期刊文献+

区块链上多类型用户属性基可搜索加密方案

A Multi⁃type User Attribute⁃based Searchable Encryption Scheme on Blockchain
下载PDF
导出
摘要 可搜索加密是在不可信云环境中实现文件密文搜索的一种密码原语。数据使用者通过检索加密关键字,来搜索云服务器中的加密文件。当前可搜索加密方案存在设计比较单一,不能有效满足使用中复杂场景实际要求,且易遭受重放攻击。本文设计一种区块链上多类型用户属性基可搜索加密方案,构建多种数据使用者模型,可以在进行多样性细粒度访问控制的同时,提高密文搜索效率。同时,针对因重放攻击带来的搜索陷门盗用问题,提出解决方案,保护数据安全以及用户隐私。经过安全性分析与实验测试证明文中方案的关键字密文与陷门在选择明文攻击下是安全的(IND-CPA安全),且满足多种数据使用者对数据的不同搜索需求。 Searchable encryption is a cryptographic primitive for encrypted files searching in untrusted cloud environment,where data users search for encrypted files in cloud server by retrieving the encrypt⁃ed keywords.Due to simple design,existing searchable encryption schemes could not satisfy the actual requirements in practical complex scenarios and are vulnerable to the replay attack.In this paper,a multi⁃type user attribute⁃based searchable encryption scheme on blockchain is designed and multiple da⁃ta user models are established,which could improve the ciphertext searching efficiency while carrying out diversity and fine⁃grained access control.Meanwhile,to address the problem of search trapdoor em⁃bezzlement caused by the replay attack,a solution is proposed to protect data security and user privacy.Security analysis and experiment tests demonstrate that with the proposed scheme,the keyword cipher⁃text and the trapdoor are secure under the selected plaintext attacks(i.e.IND⁃CPA security),satisfying various data searching demand from diverse data users.
作者 胡荣磊 王乐胥 范晓红 HU Ronglei;WANG Lexu;FAN Xiaohong(Beijing Electronic Science and Technology Institute,Beijing 100070,P.R.China)
出处 《北京电子科技学院学报》 2023年第3期1-15,共15页 Journal of Beijing Electronic Science And Technology Institute
关键词 可搜索加密 属性基加密 区块链 多类型用户 searchable encryption Attribute⁃base encryption blockchain multi⁃type user
  • 相关文献

参考文献10

二级参考文献108

  • 1Shamir A. Identity based cryptosystems and signature schemes//Proeeedings of the Crypto'84. California, USA, 1984:47-53
  • 2Al-Riyami S, Paterson K. Certificateless public key cryptography//Proceedings of the Asiacrypt 2003. Taipei, China, 2003:452-473
  • 3Huang X, Susilo W, Mu Y, Zhang F. On the security of a certifieateless signature scheme//Proceedings of the CANS 2005. Xiamen, China, 2005:13-25
  • 4Yap W, Heng S, Goi B. An efficient certificateless signature scheme//Proceedings of the EUC Workshops 2006. Seoul, Korea, 2006:322-331
  • 5Park J. An attack on the certificateless signature scheme from EUC Workshops 2006. Cryptology ePrint Archive, Report 2006/442, 2006
  • 6Zhang Z, Feng D. Key replacement attack on a certificateless signature scheme. Cryptology ePrint Archive, Report 2006/ 453, 2006
  • 7Choi K, Park J, Hwang J, Lee D. Efficient certificateless signature schemes//Proceedings of the ACNS 2007. Zhuhai, China, 2007:443-458
  • 8Castro R, Dahab R. Two notes on the security of certificateless signatures//Proceedings of the ProvSec 2007. Wollongong, Australia, 2007:85-102
  • 9Zhang J, Mao J. Security analysis of two signature schemes and their improved sehemes//Proceedings of the ICCSA 2007. Kuala Lumpur, Malaysia, 2007:589-602
  • 10Zhang Z, Wong D, Xu J, Feng D. Certificateless public-key signature: security model and efficient construction//Proceedings of the ACNS 2006. Singapore, 20061 293-308

共引文献218

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部