期刊文献+

云环境下基于非线性映射的保序加密方案 被引量:5

Order preserving encryption scheme based on nonlinear mapping in cloud environment
下载PDF
导出
摘要 针对传统保序加密方法安全性和效率不能兼顾的缺点,提出一种基于非线性映射的保序加密方案.该保序加密算法使用非线性映射和非线性分割的方法来隐藏数据分布和数据频率.介绍了云环境下保序加密的系统模型(含问题模型和敌手模型);对于问题模型提出了保序加密方案并且验证其正确性;进一步分析该方案在敌手模型2种攻击下的安全性,并与其他保序加密方案做对比.结果表明,所提出的保序加密方案可达到抗统计攻击和IND-DNCPA安全,有着良好的安全性;每十万个加密数平均加密执行时间大约30 ms,有着较高的效率;该方案可以用任何可编程语言部署和实现,有着良好的可编程性. To improve efficiency and ensure security,a nonlinear mapping order preserving encryption scheme(nOPE)was proposed.By nonlinear mapping and nonlinear splitting,the data distribution and the data frequency were hidden.The system model of order preserving encryption with problem model and adversary model was introduced in cloud environment.The order preserving encryption scheme was proposed for the problem model,and the correctness was verified.The scheme security under the two kinds of attack of adversary model was analyzed,and the scheme efficiency was compared with those of other different order preserving schemes.The results show that the proposed scheme can resist statistical attack and realize IND-DNCPA with good security.The average encryption time per hundred thousand encrypted data is about 30 ms with good efficiency,and the scheme can be deployed and implemented in any programmable language with good programmability.
作者 郁鹏 潘森杉 张建明 YU Peng;PAN Senshan;ZHANG Jianming(School of Computer Science and Communication Engineering,Jiangsu University,Zhenjiang,Jiangsu 212013,China)
出处 《江苏大学学报(自然科学版)》 EI CAS CSCD 北大核心 2018年第2期185-193,共9页 Journal of Jiangsu University:Natural Science Edition
基金 国家自然科学基金资助项目(61272074 61472001) 国家自然科学基金资助重点项目(U1405255) 江苏省自然科学基金资助项目(BK20160543) 江苏省重点研发计划项目(BE2015136)
关键词 保序加密 非线性划分 非线性映射 抗统计攻击 IND-DNCPA安全 order preserving encryption nonlinear splitting nonlinear mapping statistical attack IND-DNCPA safety
  • 相关文献

参考文献6

二级参考文献68

  • 1王鑫,张美玲,王新梅.高次MFE多变量加密方案[J].四川大学学报(工程科学版),2009,41(4):171-175. 被引量:6
  • 2张军,熊枫.网络隐私保护技术综述[J].计算机应用研究,2005,22(7):9-11. 被引量:22
  • 3Shor P W.Algorithms for quantum computation:discrete logarithms and factoring[C]//Proeeedings of the 35th Annual Symposium on Foundations of Computer Science.[s.1]1:[s.n.].1994:124.
  • 4Bernstein D J,Buchmann J.,Dahmen E.,Post Quantum Cryptography [ M ]Berlin:Springer,2009.
  • 5Ding J T,Yang B Y.Multivariate public key cryp- tography[M].Berlin:Springer,2009:193.
  • 6Wang LC,YangBY,HuYH,etal.A"medium field" multivariate public-key encryption scheme [C]//Topics in Cryptology CT-RSA 2006,Berlin:Springer,2006:132.
  • 7Ding J,Hu L,Nie X,et al.High order lineariza tion equation(HOLE)attack on multivariate public key eryptosystems[C]//Public Key Cryptography PKC 2007,Berlin:Springer,2007:233.
  • 8HuangJ S,WeiBD,Ou H Y.An Improved MFE scheme resistant against SOLE attacks[C]//Prime- Asia 2009,[s,1].[s.n.].2009:157.
  • 9Nie X Y,XuZ H,LuL,an improved MFE public et al.Security analysis of key cryptosystem [C]//CANS 2011,Berlin:Springer,2011:118.
  • 10Cao W W,Nie X Y,Hu L,etal.Cryptanalysis of two quartic encryption schemes and one improved MFE scheme[C]//PQCrypto 2010,Berlin:Spring er,2010:41.

共引文献42

同被引文献34

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部