摘要
<正>Dear editor,Selective sharing of encrypted documents with other users makes the cloud storage system more flexible and effective [1]. For safety reasons, data owners use different keys to encrypt different documents. However, data owners need to distribute all keys to the query users for data sharing. Similarly,
引文
1 Liang J,Han W L,Guo Z Q,et al.DESC:enabling secure data exchange based on smart contracts.Sci China Inf Sci,2018,61:049102
2 Bao F,Deng R H,Ding X H,et al.Private query on encrypted data in multi-user settings.In:Proceedings of International Conference on Information Security Practice and Experience.Berlin:Springer,2008.71-85
3 Dong C Y,Russello G,Dulay N.Shared and searchable encrypted data for untrusted servers.J Comput Secur,2011,19:367-397
4 Li M,Yu S C,Cao N,et al.Authorized private keyword search over encrypted data in cloud computing.In:Proceedings of the 31st International Conference on Distributed Computing Systems(ICDCS),2011.383-392
5 Shi J,Lai J Z,Li Y J,et al.Authorized keyword search on encrypted data.In:Proceedings of European Symposium on Research in Computer Security.Berlin:Springer,2014.419-435
6 Boneh D,Gentry C,Waters B.Collusion resistant broadcast encryption with short ciphertexts and private keys.In:Advances in Cryptology-CRYPTO.Berlin:Springer,2005.3621:258-275
7 Cui B J,Liu Z L,Wang L Y.Key-aggregate searchable encryption(KASE)for group data sharing via cloud storage.IEEE Trans Comput,2016,65:2374-2385
1)lθthe length of a random string under system security parameter.
2)lm denotes the length of message.
3)Φ(x,ID,S)is the(n-|S|-1)-degree polynomial defined asΦ(x,ID,S)=n i=1(x+i)zi.Φi is the coefficient of xi,andΦ0=0.