期刊文献+

面向云存储的无证书可搜索加密方案 被引量:2

Certificateless searchable encryption scheme for cloud storage
下载PDF
导出
摘要 云存储可为用户节省数据管理开销和实现资源共享。由于云服务器不安全,为保证数据的安全性和隐私性,提出一种面向云存储的无证书可搜索加密方案,方案中的部分密钥生成器仅知晓用户的部分私钥。方案的设计采用了双线性对、哈希函数、点乘运算等密码学知识。在随机预言机模型下,证明了所提方案在双线性DH问题下具有选择关键词攻击不区分性的安全性。最后,分析了所提方案的计算代价和通信代价。 The cloud storage can save data management overhead and achieve resource sharing for users. As the cloud server is not safe,to ensure security and privacy of the data, a certificateless searchable encryption scheme for the cloud storage is proposed. In the scheme, partial private key generator can only know partial private key of the users. The design of the proposed scheme adopts the knowledges of bilinear pair, hash function, point multiplication, and so on. In the random oracle model, it is proved that the proposed scheme has the safety of selecting keyword attack indistinguish ability for the bilinear DH problem. Finally, the computation cost and the communication cost of the proposed scheme are analyzed.
出处 《南京邮电大学学报(自然科学版)》 北大核心 2017年第6期90-97,共8页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家自然科学基金(61672174) 广东省自然科学基金(2017A030307027)资助项目
关键词 云存储 无证书可搜索加密 部分密钥生成器 随机预言机模型 cloud storage certificateless searchable encryption partial private key generator random oracle model
  • 引文网络
  • 相关文献

参考文献4

二级参考文献69

  • 1SHAMIR A. Identity-Based Cryptosystems and Signature Schemes[C]// BLAKLEY G, CHAUM D. Advances in Cryptology. Lecture Notes in Com- puter Science, vol. 196, Berlin: Springer Berlin Heidelberg. 1985: 47-53. 被引量:1
  • 2BAEK J, SAFAVI-NAIN] R, SUSILO W. Public Key Encryption with Keyword Search Revisited[M]// GERVASI O, MURGANTE B, LAGAN A, et al. Computational Science and Its Applications ICCSA 2008. Lecture Notes in Computer Sci- ence, vol. 5072. Berlin: Springer Berlin / Heidel-berg. 2008: 1249-1259. 被引量:1
  • 3RHEE H S, PARK J H, SUSILO W, et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester[J]. Journal of Systems and Software, 2010, 83(5): 763-771. 被引量:1
  • 4RHEE H S, PARK J H, LEE D H. Generic construc- tion of designated tester public-key encryption with keyword search[J]. Information Sciences, 2012, 205(0): 93-109. 被引量:1
  • 5XU Peng, JIN Hai, WU Qianhong, et al. Pub- lic-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack[J]. Computers, IEEE Transac- tions on, 2012, 62(11): 2266-2277. 被引量:1
  • 6AL-RIYAMI S, PATERSON K. Certificateless Public Key Cryptography[M]// LAIH C S. Advances in Cryptology - ASIACRYPT 2003. Lecture Notes in Computer Science, vol. 2894. Berlin: Springer Berlin / Heidelberg. 2003: 452-473. 被引量:1
  • 7DENT A. A survey of certificateless encryption schemes and security models[J], internation- al Journal of Information Security, 2008, 7(5): 349-377. 被引量:1
  • 8BARBOSA M, FARSHIM P. Certificateless sign- cryption[C]// Proceedings of the 2008 ACM symposium on Information, computer and communications security. Tokyo, Japan: ACM. 2008: 369-372. 被引量:1
  • 9WANG Fengjiao, ZHANG Yuqing. A new prov- ably secure authentication and key agreement mechanism for SIP using certificateless pub- lic-key cryptography[J]. Computer Communica- tions, 2008, 31(10): 2142-2149. 被引量:1
  • 10CATALANO D, FIORE D, GENNARO R. Certif- icateless onion routing[C]// Proceedings of the 16th ACM conference on Computer and communications security. Chicago, ll]inois, USA: ACM. 2009: 151-160. 被引量:1

共引文献112

同被引文献15

引证文献2

二级引证文献9

;
使用帮助 返回顶部