咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Efficient Multi-Authority Attr... 收藏

Efficient Multi-Authority Attribute-Based Searchable Encryption Scheme with Blockchain Assistance for Cloud-Edge Coordination

作     者:Peng Liu Qian He Baokang Zhao Biao Guo Zhongyi Zhai 

作者机构:School of Computer and Information SecurityGuilin University of Electronic TechnologyGuilin541004China School of Computer ScienceNational University of Defense TechnologyChangsha410073China 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2023年第76卷第9期

页      面:3325-3343页

核心收录:

学科分类:08[工学] 0839[工学-网络空间安全] 0701[理学-数学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:supported by the National Natural Science Foundation of China(Nos.62162018,61972412) the Natural Science Foundation of Guangxi(No.2019GXNSFGA245004) the Guilin Science and Technology Project(20210226-1) the Innovation Project of Guangxi Graduate Education(No.YCSW2022296) 

主  题:Attribute-based encryption search encryption blockchain multi-authority cloud-edge 

摘      要:Cloud storage and edge computing are utilized to address the storage and computational challenges arising from the exponential data growth in ***,data privacy is potentially risky when data is outsourced to cloud servers or edge *** data encryption ensures data confidentiality,it can impede data sharing and ***-based searchable encryption(ABSE)is proposed as an effective technique for enhancing data security and ***,ABSE has its limitations,such as single attribute authorization failure,privacy leakage during the search process,and high decryption *** paper presents a novel approach called the blockchain-assisted efficientmulti-authority attribute-based searchable encryption scheme(BEM-ABSE)for cloudedge collaboration scenarios to address these ***-ABSE leverages a consortium blockchain to replace the central authentication center for global public parameter *** incorporates smart contracts to facilitate reliable and fair ciphertext keyword search and decryption result *** minimize the computing burden on resource-constrained devices,BEM-ABSE adopts an online/offline hybrid mechanism during the encryption process and a verifiable edge-assisted decryption *** ensures both low computation cost and reliable *** analysis conducted under the random oracle model demonstrates that BEM-ABSE is resistant to indistinguishable chosen keyword attacks(IND-CKA)and indistinguishable chosen plaintext attacks(INDCPA).Theoretical analysis and simulation results confirm that BEM-ABSE significantly improves computational efficiency compared to existing solutions.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分