SIMMETRIK QIDIRISH IMKONIYATLI SHIFRLASH ALGORITMLARI

Authors

  • Xudoynazarov Umidjon Umarjon o‘g‘li Muhammad al-Alxorazmiy nomidagi Toshkent axborot texnologiyalari universiteti

Keywords:

qidirish imkoniyatli simmetrik shifrlash, shifrlangan ma’lumotlar ustida qidiruv, statik va dinamik qidirish imkoniyatli simmetrik shifrlash, oldingi xabarlarning maxfiyligi, keyingi xabarlarning maxfiyligi, axborot xavfsizligi, bulutli hisoblash

Abstract

Ushbu maqolada shifrlangan ma’lumotlar ustida qidiruvni amalga oshiruvchi simmetrik qidirish imkoniyatli shifrlash algoritmlarining nazariy asoslari va zamonaviy yondashuvlari tahlil qilinadi. Maqolada qidirish imkoniyatli simmetrik shifrlash sxemalarining rivojlanish bosqichlari, asosiy xavfsizlik modellari hamda statik va dinamik yondashuvlari qiyosiy jihatdan o‘rganiladi. Shifrlash sxemasi ma’lumotlar o‘zgarishi, oldingi xabarlarning maxfiyligi va keyingi xabarlarning maxfiyligi, foydalanuvchi modeli, qidiruv kalit so‘zlari soni hamda moslashuvchanlik darajasi mezonlari asosida tasniflandi. Statik qidirish imkoniyatli simmetrik shifrlash sxemalari va dinamik qidirish imkoniyatli simmetrik shifrlash sxemalari misolida xavfsizlik va samaradorlik o‘rtasidagi muvozanat tahlil qilinadi [2]. Tadqiqot natijalari statik yondashuvlar nazariy jihatdan samarali bo‘lsada, real, doimiy yangilanib boruvchi axborot tizimlari uchun dinamik qidirish imkoniyatli shifrlash sxemalari maqsadga muvofiq ekanini ko‘rsatadi. Shuningdek, ushbu texnologiyalarning shaxsiy ma’lumotlarni himoyalashga oid milliy qonunchilik va xalqaro standartlarga mosligi asoslab berildi.

References

1. Bost R. ∑ oφoς: Forward secure searchable encryption //Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. – 2016. – С. 1143-1154.

2. Cash D. et al. Leakage-abuse attacks against searchable encryption //Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. – 2015. – С. 668-679.

3. Curtmola R. et al. Searchable symmetric encryption: improved definitions and efficient constructions //Proceedings of the 13th ACM conference on Computer and communications security. – 2006. – С. 79-88.

4. Sood N. Cryptography in post quantum computing era //Available at SSRN 4705470. – 2024.

5. Kamara S., Moataz T. Boolean searchable symmetric encryption with worst-case sub-linear complexity //Annual international conference on the theory and applications of cryptographic techniques. – Cham : Springer International Publishing, 2017. – С. 94-124.

6. Song D. X., Wagner D., Perrig A. Practical techniques for searches on encrypted data //Proceeding 2000 IEEE symposium on security and privacy. S&P 2000. – IEEE, 2000. – С. 44-55.

7. Office for Civil Rights H. H. S. Standards for privacy of individually identifiable health information. Final rule //Federal register. – 2002. – Т. 67. – №. 157. – С. 53181-53273.

8. O‘zbekiston Respublikasi “Shaxsga doir ma’lumotlar to‘g‘risida”gi Qonuni https://lex.uz/docs/-4396419#-4397639

9. Goh E. J. Secure indexes //Cryptology ePrint Archive. – 2003.

10. Krähenbühl C., Perrig A. Searchable Symmetric Encryption //Trends in Data Protection and Encryption Technologies. – 2023. – С. 71-75.

11. Varri U., Pasupuleti S., Kadambari K. V. A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments //Journal of Supercomputing. – 2020. – Т. 76. – №. 4.

12. Salam M. I. et al. Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage //Human-centric Computing and Information Sciences. – 2015. – Т. 5. – №. 1. – С. 19.

13. Kamara S., Papamanthou C., Roeder T. Dynamic searchable symmetric encryption //Proceedings of the 2012 ACM conference on Computer and communications security. – 2012. – С. 965-976.

14. Cash D. et al. Dynamic searchable encryption in very-large databases: Data structures and implementation //Cryptology ePrint Archive. – 2014.

15. Bost R., Minaud B., Ohrimenko O. Forward and backward private searchable encryption from constrained cryptographic primitives //Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. – 2017. – С. 1465-1482.

16. Chamani J. G. et al. Multi-user dynamic searchable symmetric encryption with corrupted participants //IEEE Transactions on Dependable and Secure Computing. – 2021. – Т. 20. – №. 1. – С. 114-130.

17. Yang, Y., Lu, H., & Weng, J. (2011, November). Multi-user private keyword search for cloud computing. In 2011 IEEE third international conference on cloud computing technology and science (pp. 264-271). IEEE.

18. Cao N. et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data //IEEE Transactions on parallel and distributed systems. – 2013. – Т. 25. – №. 1. – С. 222-233.

19. Regulation, Protection. "General data protection regulation." Intouch 25 (2018): 1-5.

Downloads

Published

2026-02-28

How to Cite

SIMMETRIK QIDIRISH IMKONIYATLI SHIFRLASH ALGORITMLARI. (2026). DIGITAL TRANSFORMATION AND ARTIFICIAL INTELLIGENCE, 4(1), 110-120. https://dtai.tsue.uz/index.php/dtai/article/view/v4i114