024-08-29
Revised:
2024-10-30
Accepted:
2024-11-11
Online:
2024-11-19
Published:
2025-09-10
Contact:
Runyu YAN
About author:
GUO Rui, born in 1984, Ph. D., associate professor. His research interests include searchable encryption, cloud computing security, data sharing.Supported by:
摘要:
针对可搜索加密中的云服务器半可信特性可能导致返回错误或不完整搜索结果的问题,提出一种云中指定测试者的细粒度结果可验证搜索加密方案。该方案允许数据使用者在加密数据集上查询关键字来获取文件,并结合验证机制以确保云中数据隐私保护和搜索结果的可靠性;引入带Rank值的Merkle哈希树(MHT)和计数型布隆过滤器(CBF),不仅验证了数据集的正确性,还可以细粒度地筛选出正确结果并给出未返回的合格文件数,从而确保数据集的完整性,实现数据集的动态更新;并在随机预言机模型下证明选择关键字的语义安全性。实验结果表明,相较于传统的无证书可验证搜索加密方案,所提方案具有更小的计算开销,且在实际应用中具有较高的执行效率。
中图分类号:
闫润雨, 郭瑞, 闫永勃, 刘光军. 云中指定测试者的细粒度结果可验证搜索加密方案[J]. 计算机应用, 2025, 45(9): 2882-2892.
Runyu YAN, Rui GUO, Yongbo YAN, Guangjun LIU. Verifiable searchable encryption scheme of fine-grained result by designated tester in cloud[J]. Journal of Computer Applications, 2025, 45(9): 2882-2892.
符号 | 含义 |
---|---|
系统安全参数 | |
用户ID公钥 | |
用户ID私钥 | |
文件中包含的所有关键字集, | |
包含关键字 | |
包含关键字 | |
RMHT的根节点哈希值 | |
文件认证标签值 | |
包含关键字 | |
待搜索关键字 | |
证明信息 | |
验证信息 | |
文件搜索结果集,正确搜索下 | |
未返回合格文件数 |
表1 参数符号的含义
Tab. 1 Definition of parameter symbols
符号 | 含义 |
---|---|
系统安全参数 | |
用户ID公钥 | |
用户ID私钥 | |
文件中包含的所有关键字集, | |
包含关键字 | |
包含关键字 | |
RMHT的根节点哈希值 | |
文件认证标签值 | |
包含关键字 | |
待搜索关键字 | |
证明信息 | |
验证信息 | |
文件搜索结果集,正确搜索下 | |
未返回合格文件数 |
方案 | 抗密钥托管 | 指定 测试者 | 动态 更新 | 结果 验证 | 细粒度验证 |
---|---|---|---|---|---|
文献[ | × | √ | × | × | × |
文献[ | √ | √ | √ | × | × |
文献[ | √ | × | × | × | × |
文献[ | × | × | √ | √ | × |
文献[ | × | × | × | √ | × |
文献[ | × | √ | × | √ | × |
本文方案 | √ | √ | √ | √ | √ |
表2 不同方案的功能特性对比
Tab. 2 Comparison of functional characteristics of different schemes
方案 | 抗密钥托管 | 指定 测试者 | 动态 更新 | 结果 验证 | 细粒度验证 |
---|---|---|---|---|---|
文献[ | × | √ | × | × | × |
文献[ | √ | √ | √ | × | × |
文献[ | √ | × | × | × | × |
文献[ | × | × | √ | √ | × |
文献[ | × | × | × | √ | × |
文献[ | × | √ | × | √ | × |
本文方案 | √ | √ | √ | √ | √ |
方案 | 密文生成 | 陷门生成 | 匹配测试 | 结果验证 |
---|---|---|---|---|
文献[ | — | |||
文献[ | — | |||
文献[ | — | |||
文献[ | ||||
文献[ | ||||
文献[ | ||||
本文方案 |
表3 不同方案的计算开销对比
Tab. 3 Comparison of computational overhead of different schemes
方案 | 密文生成 | 陷门生成 | 匹配测试 | 结果验证 |
---|---|---|---|---|
文献[ | — | |||
文献[ | — | |||
文献[ | — | |||
文献[ | ||||
文献[ | ||||
文献[ | ||||
本文方案 |
操作 | 时间 | 操作 | 时间 |
---|---|---|---|
5.90 | 0.62 | ||
6.48 | 15.96 |
表4 基本运算消耗时间 (ms)
Tab. 4 Basic operation time consumption
操作 | 时间 | 操作 | 时间 |
---|---|---|---|
5.90 | 0.62 | ||
6.48 | 15.96 |
[1] | MELL P, GRANCE T. The NIST definition of cloud computing: NIST SP 800-14 [EB/OL]. [2024-06-11]. . |
[2] | 冯朝胜,秦志光,袁丁. 云数据安全存储技术[J]. 计算机学报, 2015, 38(1): 150-163. |
FENG C S, QIN Z G, YUAN D. Techniques of secure storage for cloud data [J]. Chinese Journal of Computers, 2015, 38(1): 150-163. | |
[3] | 沈剑,周天祺,曹珍富. 云数据安全保护方法综述[J]. 计算机研究与发展, 2021, 58(10): 2079-2098. |
SHEN J, ZHOU T Q, CAO Z F. Protection methods for cloud data security [J]. Journal of Computer Research and Development, 2021, 58(10): 2079-2098. | |
[4] | XUE K, CHEN W, LI W, et al. Combining data owner-side and cloud-side access control for encrypted cloud storage [J]. IEEE Transactions on Information Forensics and Security, 2018, 13(8): 2062-2074. |
[5] | 李颖,马春光. 可搜索加密研究进展综述[J]. 网络与信息安全学报, 2018, 4(7): 13-21. |
LI Y, MA C G. Review on research progress of searchable encryption [J]. Journal of Network and Information Security, 2018, 4(7): 13-21. | |
