期刊文献+

标准模型下增强的无需安全信道的带关键词搜索的公钥加密

Secure Channel Free Searchable Encryption in Standard Model
下载PDF
导出
摘要 Baek,Safavi-Naini和Susilo提出了无需安全信道的带关键词搜索的公钥加密方案。该方案中的安全模型限制了攻击者的能力,并且方案是在随机预言模型下可证安全的。然而在随机预言模型下证明安全的方案在实际执行中会导致不安全。通过改进安全模型使得攻击者能力更强,即允许攻击者获得非挑战密文和陷门之间的关系,同时构造了在增强的安全模型下不使用随机预言机可证安全的带关键词搜索的公钥加密方案。 Recently,Baek et al. proposed an efficient public key encryption scheme with keyword search based on the scheme of Boneh et al. However, the security model of Baek et al. seriously limits the ability of the adversary. Rhee et al. enhanced the security model of the public key encryption with keyword search to properly incorporate the ability of an adversarys,and presented a PEKS in the random oracle model. Unfortunately, a proof in the random oracle model has shown that it possibly leads to insecure schemes when the random oracles are implemented in the standard model. This paper constructed an efficient public key encryption scheme with keyword search secure in the enhanced security model without random oracle.
出处 《计算机科学》 CSCD 北大核心 2015年第11期197-202,共6页 Computer Science
基金 国家自然科学基金项目(61272083 61300236) 江苏省自然科学基金青年项目(BK20130809) 中国博士后科学基金(2013M530254) 中国博士后科学基金特别资助(2014T70518) 江苏省博士后基金(1302137C) 中央高校基本科研业务费专项资金(NZ2013306)资助
关键词 公钥加密 可搜索加密 无需安全信道 标准模型 Public key encryption, Searchable encryption,Secure channel free, Standard model
  • 相关文献

参考文献25

  • 1Abdalla M,Bellare M,Catalano D,et al. Advances in Cryptology[C]// CRYPTO 2005. Springer Berlin Heidelberg, 2005 : 205-222.
  • 2Baek J,Safavi-Naini R,Susilo W. Computational Science and ItsApplications[C] // ICCSA 2008. Springer Berlin Heidelberg.2008:1249-1259.
  • 3Boneh D, Boyen X. Efficient selective-ID Identity based encryp-tion without random oracles[C] //Proc. of EUROCRYPT 2004.Springer Berlin Heidelberg.2004 : 223-238.
  • 4Boneh D, Di C G, Ostrovsky R,et al. Public Key Encryptionwith Keyword Search [C] // Proc. of EUROCRYPT 2004.Springer Berlin Heidelberg,2004: 506-522.
  • 5Canetti R, Goldreich 0. Halevi S. The random oracle methodolo-gy .revisited[C]//Proc. of 30th ACM STOC. ACM Press, 1998:209-218.
  • 6Canetti R, Halevi S, Katz J. Chosen-Ciphertext Security fromIdentity-Based Encryption [C] // Proc. of EUROCRYPT 2004.Springer Berlin Heidelberg,2004: 202-222.
  • 7Fang L,Susilo W,Ge C, et al. Public key encryption with key-word search secure against keyword guessing attacks withoutrandom oracle[J]. Information Sciences,2013,238 . 221-241.
  • 8Gentry C. Practical identity-based encryption without randomoracles[C] // Proc. of EUROCRYPT 2006. Springer-Verlag,2006:457-464.
  • 9Gu C,Pan Y,Z A H. Efficient Public Key Encryption with Key-word Search Schemes from Pairings[M] // Information Securityand Cryptology: Third SKLOIS Conference. 2008 : 372-382.
  • 10Waters B,Balfanz D’Durfee G,et al. Building an Encrypted andSearchable Audit Log[C] // Network and Distributed System Se-curity Symposium (NDSS 2004). 2004.

二级参考文献106

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2毛文波.现代密码学理论与实践[M].北京:电子工业出版社,2004:165-190.
  • 3Song D X, Wagner P, Perrig P. Practical techniques for searcheson encrypted data. IEEE Symposium on Research in Securityand Privacy. IEEE Computer Society,2000.
  • 4Chang Yancheng, Michel M. Privacy preserving keywordsearches on remote encrypted data. Applied Cryptography andNetwork Security (ACNS "05), Springer, 2005.
  • 5Dong C, Russello G, Dulay N. Shared and searchable encrypteddata for untrusted servers. DBSec, Lecture Notes in ComputerScience, Springer, 2008.
  • 6Dong C,Russello G, Dulay N. Shared and searchable encrypteddata for untrusted servers. Journal of Computer Security,2011.
  • 7Goh E-J. Secure Indexes. Technical Report 2003/216,IACRePrint Cryptography Archive, 2003.
  • 8Curtmola R, Garay J, Kamara S, et al. Searchable symmetricencryption: improved definitions and efficient constructions.Proceeding of ACM Conference on Computer and CommunicationsSecurity (CCS’06),Alexandria, VA, USA, 2006.
  • 9Dan Boneh,Giovanni Di Crescenzo,Rafail Ostrovsky, et al.Public key encryption with keyword search. Advances inCryptology. EUROCRYPT 2004 Lecture Notes in ComputerScience, 2004.
  • 10Joonsang Baek, Reihaneh Safiavi-N aini,Willy Susilo. Public keyencryption with keyword search revisited. Computational Scienceand Its Applications-ICCSA 2008, 2008.

共引文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部