期刊文献+

不含双线性对的密文检索公钥加密方案 被引量:1

Ciphertext Search Public Key Encryption Scheme Without Bilinear Pairings
下载PDF
导出
摘要 针对非可信云环境中的密文检索问题,在dPEKS模型的基础上,提出一种不含双线性对运算的密文检索公钥加密方案。该方案借鉴了RSA算法和Elgaml算法的思想,基于特殊模剩余类环上、循环群中的运算来构造加解密和检索子算法。在判定性Diffie-Hellman问题困难假设的前提下,证明了该方案可以抵抗不可区分性选择明文攻击和离线关键词猜测攻击。性能分析结果表明,该方案能够有效加解密数据,支持密文的关键词检索,并且在运算效率上比现有同等级安全的公钥加密方案更具优势。 In order to solve ciphertext search in untrusted cloud environment,this paper proposes a new ciphertextssearchable public key encryption scheme without bilinear pairings computation based on Searchable Public Key Encryption with a Designated Tester(dPEKS) scheme.The scheme references the thought of RSA algorithm and Elgaml algorithm,a special cyclic group is constructed from modulo-residue class ring.Based on this cyclic group,it constructs the encryption algorithm,decryption algorithm and keyword-search algorithm.This scheme satisfies indistinguishability against adaptive chosen plaintext attack and the off-line keywords-guessing attack,if the discrete logarithm assumption and decisional Diffie-Hellman assumption stand in the chosen cyclic group.Analysis results show that it can encrypt and decrypt data effectively,and search the cipher with keywords correctly.In addition,the scheme has obvious advantages of efficiency compared with schemes which have the same security.
出处 《计算机工程》 CAS CSCD 2014年第8期106-111,115,共7页 Computer Engineering
基金 国家"863"计划基金资助项目"新概念高效能计算机体系结构及系统研究开发"(2009AA012201)
关键词 云存储 数据安全 密文检索 公钥加密 不含双线性对 cloud storage data security ciphertext search public key encryption without bilinear pairings
  • 相关文献

参考文献3

二级参考文献53

  • 1袁晓宇,张其善.基于智能卡的RSA数字签名实现关键问题解析[J].电子学报,2004,32(11):1897-1900. 被引量:11
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献1115

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部