期刊文献+

无安全信道的高效可搜索公钥加密方案 被引量:4

Efficient Public Key Encryption with Keyword Search Without Using Secure Channel
下载PDF
导出
摘要 在云存储应用中,出于对数据安全和隐私保护的需求,用户将数据上传到云服务器之前往往需要对其进行加密.可搜索加密技术的出现有效地满足了用户在密文数据中搜索的需求.可搜索公钥加密相较于可搜索对称加密能够实现在密文上复杂的逻辑运算,功能更强大.传统基于关键词搜索的可搜索公钥加密假设用户和云服务器之间存在一个安全可信信道来传输陷门,从而防止陷门隐私的泄露.然而这一假设在很多场景下是不满足的. Baek等人首次提出了无安全信道的公钥可搜索加密(SCF-PEKS)方案来解决公钥可搜索加密机制中的这一缺陷,但是他们的方案只在随机谕言机模型下证明了安全性.本文在合数阶双线性群下,提出了一个在标准模型下安全高效的SCF-PEKS方案,基于判定性子群假设和DBDH假设,证明了本文方案可抵抗选择关键词攻击(IND-SCF-CKA).跟现有在标准模型下构造的相关方案相比,本文方案具有更简洁的构造和更好的安全性能. In data outsourcing settings,users may encrypt their data before the data is uploaded to the cloud.Searchable encryption(SE)is a recently developed cryptographic primitive that supports keyword search over encrypted data.Among all the SE candidates,public key encryption with keyword search(PEKS)schemes are more powerful than searchable symmetric encryption(SSE)schemes.PEKS supports complicated computation on encrypted data while SSE cannot do it.Classic PEKS assumes a secure channel between users and storage servers to transfer the trapdoor parameters privately.This assumption seems naive in some cases.Baek et al.first suggested a secure-channel free public key encryption with keyword search(SCF-PEKS)scheme to solve this problem in secure-channel free settings.However,their scheme is proved secure only in the Random Oracle model.This paper proposes an efficient SCF-PEKS scheme constructed in composite-order bilinear groups,and is proved to be secure against chosen keyword attack(IND-SCF-CKA)in the standard model under the decisional subgroup assumption and the DBDH assumption.Compared with other related schemes constructed in the standard model,the proposed scheme has more concise construction,and achieves better security.
作者 李士强 杨波 王涛 周彦伟 LI Shi-Qiang;YANG Bo;WANG Tao;ZHOU Yan-Wei(School of Computer Science,Shaanxi Normal University,Xi’an 710119,China;State Key Laboratory of Cryptology,Beijing 100878,China;State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China)
出处 《密码学报》 CSCD 2019年第3期283-292,共10页 Journal of Cryptologic Research
基金 国家重点研发计划(2017YFB0802000) 国家自然科学基金(61572303,61772326,61802241,61802242) “十三五”国家密码发展基金(MMJJ20180217) 中国科学院信息工程研究所信息安全国家重点实验室开放课题(2017-MS-03)~~
关键词 云存储 可搜索加密 无安全信道 标准模型 cloud storage searchable encryption secure-channel free standard model
  • 相关文献

参考文献3

二级参考文献39

  • 1Shilpashree Srinivasamurthy. Survey on Cloud Computing Security[C]. CloudCom, 201(I.
  • 2NIST Special Publication 500-292, 2011, NIST Cloud Computing Reference Architecture[S].
  • 3Secure, private, and trustworthy: enterprise cloud computing with Force.com[R]. Force.corn,inc.,2010.
  • 4Salesforce Whitepaper: The Force.com Multitenant Architecture[R]. Force.com,inc.,2008.
  • 5Kaufman, L.M., Data Security in the World of Cloud Computing, Security & Privacy[C]. IEEE, 2{309,7: 61-64.
  • 6Draft NIST Special Publication 800-144, 2011, Guidelines on SecuriW and Privacy in Public Cloud Computing[S].
  • 7Mell P, Grance T. The NIST Definition of Cloud Computing[R]. National Institute of Standards and Technology, Information Technology Laboratory, 2009.
  • 8Gartner: Seven cloud-computing security risks[EB/OL]. http:/ /www.networkworld.com/news/2OOS/O70208-cloud.html, 2008-07-02/2012-07-12.
  • 9Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing V3.0[R]. The Cloud Security Appliance,2011.
  • 10Yan Liang, P, ong Chun- ming, Zhao Gan- sen. Strengthen cloud computing security with federal identity management using hierarchical identity- based cryptography[C]. In CloudCom' 09: Proceedings of the 1st International Conference on Cloud Computing, Beijing, China, 2009. 167- 177.

共引文献65

同被引文献19

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部