期刊文献+

无证书连接关键字密文检索 被引量:6

Certificateless conjunctive keyword search over encrypted data
下载PDF
导出
摘要 由于基于证书的可搜索加密方案存在数据用户公钥验证和证书管理缺陷,且单关键字检索会返回大量不相关的密文数据.为此,通过利用身份加密技术提出了无证书连接关键字密文检索方案,解决了密钥托管难题,同时能避免带宽和计算资源的浪费.严格的安全分析证明文中方案在标准模型下可抵抗关键字猜测攻击,而且基于实际数据集的性能分析表明文中方案在实际应用场景中是高效的、可行的. As the certificate-based searchable encryption schemes need to verify the data user's public key and manage certificates, and single keyword search always return huge volumes of irrelevant ciphertext. Therefore, by exploiting the identity encryption technique we propose a certificateless conjunctive keyword search over encrypted data scheme which can eliminate the key escrow problem and avoid the waste of bandwidth and computational resources. Rigorous security analysis proves that Our proposed scheme is secure against the off-line keyword guessing attack in the standard model. Moreover, the empirical experiment on real-world dataset demonstrates its efficiency and feasibility in practical scenarios.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2017年第3期55-60,共6页 Journal of Xidian University
基金 国家863高技术研究发展计划资助项目(2015AA016007 2015AA017203) 海峡基金资助项目(U1405255 U1135002) 国家自然科学基金资助项目(61370078 61309016) 长江学者和创新团队发展计划资助项目(IRT1078)
关键词 可搜索加密 无证书 身份加密 连接关键字 查询 searchable encryption certificateless identity encryption conjunctive keyword search
  • 相关文献

参考文献1

二级参考文献9

  • 1Boneh D, Di C G, Ostrovsky R, et al. Public Key Encryption with Keyword Search [C]//Lecture Notes in Computer Science: 3027. Berlin: Springer-Verlag, 2004: 506-522. 被引量:1
  • 2Boneh D, Franklin M. Identity-based Encryption from the Weil Pairing [C]//Lecture Notes in Computer Science: 2139. Berlin: Springer-Verlag, 2001: 213-229. 被引量:1
  • 3Blazy O, Kiltz E, Pan J X. (Hierarchical) Identity-based Encryption from Affine Message Authentication [C]//Lecture Notes in Computer Science: 8617. Berlin: Springer-Verlag, 2014: 408-425. 被引量:1
  • 4Lai J Z, Deng R H, Liu S L, et al. Identity-based Encryption Secure Against Selective Opening Chosen-ciphertext Attack [C]//Lecture Notes in Computer Science: 8441. Berlin: Springer-Verlag, 2014: 77-92. 被引量:1
  • 5Chen J, Wee H. Fully, (almost) Tightly Secure IBE and Dual System Groups [C]//Lecture Notes in Computer Science: 8043. Berlin:Springer-Verlag, 2013: 435-460. 被引量:1
  • 6Boneh D, Waters B. Conjunctive, Subset, and Range Queries on Encrypted Data [C]//Lecture Notes in Computer Science: 4392. Berlin: Springer-Verlag, 2007: 535-554. 被引量:1
  • 7Zhang B, Zhang F G. An Efficient Public Key Encryption with Conjunctive-subset Keywords Search [J]. Journal of Network and Computer Applications, 2011, 34(1): 262-267. 被引量:1
  • 8Kawai Y, Takashima K. Predicate-and Attribute-hiding Inner Product Encryption in a Public Key Setting [C]//Lecture Notes in Computer Science: 8365. Berlin: Springer-Verlag, 2013: 113-130. 被引量:1
  • 9Bosch C, Hartel P, Jonker W, et al. A Survey of Provably Secure Searchable Encryption [J]. ACM Computing Surveys, 2014, 47(2): 03600300. 被引量:1

共引文献2

同被引文献38

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部