期刊文献+

基于无证书的具有否认认证的可搜索加密方案

Certificateless cryption based public key keyword searchable encryption scheme with denial authentication
下载PDF
导出
摘要 物联网环境下,云存储技术的发展和应用降了低用户数据的存储和管理开销并实现了资源共享。为了保护用户的身份隐私,提出一种具有否认认证特性的可搜索加密方案。发送方对原始数据进行可否认加密并将密文上传,而接收端在密文的确认阶段无法向第三方证明数据的来源,保障了数据的安全性。相较于基于身份认证的单一设计,提出方案利用无证书密码技术解决了传统方案中密钥托管和密钥撤销阶段中存在的弊端,同时也实现了可否认加密的密态搜索。最后,对提出方案进行了严格的安全性分析。实验结果表明,该方案可以较好地完成可搜索加密任务。 In the Internet of Things,the development and application of cloud storage technology reduce the storage and mana-gement overhead of user data and realize resource sharing.To protect privacy of users,this paper proposed a searchable en-cryption scheme with denial-authentication property.The sender encrypted the original data and uploaded the ciphertext,while the receiver couldn’t prove the source of the data to a third party during the confirmation phase,ensuring data security.Compared with the single design based on identity authentication,the proposed scheme used certificateless cryptography technology to solve the disadvantages of the traditional scheme in the key escrow and key revocation stage,and also realized deniable encryption in the dense state search.Finally,it analyzed the security of the proposed scheme strictly.Experimental results show that the scheme can complete the searchable encryption task well.
作者 宋安宁 王宝成 李化鹏 Song Anning;Wang Baocheng;Li Huapeng(School of Information,North China University of Technology,Beijing 100144,China)
出处 《计算机应用研究》 CSCD 北大核心 2023年第5期1510-1514,共5页 Application Research of Computers
基金 北京市教育委员会科学研究计划资助项目(110052971921/021)。
关键词 无证书 否认认证 信息保护 可搜索加密 certificateless denial of authentication privacy protection searchable encryption
  • 相关文献

参考文献8

二级参考文献78

  • 1陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,49(S1):19-25. 被引量:28
  • 2SONG D,WAGNER D,PERRIG A.Practical techniques for searching on encrypted data[A].Proceedings of the 2000 IEEE Symposium on Security and Privacy[C].Seattle:IEEE Press,2000.44-55. 被引量:1
  • 3GOLLE P,STADDON J,WATERS B.Secure conjunctive keyword search over encrypted data[A].Proceedings of the 2nd International Conference on Applied Cryptography and Network Security[C].Berlin:Springer-Verlag,2004.31-45. 被引量:1
  • 4BONEH D,CRESCENZO G,OSTROVSKY R,et al.Public key encryption with keyword search[A].Advances in Cryptology:Pro-ceedings of EUROCRYPT[C].Berlin:Springer-Verlag,2004.506-522. 被引量:1
  • 5PARK D,KIM K,LEE P.Public key encryption with conjunctive field keyword search[A].Proceedings of the Fifth International Workshop WISA' 04[C].Berlin:Springer-Verlag,2004.73-86. 被引量:1
  • 6HWANG Y H,LEE P J.Public key eneryptinn with conjunctive key-word search and its extension to a multi-user system[A].Proceedings of Pairing[C].Berlin:Springer-Verlag,2007.2-22. 被引量:1
  • 7BYUN J W,RHEE H S,PARK H A,et al.Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[A].Proceedings of SDM[C].Berlin:Springer-Verlag,2006,75-83. 被引量:1
  • 8ABDALLA M,BELLARE M,CATALANO D,et al.Searchable encryption revisited:consistency properties,relation to anonymous IBE,and extensions[J].Journal of Cryptology,2008,21(3):350-391. 被引量:1
  • 9BAEK J,SAFAVI-NAINI R,SUSILO W.Public key encryption with keyword search revisited[A].Proceedings of Computational Science and its Applications,ICCSA[C].Berlin:Springer-Verlag,2008.1249-1259. 被引量:1
  • 10RHEE H S,PARK J H,SUSILO W,et al.Improved searchable public key encryption with designated tester[A].Proceedings of the 4th In-ternational Symposium on Information,Computer,and Communica-tions Security[C].New York:ACM Press,2009.376-379. 被引量:1

共引文献480

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部