期刊文献+

一种多用户可检索加密方法 被引量:2

A Multi-User Retrievable Encryption Technology
下载PDF
导出
摘要 关键字安全的可检索加密技术可以解决系统中包括不安全的服务器端时存在的关键字猜测攻击的问题。本文针对云计算和移动计算时代普遍存在的多客户端系统中一对多群发信息的应用场景,通过在系统中添加公钥的方式,提出了关键字安全的多用户可检索加密技术(SESKM)。该方案实现了一人发信多人接收,一人加密多人解密的功能。安全分析表明,该方案具备前向安全和后向安全。性能分析表明,该方案满足常规的应用场景。 SEBSK,which means keyword searchable security encryption technology,can solve the problem that the system may include an insecure server vulnerable to keyword guessing.Aimed at one-to-many group messaging in multi-client systems which are common in cloud computing and mobile computing era,this paper proposes SEBSK,a new secure multi-user-searchable encryption technology,by adding public key to the system.This program makes it possible for one person to encode and send messages to many person who can encode and receive and at the same time.Safety analysis shows that this program can ensure forward security and backward security at the same time.Function analysis shows that it can satisfy the usual demand.
作者 徐峰 刘万锁 XU Feng;LIU Wan-suo(Aircraft Sergeant School,PLA Air Force Engineering University,Xinyang Henan 464000,China)
出处 《湖北第二师范学院学报》 2020年第2期12-15,共4页 Journal of Hubei University of Education
关键词 猜测 密文检索 前向安全性 后向安全性 guess cipher-text retrieval forward security backward security
  • 相关文献

参考文献4

二级参考文献87

  • 1ARMBRUST M, FOX A, GRIFFITH R. Above the clouds: a berkeley view of cloud computing[EB/OL], http://www.eecs.berkeley.edu/Pubs/ TechRpts/2009/EEC S-2009-28.html, 2009.
  • 2BUGIEL S, NLrRNBERGER S, SADEGHI A. Twin clouds: an archi- tecture for secure cloud computing[A]. Workshop on Cryptography and Security in Clouds[C]. Zurich, Switzerland, 2011.1-11.
  • 3KAMARA S, LAUTER K. Cryptographic cloud storage[J]. Financial Cryptography and Data Security, 2010,6054:136-149.
  • 4LI J, KROHN M, MAZI D. Secure untrusted data repository (SUNDR)[A]. Proceedings of the 6th Symposium on Operating Sys- tems Design and Implementation[C]. San Francisco, CA, USA, 2004. 91-106.
  • 5GOH E J. Secure indexes[A]. Proceedings of the 2004 Workshop on Information Security Applications[C]. Jeju Island, Korea, 2004.73-86.
  • 6SONG D X, WAGNER D, PERRIG A. Practical techniques or searches on encrypted data[A]. Proceedings of the IEEE Symposium on Security and Privacy[C].CA,USA,2000.36-49.
  • 7BONEH D, CRESCENZO G D, OSTROVSKY R. Public key encryp- tion with keyword search[A]. Proc of EUROCRYP'04[C]. Interlaken, Switzerland, 2004.506-522.7.
  • 8PAILLIER P. Public-key cryptosystems based on composite degree residu- osity clmmes[A]. Proceedings of the International Conference on the Theory and Applications of Cryptograhic Techniques (EUROCRYPT'99)[C]. Prague, Czech Republic, 1999.223-238.
  • 9BETHENCOURT J, SONG D, WATERS B. New constructions and practical applications for private stream searching (extended ab- stract)[A]. Proceedings of the IEEE Symposium on Security and Pri- vacy (SP'06)[C]. Oakland, California, USA, 2006. 134-139.
  • 10BETHENCOURT J, SONG D, WATERS B. New techniques for private stream searching[J]. ACM Transactions on Information and System Security, 2009, 12(3): 1-32.

共引文献25

同被引文献18

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部