期刊文献+

支持代理重加密的基于身份可搜索加密方案 被引量:6

Identity-based Searchable Encryption Scheme Supporting Proxy Re-encryption
下载PDF
导出
摘要 现有的基于身份可搜索加密算法多数无法实现搜索权限的共享。为此,提出一种在云环境下支持代理重加密的基于身份的可搜索加密(IBPKS)方案。将基于身份的加密算法应用到可搜索加密中,并以代理的形式实现搜索权限的高效共享。同时,给出IBPKS方案的形式化定义和安全游戏。实验结果表明,该方案安全高效,在随机预言模型下满足一致性,并能抵抗适应性选择身份和选择明文攻击。 The existing Identity-based Encryption with Keyword Search(IBEKS)cannot share search permissions.Therefore,an Identity-based Proxy Re-encryption with Keyword Search(IBPKS)scheme in cloud environment is proposed.The identity-based encryption algorithm is applied to searchable encryption,and the efficient sharing of search authority is realized in the form of agent.At the same time,the formal definition of IBPKS scheme and the security game are given.Experimental results show that the proposed scheme is secure and efficient,and consistent in random oracle model and can resist adaptive identity selection and plaintext attack.
作者 朱敏惠 陈燕俐 胡媛媛 ZHU Minhui;CHEN Yanli;HU Yuanyuan(College of Computer Science and Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,China)
出处 《计算机工程》 CAS CSCD 北大核心 2019年第1期129-135,140,共8页 Computer Engineering
基金 国家自然科学基金(61572263 61502251 61502243) 江苏省自然科学基金(BK20151511) 中国博士后科学基金(2015M581794) 江苏省博士后科学基金(1501023C) 江苏大学自然科学研究项目(14KJB520027 15KJB520027)
关键词 可搜索加密 基于身份加密 代理重加密 云计算 随机预言模型 Searchable Encryption(SE) Identity-based Encryption(IBE) proxy re-encryption cloud computing random oracle model
  • 相关文献

参考文献3

二级参考文献45

  • 1翁健,陈泯融,杨艳江,邓慧杰,陈克非,鲍丰.无需随机预言机的自适应攻陷模型下选择密文安全的单向代理重加密方案[J].中国科学:信息科学,2010,40(2):298-312. 被引量:8
  • 2SONG D,WAGNER D,PERRIG A.Practical techniques for searching on encrypted data[A].Proceedings of the 2000 IEEE Symposium on Security and Privacy[C].Seattle:IEEE Press,2000.44-55. 被引量:1
  • 3GOLLE P,STADDON J,WATERS B.Secure conjunctive keyword search over encrypted data[A].Proceedings of the 2nd International Conference on Applied Cryptography and Network Security[C].Berlin:Springer-Verlag,2004.31-45. 被引量:1
  • 4BONEH D,CRESCENZO G,OSTROVSKY R,et al.Public key encryption with keyword search[A].Advances in Cryptology:Pro-ceedings of EUROCRYPT[C].Berlin:Springer-Verlag,2004.506-522. 被引量:1
  • 5PARK D,KIM K,LEE P.Public key encryption with conjunctive field keyword search[A].Proceedings of the Fifth International Workshop WISA' 04[C].Berlin:Springer-Verlag,2004.73-86. 被引量:1
  • 6HWANG Y H,LEE P J.Public key eneryptinn with conjunctive key-word search and its extension to a multi-user system[A].Proceedings of Pairing[C].Berlin:Springer-Verlag,2007.2-22. 被引量:1
  • 7BYUN J W,RHEE H S,PARK H A,et al.Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[A].Proceedings of SDM[C].Berlin:Springer-Verlag,2006,75-83. 被引量:1
  • 8ABDALLA M,BELLARE M,CATALANO D,et al.Searchable encryption revisited:consistency properties,relation to anonymous IBE,and extensions[J].Journal of Cryptology,2008,21(3):350-391. 被引量:1
  • 9BAEK J,SAFAVI-NAINI R,SUSILO W.Public key encryption with keyword search revisited[A].Proceedings of Computational Science and its Applications,ICCSA[C].Berlin:Springer-Verlag,2008.1249-1259. 被引量:1
  • 10RHEE H S,PARK J H,SUSILO W,et al.Improved searchable public key encryption with designated tester[A].Proceedings of the 4th In-ternational Symposium on Information,Computer,and Communica-tions Security[C].New York:ACM Press,2009.376-379. 被引量:1

共引文献25

同被引文献45

引证文献6

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部