Design and Implementation of Searchable Encryption Scheme Prototype System Based on BSSEVD
LI Peng1,2, ZHOU Fu-cai1, ZHANG Shuai1
1. School of Software, Northeastern University, Shenyang 110169, China; 2. School of Information Engineering, Eastern Liaoning University, Dandong 118000, China.
LI Peng, ZHOU Fu-cai, ZHANG Shuai. Design and Implementation of Searchable Encryption Scheme Prototype System Based on BSSEVD[J]. Journal of Northeastern University Natural Science, 2020, 41(9): 1244-1250.
[1]Wang Q,He M,Du M,et al.Searchable encryption over feature-rich data [J].IEEE Transactions on Dependable & Secure Computing,2018,12(3):496-510. [2]Yu Y,Au M H A,Ateniese G,et al.Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage[J].IEEE Transactions on Information Forensics & Security,2017,12(4):767-778. [3]Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[C]//IEEE Symposium on Security & Privacy.Berkeley,2000:44 - 55. [4]Goh E J.Secure indexes[EB /OL].( 2004-03- 16 )[2019-12 -18].https://eprint.Iacr.org/2003/216.pdf. [5]Chang Y C,Mitzenmacher M.Privacy preserving keyword searches on remote encrypted data[C]//Applied Cryptography and Network Security.Berlin: Springer-Verlag,2005: 442-455. [6]Stefanov E,Papamanthou C,Shi E.Practical dynamic searchable encryption with small leakage[C]//Network and Distributed System Security Symposium.San Diego,2014:1-15. [7]Kamara S,Moataz T.Boolean searchable symmetric encryption with worst-case sub-linear complexity [C]//Advances in Cryptology-EUROCRYPT 2017.Paris,2017:99-124. [8]Boneh D,Crescenzo G D,Ostrovsky R,et al.Public key encryption with keyword search[J].Lecture Notes in Computer Science,2003,49(16):506-522. [9]Bellare M,Boldyreva A,O’Neill A.Deterministic and efficiently searchable encryption[C]//Advances in Cryptology-CRYPTO 2007.Berlin:Springer-Verlag,2007: 535-552. [10]Lin X,Lu R,Foxton K,et al.An efficient searchable encryption scheme and its application in network forensics[C]//Forensics in Telecommunications,Information and Multimedia.Berlin:Springer-Verlag,2011: 66-78. [11]Hwang Y H,Lee P J.Public key encryption with conjunctive keyword search and its extension to a multi-user system[C]//Pairing-Based Cryptography–Pairing 2007.Berlin: Springer-Verlag,2007: 2-22. [12]Li M,Yu S,Cao N,et al.Authorized private keyword search over encrypted data in cloud computing[C]// 2011 31st International Conference on Distributed Computing Systems.Minneapolis: IEEE,2011: 383-392. [13]Sun W,Yu S,Lou W,et al.Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[C]//IEEE INFOCOM 2014.Toronto: IEEE,2014: 226-234. [14]Cash D,Jaeger J,Jarecki S,et al.Dynamic searchable encryption in very-large databases: data structures and implementation[C]//2014 Network and Distributed System Security Symposium.San Diego:Internet Seciety,2014:853. [15]关守平,房少纯.一种新型的区间-粒子群优化算法[J].东北大学学报(自然科学版),2012,33(10):1381-1384.(Guan Shou-ping,Fang Shao-chun.A new interval particle swarm optimization algorithm[J].Journal of Northeastern University(Natural Science),2012,33(10):1381-1384.)