請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/67622
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 吳家麟(Ja-Ling Wu) | |
dc.contributor.author | Yu-Jui Chang | en |
dc.contributor.author | 張祐瑞 | zh_TW |
dc.date.accessioned | 2021-06-17T01:40:43Z | - |
dc.date.available | 2017-08-04 | |
dc.date.copyright | 2017-08-04 | |
dc.date.issued | 2017 | |
dc.date.submitted | 2017-07-27 | |
dc.identifier.citation | [1] D. X.Song, D. Wagner, A. Perrig, “A Practical techniques for searches on encrypted data,” in Proc. of S&P’00, 2000.
[2] D. Boneh, C. G. Di, R. Ostrovsky, G. Persiano, “Public key encryption with keyword search,” in Proc. of EUROCRYPT’04, 2004. [3] Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on Computer and Communications Security, ACM Press, 2006:79-88. [4] F. Bao, R. H. Deng, X. Ding, Y. Yang, “Private query on encrypted data in multi-user settings,” in Proc. of ISPEC’08, 2008. [5] Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). [6] Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). [7] Sahai, B. Waters, “Fuzzy Identity-Based Encryption,” in Proc. of EUROCRYPT’05, 2005. [8] V. Goyal, O. Pandey, A. Sahai, B. Waters, “Attribute-based encryption for finegrained access control of encrypted data,” in Proc. of CCS’06, 2006. [9] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute based encryption,” in Proc. IEEE Symp. Security Privacy, May 2007, pp. 321–334. [10] F. Guo, Y. Mu, W. Susilo, D. S. Wong, and V. Varadharajan, ‘‘CP-ABE with constant-size keys for lightweight devices’’, IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 763–771, May 2014. [11] Z. Lv, M. Zhang, D. Feng, “Multi-User Searchable Encryption with Efficient Access Control for Cloud Storage” in Proc. of CloudCom, 2014 [12] Baojiang Cui, Zheli Liu, and Lingyu Wang, “Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage” in transactions on computer vol.65, August 2016 [13] C. K. Chu, S. Chow, W. G. Tzeng, J. Y. Zhou, and R. Deng, “Key-aggregate cryptosystem for scalable data sharing in cloud storage,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 468–477, Feb. 2014. [14] F. Guo, Y. Mu, and Z. Chen, “Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key,” Proc. Pairing-Based Cryptography Conf. (Pairing ’07), vol. 4575, pp. 392-406, 2007. [15] F. Guo, Y. Mu, Z. Chen, and L. Xu, “Multi-Identity Single-Key Decryption without Random Oracles,” Proc. Information Security and Cryptology (Inscrypt ’07), vol. 4990, pp. 384-398, 2007. [16] P. Golle, J. Staddon, B. Waters, “Secure conjunctive keyword search over encrypted data,” in Proc. of ACNS’04, 2004 [17] Y. H. Hwang, P. J. Lee, “Public key encryption with conjunctive keyword search and its extension to a multi-user system,” in Proc. of Pairing’07, 2007. [18] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, “Fuzzy keyword search over encrypted data in cloud computing,” in Proc. of INFOCOM’10, 2010. [19] S. Sedghi, P. V. Liesdonk, S. Nikova, P. Hartel, “Searching keywords with wildcards on encrypted data,” in Proc. of SCN’10, 2010. [20] M. S. Islam, M. Kuzu, M. Kantarcioglu, “Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation,” in Proc. of NDSS’12, 2012. [21] K. Cai, C. Hong, M. Zhang, D. Feng, Z. Lv, “A Secure Conjunctive Keywords Search over Encrypted Cloud Data AgainstInclusion-RelationAttack,”in Proc. Of CloudCom’13, 2013. [22] Y. Lu, “Privacy-preserving logarithmic-time search on encrypted data in cloud,” in Proc. of NDSS’12, 2012. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/67622 | - |
