期刊文献+

可实现隐私保护的基于属性密文可搜索方案 被引量:6

Privacy protection attribute-based ciphertext search scheme
下载PDF
导出
摘要 针对现有的基于属性的密文可搜索方案存在隐私泄露问题以及当授权用户不在线时如何安全有效地将密文以及搜索权限委托给其他人的问题进行了研究,将隐藏访问结构的基于属性密文可搜索方案与代理重加密技术融合,提出了具有部分隐藏访问结构的支持代理重加密功能的基于属性的密文检索方案。该方案不仅有效地解决了上述问题,而且还支持关键字的更新。最后在随机预言模型下基于DL(D-linear)假设和q-BDHE(decisional q-parallel bilinear Diffie-Hellman exponent)假设,证明了方案的安全性。 There are lots of drawbacks in existing attribute-based encryption with keyword search scheme,such as privacy disclosure issues and when the authorized user is offline how effectively delegate decrypt and search right to other people.In order to solve these problems,this paper proposed an attribute-based ciphertext search scheme with hidden access structures,which support proxy re-encryption function by combing attribute-based encryption with hidden access structures and proxy re-encryption technology.This scheme not only effectively solves the problems mentioned above,but also supports the update of keywords.Finally,under the random oracle model,the researchers proved the security of the scheme based on DL(D-linear)and q-BDHE(decisional q-parallel bilinear Diffie-Hellman exponent)hypothesis.
作者 胡媛媛 陈燕俐 朱敏惠 Hu Yuanyuan;Chen Yanli;Zhu Minhui(School of Computer Science, Nanjing University of Posts & Telecommunications, Nanjing 210003, China)
出处 《计算机应用研究》 CSCD 北大核心 2019年第4期1158-1164,共7页 Application Research of Computers
基金 国家自然科学基金资助项目(61572263 61502251 61502243) 江苏大学自然科学研究项目(14KJB520027 15KJB520027) 江苏省自然科学基金资助项目(BK20151511) 中国博士后科学基金资助项目(2015M581794) 江苏省博士后科学基金资助项目(1501023C)
关键词 云计算 基于属性的可搜索加密 隐藏访问结构 代理重加密 cloud computing attributed-based encryption with keyword search hidden access structures proxy re-encryption
  • 相关文献

参考文献1

二级参考文献10

  • 1Boneh D, Crescenzo G D, Ostrovsky R, Persiano G. Public key encryption with keyword searcb//Proceedings of the EUROCRYPT'04. Interlaken, Switzerland, 2004: 506-522.
  • 2Boneh D, Franklin M. Identity-based encryption from the weil pairing. Advances in Cryptology-Crypto, 2001, 2139 213-229.
  • 3Waters B R, Balfanz D, Durfee G, et al. Building an encrypted and searchable audit log//Proceedings of the Network and Distributed System Security Symposium 2004. San Diego, USA, 2004: 16-24.
  • 4Park D J, Kim K, Lee P J. Public key encryption with conjunctive field keyword search//Proceedings of the 5th International Workshop on Information Security Applications. Jeju Island, Korea, 2004: 73-86.
  • 5Abdalla M, Bellare M, Catalano D, et al. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Journal of Cryptology, 2008, 21 (3) : 350-391.
  • 6Boyen X, Waters B. Anonymous hierarchical identity-based encryption (without random oracles)//Proceedings of the CRYPTO 2006. Santa Barbara, USA, 2006:290-307.
  • 7Li J, Wang Q, Wang C, et al. Fuzzy keyword search over encrypted data in cloud computing//Proceedings of the 29th IEEE International Conference on Computer Communications. San Diego, USA, 2010: 1-5.
  • 8Cao N, Wang C, Li M, et al. Privacy-preserving multi- keyword ranked search over encrypted cloud data//Proceedings of the 30th IEEE International Conference on Computer Communications. Shanghai, China, 2011:829-837.
  • 9Goyal V, Pandey O, Sahai A, et al. Attribute-based encryp- tion for fine-grained access control of encrypted data//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York, USA, 2006:89 98.
  • 10Beimei A. Secure schemes for secret sharing and key distri- bution [Ph.D. dissertation]. Technion, Haifa, Israel: Israel Institute of Technology, 1996.

共引文献34

同被引文献29

引证文献6

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部