期刊文献+

云存储中无证书连接关键词密文检索 被引量:4

Certificateless conjunctive keyword search on encrypted data in cloud storage
下载PDF
导出
摘要 基于证书的可搜索加密(searchable encryption,SE)方案存在用户公钥验证与证书管理上的缺陷,且多数单关键词搜索的方案会返回大量不相关的密文,而少数采用多关键词搜索的方案需要建立很长的关键词密文索引。本文提出了新的关键词密文检索方案,该方案采用了无证书公钥密码体制,既避免了基于证书的密码体制中的公钥验证和证书管理问题,又解决了基于身份的密码体制中密钥托管问题;方案中采用了连接关键词搜索,多关键词搜索使得密文查找更加精准;本文把访问关键词密文陷门进行了聚合,使得陷门长度简短有效,且通信带宽和存储量得到一定程度上的节约。在随机预言机模型下,证明本文方案可抗离线关键词猜测攻击。 As the certificate-based searchable encryption schemes are required to verify user′s public key and manage certificates, and most single keyword search schemes return a huge volumes of irrelevant ciphertext. And a few multi-keywords searchable schemes have to set up a quite long keywords ciphertext index. Therefore, a newly keyword search over encrypted data scheme using certificateless public key cryptosystem was proposed which can avoid public key verification and certificate management problems based on certificate cryptosystem and eliminate the key escrow problem based on identity cryptosystem. This paper employs conjunctive and multi-keywords search which gets ciphertext search more precise. Moreover, through aggregating keywords trapdoor token makes the token short and effectiv, and further getting a degree of savings in bandwidth and storage. Finally, the security analysis proved that our scheme is secure against off-line keyword guessing attack under a random oracle model.
作者 曹强 李艳平 刘青青 王天银 CAO Qiang;LI Yanping;LIU Qingqing;WANG Tianyin(School of Mathematics and Information Science, Shaanxi Normal University, Xi′an 710119, Shaanxi, China;School of Mathematics Science, Luoyang Normal University, Luoyang 471934, Henan, China)
出处 《陕西师范大学学报(自然科学版)》 CAS CSCD 北大核心 2019年第5期115-124,共10页 Journal of Shaanxi Normal University:Natural Science Edition
基金 国家自然科学基金(61572246) 陕西省重点研发计划(2019GY-013) 中央高校基本科研业务费专项资金(GK201803005)
关键词 可搜索加密 无证书 连接关键词 离线关键词猜测攻击 searchable encryption certificateless conjunctive keywords off-line keyword guessing attack
  • 相关文献

参考文献4

二级参考文献34

  • 1程相国,刘景美,王新梅.m-挠群上一种基于身份的聚合签名方案[J].西安电子科技大学学报,2005,32(3):427-431. 被引量:3
  • 2Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology-EUROCRYPT’03 . 2003
  • 3Gong Z,Long Y,Hong X,et al.Two certificatelessaggregate signatures from bilinear maps. SNPD2007 . 2007
  • 4Song,Kim,Lee.Security enhancement in ad hoc network with ID-based cryptosystem. Advanced Communication Technology, 2005, ICACT . 2005
  • 5Chen Y C,Tso R,Mambo M,et al.Certificateless aggregate signature with efficient verification. Security and Communication Networks . 2015
  • 6WATERS B.Dual system encryption:realizing fully secure IBE and HIBE under simple assumptions. Advances in Cryptology-CRYPTO 2009 . 2009
  • 7Boneh D,Di Crescenzo G,Ostrovsky R,et al.Public key encryption with keyword search. Advances in Cryptology-Eurocrypt 2004 . 2004
  • 8Katz J,Sahai A,Waters B.Predicate encryption supporting disjunctions,polynomial equations,and inner products. Advances in Cryptology-EUROCRYPT 2008 . 2008
  • 9Reza Curtmola,Juan Garay,SenyKamara,Rafail Ostrovsky.Searchablesymmetric encryption: Improved defnitions and effcient constructions. CCS . 2006
  • 10Brent R Waters,Dirk Balfanz,Glenn Durfee,et al.Building an encrypted and searchable audit log. The 11th annual Network and Distributed system Security Symposium(NDS 2004) . 2004

共引文献55

同被引文献37

引证文献4

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部