期刊文献+

基于随机函数的非线性映射保序加密方案 被引量:1

Order preserving encryption scheme of nonlinear mapping based on random function
下载PDF
导出
摘要 针对现有保序加密方案在安全性、高效性和易用性方面难以兼顾的问题,提出一种基于随机函数的非线性映射保序加密方案。该方案将明文空间看作一个等差递增数列,基于密钥将数列中每一个元素都映射到一个单独的密文空间。该密钥通过一个非均匀分布的随机数发生函数来生成,而密文空间的构造利用计算机程序来实现。在加密时,只需从对应的密文空间中随机选取一个值即可作为其密文。分析和实验结果表明,所提方案达到了等序明文不可区分(IND-OCPA)安全,并能有效防止统计攻击;其每十万个数据的平均加密时间为30 ms^50 ms,加密效率较高;该方案不需要复杂的参数预设,且可以采用任何计算机语言实现,具有良好的易用性。 To solve the problem that the existing order preserving encryption schemes are difficult to give consideration to security,efficiency and ease of use at the same time,an order preserving encryption scheme of non-linear mapping based on random function was proposed.In the scheme,the plaintext space was considered as an increasing arithmetic sequence,and each element of the sequence was mapped to a separate ciphertext space based on the key.The key was generated by a random number generating function with non-uniform distribution,and the ciphertext space was constructed by a computer program.During encrypting,the value randomly selected from the corresponding ciphertext space was able to be used as the ciphertext.Analysis and experimental results show that the proposed scheme achieves INDistinguishability under Ordered Chosen Plaintext Attack(IND-OCPA)safety and can effectively prevent statistical attacks;it has the average encryption time per 100000 data of from 30 ms to 50 ms,resulting in high encryption efficiency;the complex parameter presets are not required in the scheme,and the scheme can be implemented in any computer language,so that it is easy to use.
作者 徐衍胜 张游杰 XU Yansheng;ZHANG Youjie(Shanxi JunyueMaike Information Security Technology Company Limited,Taiyuan Shanxi 030006,China;Taiyuan Pengyue Electronic Technology Company Limited,Taiyuan Shanxi 030032,China)
出处 《计算机应用》 CSCD 北大核心 2020年第10期2986-2991,共6页 journal of Computer Applications
关键词 保序加密 非线性映射 随机函数 统计攻击 IND-OCPA安全 order preserving encryption nonlinear mapping random function statistical attack INDistinguishability under Ordered Chosen Plaintext Attack(IND-OCPA)safety
  • 相关文献

参考文献8

二级参考文献173

  • 1马勺布,胡磊,徐德启.一种动态安全的密文数据库检索方法[J].计算机工程,2005,31(6):132-133. 被引量:19
  • 2张军,熊枫.网络隐私保护技术综述[J].计算机应用研究,2005,22(7):9-11. 被引量:22
  • 3林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 4樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 5张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34. 被引量:7
  • 6Chen K, Zheng WM. Cloud computing: System instances and current research. Journal of Software, 2009,20(5):1337-1348 (in Chinese with English abstract), http://www.jos.org.cn/1000-9825/3493.htm [doi: 10.3724/SP.J.1001.2009.03493]. 被引量:1
  • 7Dash D, Kantere V, Ailamaki A. An economic model for self-tuned cloud caching. In: Ioannidis YE, Lee DL, Ng RT, eds. Proc. of the 25th Int'l Conf. on Data Engineering (ICDE 2009). New York: IEEE Computer Society Press, 2009. 1687-1693. [dol: 10.1109/ ICDE.2009.143 ]. 被引量:1
  • 8Feng DG, Zhang M, Zhang Y, Xu Z. Study on cloud computing security. Journal of Software, 2011,22(1):71-83 (in Chinese with English abstract), http://www.jos.org.cn/1000-9825/3958.htm [doi: 10.3724/SP.J.1001.2011.03958]. 被引量:1
  • 9Xu M, Gao D, Deng C, Luo ZG, Sun SL. Cloud computing boosts business intelligence of telecommunication industry. In: Jaatun MG, Zhao GS, Rong CM, eds. Proc. of the 1st Int'l Conf. on Cloud Computing (CloudCom 2009). Berlin: Springer-Verlag, 2009. 224-231. [doi: 10.1007/978-3-642-10665-1_20]. 被引量:1
  • 10Qi J, Qian L, Luo ZG. Distributed structured database system HugeTable. In: Jaatun MG, Zhao GS, Rong CM, eds. Proc. of the 1st Int'l Conf. on Cloud Computing (CloudCom 2009). Berlin: Springer-Verlag, 2009. 338-346. [doi: 10.1007/978-3-642-10665- 1_31]. 被引量:1

共引文献487

同被引文献12

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部