Font Size: a A A

Research And Implementation Of Public Key Encryption Schemes With Keywords

Posted on:2014-06-12Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y ZhangFull Text:PDF
GTID:2268330401453810Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of network storage service, many enterprises andindividuals have stored a large amount of data on a third-party server. This only needs topay less fee and they can not only save valuable storage space, but also add a backup fortheir data. Though this can bring some benefits to users, the users also assume certainsecurity risks accordingly. Although encryption technology can guarantee the privacy ofuser data, the keyword search based on cryptograph environment is very difficult. Howto efficiently query the cipher text messages in the server, and do not disclose to serverkeywords. It is a urgent problem that need to be solved. Therefore, searchableencryption scheme based on cryptograph environment research has become one of thehot research topics in recent years.According to different encryption systems, searchable encryption can be dividedinto symmetric encryption with keyword search and Public key Encryption withKeyword Search (PEKS). Song and Boneh have successively put forward differentsearchable encrypted schemes respectively. But there are disadvantages in their schemes.Symmetric encryption scheme has the advantages of simple and efficient but unable torealize the secret of third-party data retrieval. Although the Public key Encryption withKeyword Search can realize the private search for third-party data, its efficiency is nothigh. This paper in view of the question that the existing scheme of public keyencryption with keyword retrieval efficiency not high, based on a highly efficientscheme of public key encryption with keyword search (NPEKS), and addedAttribute-Based Encryption, we design a new system which adapt to a company cloudstorage environment. The new system not only retains the advantages of symmetricencryption with keyword search such as simpleness and high efficiency but also canrealize the private search for third-party data. And therefore the system has a broadapplication prospect. In the end, this paper proves that this system under the conditionof the same security, has the advantages of simple and efficient through the contrastexperiment, and gives a complete implementation of the system.
Keywords/Search Tags:Searchable encryption, Public key encryption, Public keyEncryption with Keyword Search(PEKS), Bilinear Pairing
PDF Full Text Request
Related items