[6] | SONG D X, WANGER D A, PERRING A. Practical techniques for searches on encrypted data [C]// Proceedings of the 2000 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2000: 44-55. |
[7] | 吴逸伦. 不可信云环境下的数据保护与应用关键技术研究[D]. 长沙:国防科学技术大学, 2016: 1-132. |
WU Y L. Research on the data security in the untrusted cloud environment [D]. Changsha: National University of Defense Technology, 2016: 1-132. | |
[8] | LIU H, MING Y, WANG C, et al. Blockchain-assisted verifiable certificate-based searchable encryption against untrusted cloud server for Industrial Internet of Things [J]. Future Generation Computer Systems, 2024, 153: 97-112. |
[9] | WANG J, CHEN X, HUANG X, et al. Verifiable auditing for outsourced database in cloud computing [J]. IEEE Transactions on Computers, 2015, 64(11): 3293-3303. |
[10] | FAN Y, LIN X, TAN G, et al. One secure data integrity verification scheme for cloud storage [J]. Future Generation Computer Systems, 2019, 96: 376-385. |
[11] | YIN H, QIN Z, ZHANG J, et al. Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data [J]. IEEE Transactions on Cloud Computing, 2021, 9(1): 27-39. |
[12] | GOH E J. Secure indexes [EB/OL]. [2024-06-14]. . |
[13] | CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: improved definitions and efficient constructions [J]. Journal of Computer Security, 2011, 19(5): 895-934. |
[14] | BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search [C]// Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3027. Berlin: Springer, 2004: 506-522. |
[15] | BYUN J W, RHEE H S, PARK H A, et al. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data [C]// Proceedings of the 2006 Workshop on Secure Data Management, LNCS 4165. Berlin: Springer, 2006: 75-83. |
[16] | BAEK J, SAFAVI-NAINI R, SUSILO W. Public key encryption with keyword search revisited [C]// Proceedings of the 2008 International Conference on Computational Science and Its Applications, LNCS 5072. Berlin: Springer, 2008: 1249-1259. |
[17] | FANG L, SUSILO W, GE C, et al. Public key encryption with keyword search secure against keyword guessing attacks without random oracle [J]. Information Sciences, 2013, 238: 221-241. |
[18] | LI H, HUANG Q, SHEN J, et al. Designated-server identity-based authenticated encryption with keyword search for encrypted emails [J]. Information Sciences, 2019, 481: 330-343. |
[19] | GUO J, HAN L, YANG G, et al. An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability [J]. Journal of Cloud Computing, 2022, 11: No.14. |
[20] | GHOSH S, ISLAM S H, BISHT A, et al. Provably secure public key encryption with keyword search for data outsourcing in cloud environments [J]. Journal of Systems Architecture, 2023, 139: No.102876. |
[21] | CHENAM V B, ALI S T. A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment [J]. Journal of Information Security and Applications, 2023, 72: No.103377. |
[22] | PENG Y, CUI J, PENG C, et al. Certificateless public key encryption with keyword search [J]. China Communications, 2014, 11(11): 100-113. |
[23] | WU L, ZHANG Y, MA M, et al. Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things [J]. Annals of Telecommunications, 2019, 74(7/8): 423-434. |
[24] | CHENG L, MENG F. Public key authenticated searchable encryption against frequency analysis attacks [J]. Information Sciences, 2023, 640: No.119060. |
[25] | CHENG L, MENG F. Certificateless public key authenticated searchable encryption with enhanced security model in IIoT applications [J]. IEEE Internet of Things Journal, 2023, 10(2): 1391-1400. |
