用户名: 密码: 验证码:
Secure key-aggregation authorized searchable encryption
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Secure key-aggregation authorized searchable encryption
  • 作者:Haijiang ; WANG ; Xiaolei ; DONG ; Zhenfu ; CAO ; Dongmei ; LI ; Nanyuan ; CAO
  • 英文作者:Haijiang WANG;Xiaolei DONG;Zhenfu CAO;Dongmei LI;Nanyuan CAO;School of Information and Electronic Engineering, Zhejiang University of Science and Technology;Department of Computer Science and Engineering, Shanghai Jiao Tong University;Shanghai Key Lab for Trustworthy Computing, East China Normal University;
  • 中文刊名:JFXG
  • 英文刊名:中国科学:信息科学(英文版)
  • 机构:School of Information and Electronic Engineering, Zhejiang University of Science and Technology;Department of Computer Science and Engineering, Shanghai Jiao Tong University;Shanghai Key Lab for Trustworthy Computing, East China Normal University;
  • 出版日期:2019-02-15 07:01
  • 出版单位:Science China(Information Sciences)
  • 年:2019
  • 期:v.62
  • 基金:supported in part by National Natural Science Foundation of China (Grant Nos. 61632012, 61672239);; in part by Shanghai High-Tech Field Project (Grant No. 16511101400);; in part by Fundamental Research Funds for the Central Universities
  • 语种:英文;
  • 页:JFXG201903025
  • 页数:3
  • CN:03
  • ISSN:11-5847/TP
  • 分类号:220-222
摘要
<正>Dear editor,Selective sharing of encrypted documents with other users makes the cloud storage system more flexible and effective [1]. For safety reasons, data owners use different keys to encrypt different documents. However, data owners need to distribute all keys to the query users for data sharing. Similarly,
        
引文
1 Liang J,Han W L,Guo Z Q,et al.DESC:enabling secure data exchange based on smart contracts.Sci China Inf Sci,2018,61:049102
    2 Bao F,Deng R H,Ding X H,et al.Private query on encrypted data in multi-user settings.In:Proceedings of International Conference on Information Security Practice and Experience.Berlin:Springer,2008.71-85
    3 Dong C Y,Russello G,Dulay N.Shared and searchable encrypted data for untrusted servers.J Comput Secur,2011,19:367-397
    4 Li M,Yu S C,Cao N,et al.Authorized private keyword search over encrypted data in cloud computing.In:Proceedings of the 31st International Conference on Distributed Computing Systems(ICDCS),2011.383-392
    5 Shi J,Lai J Z,Li Y J,et al.Authorized keyword search on encrypted data.In:Proceedings of European Symposium on Research in Computer Security.Berlin:Springer,2014.419-435
    6 Boneh D,Gentry C,Waters B.Collusion resistant broadcast encryption with short ciphertexts and private keys.In:Advances in Cryptology-CRYPTO.Berlin:Springer,2005.3621:258-275
    7 Cui B J,Liu Z L,Wang L Y.Key-aggregate searchable encryption(KASE)for group data sharing via cloud storage.IEEE Trans Comput,2016,65:2374-2385
    1)lθthe length of a random string under system security parameter.
    2)lm denotes the length of message.
    3)Φ(x,ID,S)is the(n-|S|-1)-degree polynomial defined asΦ(x,ID,S)=n i=1(x+i)zi.Φi is the coefficient of xi,andΦ0=0.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700