期刊文献+

电子邮件系统中指定服务器的关键字搜索加密方案 被引量:1

Keyword Search Encryption Scheme for Designated Server in Email System
下载PDF
导出
摘要 现有指定服务器的基于身份关键字搜索加密方案无法满足关键字密文的不可区分性,为满足电子邮件系统更高的安全需求,提出一种指定邮件服务器的身份认证关键字搜索加密方案。针对指定邮件存储服务器和数据接收者身份对关键字加密以抵抗离线关键字猜测攻击,在随机预言模型下,对该方案适应性选择消息攻击的关键字密文不可区分性、陷门不可区分性和离线猜测攻击的安全性进行验证。理论分析和数值实验结果表明,与dIBEKS方案相比,该方案在关键字加密和验证阶段计算效率更高。 The existing identity-based keyword search encryption schemes for designated server cannot satisfy the indistinguishability of keyword ciphertext.To meet the higher security requirements of email systems,this paper proposes an identity authentication-based keyword search encryption scheme for designated mail server.The scheme can resist off-line keyword guessing attacks by encrypting the identity of the designated mail storage server and data receiver.In the random oracle model,the following security features of the scheme such as the indistinguishability of keyword ciphertext in adaptively chosen message attacks,indistinguishability of trapdoor and security of offline guessing attacks are verified.Results of theoretical analysis and numerical experiments show that the proposed scheme has higher computational efficiency in keyword encryption and verification than dIBEKS scheme.
作者 牛淑芬 杨平平 谢亚亚 王彩芬 杜小妮 NIU Shufen;YANG Pingping;XIE Yaya;WANG Caifen;DU Xiaoni(College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China;College of Mathematics and Statistics,Northwest Normal University,Lanzhou 730070,China)
出处 《计算机工程》 CAS CSCD 北大核心 2020年第10期137-142,150,共7页 Computer Engineering
基金 国家自然科学基金(61562077,61662069,61662071,61772022) 甘肃省杰出青年基金(1308RJDA007) 西北师范大学青年教师科研能力提升计划项目(NWNU-LKQN-14-7)。
关键词 加密电子邮件 指定服务器 身份认证 可搜索加密 关键字加密 encrypted email designated server identity authentication searchable encryption keyword encryption
  • 相关文献

参考文献9

二级参考文献175

  • 1Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss
  • 2Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf
  • 3Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403.
  • 4Zhang YX, Zhou YZ. Transparent Computing: A new paradigm for pervasive computing. In: Ma JH, Jin H, Yang LT, Tsai JJP, eds. Proc. of the 3rd Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 1-11.
  • 5Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22-28.
  • 6Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks, 1998,30(1-7): 107-117.
  • 7Ghemawat S, Gobioff H, Leung ST. The Google file system. In: Proc. of the 19th ACM Symp. on Operating Systems Principles. New York: ACM Press, 2003.29-43.
  • 8Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters. In: Proc. of the 6th Symp. on Operating System Design and Implementation. Berkeley: USENIX Association, 2004. 137-150.
  • 9Burrows M. The chubby lock service for loosely-coupled distributed systems. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 335-350.
  • 10Chang F, Dean J, Ghemawat S, Hsieh WC, Wallach DA, Burrows M, Chandra T, Fikes A, Gruber RE. Bigtable: A distributed storage system for structured data. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 205-218.

共引文献1409

同被引文献5

引证文献1

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部