[26] | CHAI Q, GONG G. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers [C]// Proceedings of the 2012 IEEE International Conference on Communications. Piscataway: IEEE, 2012: 917-922. |
[27] | MIAO Y, MA J, LIU X, et al. VMKDO: verifiable multi-keyword search over encrypted cloud data for dynamic data-owner [J]. Peer-to-Peer Networking and Applications, 2018, 11(2): 287-297. |
[28] | ZHANG S, HE J, LIANG W, et al. MMDS: a secure and verifiable multimedia data search scheme for cloud-assisted edge computing [J]. Future Generation Computer Systems, 2024, 151: 32-44. |
[29] | 崔新华,田有亮,张起嘉. 高效的可验证无证书可搜索加密方案[J]. 通信学报, 2023, 44(8): 61-77. |
CUI X H, TIAN Y L, ZHANG Q J. Efficient certificateless searchable encryption scheme with verifiability [J]. Journal on Communications, 2023, 44(8): 61-77. | |
[30] | LI H, WANG T, QIAO Z, et al. Blockchain-based searchable encryption with efficient result verification and fair payment [J]. Journal of Information Security and Applications, 2021, 58: No.102791. |
[31] | LIU J, WEI Z, QIN J, et al. Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting [J]. IEEE Transactions on Services Computing, 2023, 16(6): 4233-4247. |
[32] | LIU C, CHEN J, YANG L T, et al. Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates [J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(9): 2234-2244. |
[33] | 李志单,陈勇群,王巍. 基于计数布隆过滤器的属性基多关键词可搜索加密方案[J]. 电信科学, 2023, 39(11): 116-127. |
LI Z D, CHEN Y Q, WANG W. Attribute-based multi-keyword searchable encryption scheme based on counting Bloom filter [J]. Telecommunications Science, 2023, 39(11): 116-127. | |
[34] | BONEH D, FRANKLIN M. Identity based encryption from the Weil pairing [J]. SIAM Journal on Computing, 2003, 32(3): 586-615. |
[35] | TAKASHIMA K. Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2020, E103-A(1): 74-106. |
[36] | SUN L, XU C, ZHANG X, et al. Certificateless searchable encryption with trapdoor unlinkability for industrial Internet of Things [J]. IEEE Systems Journal, 2023, 17(3): 4521-4532. |
[1] | 刘运东, 汪学明. 基于穿刺伪随机函数的动态可搜索加密方案[J]. 《计算机应用》唯一官方网站, 2025, 45(8): 2612-2621. |
[2] | 马海峰, 蔡杰伟, 薛庆水, 杨家海, 韩静, 卢子譞. 基于格的后量子无证书公共审计方案[J]. 《计算机应用》唯一官方网站, 2025, 45(4): 1249-1255. |
[3] | 张晓均, 郝云溥, 李磊, 李晨阳, 周子玉. 基于工业云存储系统的数据防篡改批量审计方案[J]. 《计算机应用》唯一官方网站, 2025, 45(3): 891-895. |
[4] | 孙晓玲, 王丹辉, 李姗姗. 基于区块链的动态密文排序检索方案[J]. 《计算机应用》唯一官方网站, 2024, 44(8): 2500-2505. |
[5] | 王政, 王经纬, 殷新春. 支持用户撤销的可搜索电子健康记录共享方案[J]. 《计算机应用》唯一官方网站, 2024, 44(2): 504-511. |
[6] | 高改梅, 段明博, 荀亚玲, 刘春霞, 党伟超. 支持密码逆向防火墙的基于SM9的属性基可搜索加密方案[J]. 《计算机应用》唯一官方网站, 2024, 44(11): 3495-3502. |
[7] | 杜晓玉, 刘帅起, 韩志杰, 霍振祥, 王玉璟. 以患者为中心基于IPFS和区块链的医疗信息共享方案[J]. 《计算机应用》唯一官方网站, 2024, 44(10): 3122-3133. |
[8] | 陆佳行, 戴华, 刘源龙, 周倩, 杨庚. 面向云环境密文排序检索的字典划分向量空间模型[J]. 《计算机应用》唯一官方网站, 2023, 43(7): 1994-2000. |
[9] | 谢振杰, 付伟. 基于可审计多副本的云存储差错副本恢复机制[J]. 《计算机应用》唯一官方网站, 2023, 43(4): 1102-1108. |
[10] | 庞晓琼, 王云婷, 陈文俊, 姜攀, 高亚楠. 基于区块链的公平可验证的多关键词密文排序检索[J]. 《计算机应用》唯一官方网站, 2023, 43(1): 130-139. |
[11] | 李莉, 吴怡, 杨祉坤, 陈云鹏. 基于分区型区块链医疗电子病历共享方案[J]. 《计算机应用》唯一官方网站, 2022, 42(1): 183-190. |
[12] | 李秀艳, 刘明曦, 史闻博, 董国芳. 面向资源受限用户的高效动态数据审计方案[J]. 计算机应用, 2021, 41(2): 422-432. |
[13] | 孙晓玲, 杨光, 沈焱萍, 杨秋格, 陈涛. 基于可拆分倒排索引的可搜索加密方案[J]. 《计算机应用》唯一官方网站, 2021, 41(11): 3288-3294. |
[14] | 唐鑫, 周琳娜. 基于响应模糊化的抗附加块攻击云数据安全去重方法[J]. 计算机应用, 2020, 40(4): 1085-1090. |
[15] | 付伟, 顾晨阳, 高强. 基于属性加密的多用户共享ORAM方案[J]. 《计算机应用》唯一官方网站, 2020, 40(2): 497-502. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||