期刊文献+

云环境中支持隐私保护的可计算加密方法的CCA攻击 被引量:1

CCA Attack on Privacy Preserving Computable Encryption Scheme of Cloud Computing
下载PDF
导出
摘要 为保护用户隐私和提供用户有效服务,在云计算服务中通常将用户外包数据以密文形式保存,并使用隐私保护加密方案处理密文数据.研究分析云计算服务中外包数据的隐私保护加密方案安全性非常重要.针对基于矩阵和向量运算设计的可计算加密方案(CESVMC),本文通过明密文对求解加密方案等价私钥的方法证明CESVMC加密方案不是IND-CCA安全的. To protect users' privacy and present efficient services for users, the encrypted outsourcing data are generally stored and processed in cloud computing by applying privacy preserving encryption schemes. It is very important to analyze the security of the privacy preserving encryption scheme for the outsourcing data in cloud computing. For a computable encryption scheme based on vector and matrix calculation ( CESVMC ), this paper shows that CESVMC is not IND-CCA secure by solving an equivalent secret key from some plaintext-ciphertext pairs of CESVMC.
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第12期2644-2649,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61142007 61005064)资助 教育部人文社会科学研究规划基金项目(14YJAZH023)资助 江苏省"青蓝工程"项目(2014_23)资助 江苏省高校自然科学研究项目(13KJB520005)资助 江苏省普通高校研究生科研创新计划项目(CXZZ13_0493)资助 江苏理工学院科研基金项目(KYY12027)资助
关键词 云计算 字符串模糊检索 加密计算 密码分析 cloud computing fuzzy string search encryption computing cryptanalysis
  • 相关文献

参考文献3

二级参考文献54

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1133

同被引文献8

引证文献1

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部