Public key searchable encryption scheme based on blockchain

被引:0
作者
Du R. [1 ,2 ]
Tan A. [1 ]
Tian J. [1 ,2 ]
机构
[1] Cyberspace Security and Computer College, Hebei University, Baoding
[2] Key Laboratory on High Trusted Information System in Hebei Province, Baoding
来源
Tongxin Xuebao/Journal on Communications | 2020年 / 41卷 / 04期
基金
中国国家自然科学基金;
关键词
Blockchain; Public key encryption; Searchable encryption; Smart contract;
D O I
10.11959/j.issn.1000-436x.2020070
中图分类号
学科分类号
摘要
Aiming at the trapdoor security problem of the public key encryption scheme, a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior. Research on trusted issues of third parties, the blockchain mechanism with a searchable encryption scheme was combined, and smart contracts as trusted third parties for retrieval was used, which could prevent keyword guessing attacks inside the server and ensure retrieval. The correctness of the results, thereby limiting the malicious behavior of the server when sending data. The solution was analyzed for security and the verification scheme satisfies IND-KGA security. Experiments in real data sets, compared with other programs, prove that the program has certain advantages in time overhead. © 2020, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:114 / 122
页数:8
相关论文
共 21 条
[1]  
Dawn S.D., Song D., Wagner A.P., Et al., Practical techniques for searches on encrypted data, Proceedings of the 2000 IEEE Security and Privacy Symposium, pp. 44-45, (2000)
[2]  
Boneh D., Crescenzo G.D., Ostrovsky R., Et al., Public key encryption with keyword search, International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506-522, (2004)
[3]  
Curtmola R., Garay J., Kamara S., Et al., Searchable symmetric encryption: improved definitions and efficient constructions, Journal of Computer Security, 19, 5, pp. 895-934, (2011)
[4]  
Wang P., Wang H., Pieprzyk J., Threshold privacy preserving keyword searches, Conference on Sofsem: Theory & Practice of Computer Science, pp. 646-658, (2008)
[5]  
Yuan K., Liu Z.L., Jia C.F., Et al., Public key timed-release searchable encryption in one-to-many scenarios, Tien Tzu Hsueh Pao/Acta Electronica Sinica, 43, 4, pp. 760-768, (2015)
[6]  
Zhong H., Cui J., Shi R.H., Et al., Many-to-one homomorphic e-ncryption scheme, Security & Communication Networks, 9, 10, pp. 1007-1015, (2016)
[7]  
Tang Q., Chen L.Q., Public-key encryption with registered keyword search, 6th European Workshop Public Key Infrastructures, pp. 163-178, (2009)
[8]  
Fang L.M., Susilo W., Ge C., Et al., Public key encryption with keyword search secure against keyword guessing attacks without random oracle, Information Sciences, 238, pp. 221-241, (2013)
[9]  
Xu P., Jin H., Wu Q., Et al., Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack, IEEE Transactions on Computers, 62, 11, pp. 2266-2277, (2013)
[10]  
Chen R., Mu Y., Yang G., Et al., A new general framework for secure public key encryption with keyword search, Australasian Conference on Information Security and Privacy, pp. 59-76, (2015)