期刊文献+

基于身份的具有否认认证的关键字可搜索加密方案 被引量:3

Identity-based Public Key Keyword Searchable Encryption Scheme with Denial Authentication
下载PDF
导出
摘要 云存储技术的发展实现了资源共享,为用户节省了数据管理开销。可搜索加密技术,既保护用户隐私又支持密文检索,方便了用户查找云端密文数据。现有的公钥关键字可搜索加密方案虽然支持身份认证,但未实现否认的属性。为了更好地保护发送者的身份隐私,该文将否认认证与公钥关键字可搜索加密技术相结合,提出一种基于身份的具有否认认证的关键字可搜索加密方案(IDAPKSE)。在该方案中,发送者上传密文后,能够对自己上传密文这一通信行为进行否认,与此同时,接收者可以确认密文数据的来源,但是,即使与第三方合作,接收者也不能向第三方证明其所掌握的事实。在随机预言模型下,基于双线性Diffie-Hellman(BDH)和决策双线性Diffie-Hellman(DBDH)数学困难问题,证明了该文方案满足不可伪造性、密文和陷门的不可区分性。 The development of cloud storage technology achieves resource sharing,which reduces users data management overhead.Searchable encryption technology protects users privacy and supports ciphertext retrieval,making it easy for users to find encrypted data in the cloud.Although existing public key searchable encryption schemes support authentication,the denial property is not implemented.To protect better the senders identity privacy,an Identity-based Public Key keyword Searchable Encryption scheme with Denial Authentication(IDAPKSE)is proposed.In the proposed scheme,the sender uploads the ciphertext and has the ability to deny that he or she uploaded the ciphertext to the cloud server.At the same time,the receiver can confirm the origin of the ciphertext,however,even with the cooperation of a third party,the receiver can not prove the facts in his/her possession to the third party.Under the random oracle model,based on the Bilinear Diffie-Hellman(BDH)and Decisional Bilinear Diffie-Hellman(DBDH)assumptions,the proposed scheme satisfies unforgeability of the ciphertexts,and indistinguishability of ciphertexts and trapdoors.
作者 曹素珍 丁宾宾 丁晓晖 窦凤鸽 王彩芬 CAO Suzhen;DING Binbin;DING Xiaohui;DOU Fengge;WANG Caifen(Northwest Normal University,Lanzhou 730000,China;Shenzhen Technology University,Shenzhen 518118,China)
出处 《电子与信息学报》 EI CSCD 北大核心 2022年第3期1086-1092,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61662071,61662069)。
关键词 身份隐私 否认认证 可搜索加密 Privacy of identity Denial of authentication Searchable encryption
  • 相关文献

参考文献3

二级参考文献19

  • 1陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,49(S1):19-25. 被引量:28
  • 2SONG D,WAGNER D,PERRIG A.Practical techniques for searching on encrypted data[A].Proceedings of the 2000 IEEE Symposium on Security and Privacy[C].Seattle:IEEE Press,2000.44-55.
  • 3GOLLE P,STADDON J,WATERS B.Secure conjunctive keyword search over encrypted data[A].Proceedings of the 2nd International Conference on Applied Cryptography and Network Security[C].Berlin:Springer-Verlag,2004.31-45.
  • 4BONEH D,CRESCENZO G,OSTROVSKY R,et al.Public key encryption with keyword search[A].Advances in Cryptology:Pro-ceedings of EUROCRYPT[C].Berlin:Springer-Verlag,2004.506-522.
  • 5PARK D,KIM K,LEE P.Public key encryption with conjunctive field keyword search[A].Proceedings of the Fifth International Workshop WISA' 04[C].Berlin:Springer-Verlag,2004.73-86.
  • 6HWANG Y H,LEE P J.Public key eneryptinn with conjunctive key-word search and its extension to a multi-user system[A].Proceedings of Pairing[C].Berlin:Springer-Verlag,2007.2-22.
  • 7BYUN J W,RHEE H S,PARK H A,et al.Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[A].Proceedings of SDM[C].Berlin:Springer-Verlag,2006,75-83.
  • 8ABDALLA M,BELLARE M,CATALANO D,et al.Searchable encryption revisited:consistency properties,relation to anonymous IBE,and extensions[J].Journal of Cryptology,2008,21(3):350-391.
  • 9BAEK J,SAFAVI-NAINI R,SUSILO W.Public key encryption with keyword search revisited[A].Proceedings of Computational Science and its Applications,ICCSA[C].Berlin:Springer-Verlag,2008.1249-1259.
  • 10RHEE H S,PARK J H,SUSILO W,et al.Improved searchable public key encryption with designated tester[A].Proceedings of the 4th In-ternational Symposium on Information,Computer,and Communica-tions Security[C].New York:ACM Press,2009.376-379.

共引文献55

同被引文献36

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部