dc.description.abstract | 在雲端儲存系統蓬勃發展的同時,資料洩漏等安全性方面的漏洞已經成為了嚴重的資訊安全問題。為了保護一些比較私人或機密的資料,使用者可以在上傳 資料之前將所有檔案加密。如此一來即使資料因為攻擊者惡意竊取或者是雲端服務的提供方無意的洩漏,被洩漏的資料內容也不會被竊取者知曉。然而經過加密的文件會喪失其原有的一切特性,這使得直接搜尋加密後的資料變成了一件困難的事。於是有人提出了「加密搜尋」這個機制來解決這個問題,「加密搜尋」讓使用者可以在加密的狀態下搜尋存在雲端系統的資料。在這篇論文中,我們提出了一個鑰匙為常數長度的加密搜尋機制。這個機制可以降低加密搜尋對於儲存空間的需求進而提高加密搜尋的實用性。因為我們的方法提供了有效率的加入成員及撤銷成員的機制,所以我們的方法是可以應用在學校或者企業的儲存系統的。最後,我們利用我們在論文中提出的方法實作出一個簡單的系統來證明我們的方法是可行的。 | zh_TW |
dc.description.abstract | Cloud storage is widely adopted nowadays. Considering about the data leakage issue, people encrypted the data before uploading them to cloud server. However, due to the loss of data’s original properties, it is hard to search the encrypted data directly. To solve this problem, searchable encryption scheme was proposed to search the data stored on the cloud server in ciphertext domain. To enhance the searchable encryption scheme’s practicability, we propose the scheme, which has constant-size keys, to decrease the requirement of the storage in the searchable encryption scheme. In our work, we also provide efficient mechanisms for participation and the revocation of a user. Therefore, it can be easily applied to storage systems of a school or a company. Moreover, a prototype based on the proposed scheme has been built to verify the feasibility of our work. | en |
dc.description.provenance | Made available in DSpace on 2021-06-17T01:40:43Z (GMT). No. of bitstreams: 1 ntu-106-R04922112-1.pdf: 796053 bytes, checksum: 3c1cf6c98163d2be34f66de331a91e11 (MD5) Previous issue date: 2017 | en |
dc.description.tableofcontents | 口試委員會審定書 ii
致謝 iii 中文摘要 iv ABSTRACT v CONTENTS vi LIST OF FIGURES viii Chapter 1 Introduction 1 Chapter 2 Related work 3 2.1 Searchable Encryption 3 2.2 Encrypted Access Control for Cloud Storage 4 2.3 Practical Issues 6 Chapter 3 Preliminaries 8 3.1 Bilinear Pairing 8 3.2 CP-ABE with Constant-Size Keys for Lightweight Devices 8 3.2.1 Setup 9 3.2.2 Key Generation 9 3.2.3 Encrypt 10 3.2.4 Decrypt 11 Chapter 4 The proposed scheme 13 4.1 System Model 13 4.2 System Operation Procedures 14 Chapter 5 Security analysis and performance evaluation 20 5.1 Security analysis 20 5.1.1 Data Confidentiality 20 5.1.2 Keywords Confidentiality 20 5.2 Performance Evaluation 21 5.2.1 Implementation Details 21 5.2.2 Experimental Results 21 Chapter 6 Conclusion and future work 24 REFERENCE 25 | |
dc.language.iso | en | |
dc.title | 具常數長度鑰匙的多用戶加密搜尋機制 | zh_TW |
dc.title | Multi-User Searchable Encryption Scheme With Constant-Size Keys | en |
dc.type | Thesis | |
dc.date.schoolyear | 105-2 | |
dc.description.degree | 碩士 | |
dc.contributor.coadvisor | 陳文進(Wen-Chin Chen) | |
dc.contributor.oralexamcommittee | 蕭旭君(Hsu-Chun Hsiao),薛智文(Chih-Wen Hsueh) | |
dc.subject.keyword | 加密搜尋,常數長度的鑰匙,降低儲存空間, | zh_TW |
dc.subject.keyword | searchable encryption,CP-ABE,constant-size keys, | en |
dc.relation.page | 27 | |
dc.identifier.doi | 10.6342/NTU201702157 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2017-07-28 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
顯示於系所單位: | 資訊工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-106-1.pdf 目前未授權公開取用 | 777.4 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。