Provable security has been widely used for analyzing the security of cryptosystems. Its main idea is to reduce the security to some well-defined computational assumption. The reduction process is called the security p...Provable security has been widely used for analyzing the security of cryptosystems. Its main idea is to reduce the security to some well-defined computational assumption. The reduction process is called the security proof. In this paper, we find a flaw in the security proof of BDOP-PEKS and PEKS-STAT, present a new conclusion for the security of BDOP-PEKS, and give a security proof. The flaw in the security proof of PEKS-STAT can be fixed in the same way. Finally we conclude some steps of security proof, and emphasize that the probability is as important as the construction.展开更多
基于身份的可搜索加密方案(IBEKS)使用身份等信息作为公钥,绑定了公钥和用户(私钥),省去了CA认证的环节,但是也带来了一些问题,比如密钥托管、密钥撤销等。基于此,首次提出无证书的可搜索方案(CL-PEKS)的抽象定义和构造算法,对算法的一...基于身份的可搜索加密方案(IBEKS)使用身份等信息作为公钥,绑定了公钥和用户(私钥),省去了CA认证的环节,但是也带来了一些问题,比如密钥托管、密钥撤销等。基于此,首次提出无证书的可搜索方案(CL-PEKS)的抽象定义和构造算法,对算法的一致性进行了验证,并且分析了算法复杂度。同时给出了抵抗第一、二类选择关键词密文攻击(type I、type II IND-CCA2)语义安全的CL-PEKS定义。该方案实现了密文关键词可搜索功能,同时解决了IBEKS中的密钥托管问题。展开更多
基金The National Natural Science Foundation of China(No.61372103)the Natural Science Foundation of Jiangsu Province(No.BK20201265)the National Engineering Research Center of Classified Protection and Safeguard Technology for Cyber security(No.C21640-2).
基金Supported by the National Natural Science Foundation of China (60473021)
文摘Provable security has been widely used for analyzing the security of cryptosystems. Its main idea is to reduce the security to some well-defined computational assumption. The reduction process is called the security proof. In this paper, we find a flaw in the security proof of BDOP-PEKS and PEKS-STAT, present a new conclusion for the security of BDOP-PEKS, and give a security proof. The flaw in the security proof of PEKS-STAT can be fixed in the same way. Finally we conclude some steps of security proof, and emphasize that the probability is as important as the construction.
文摘基于身份的可搜索加密方案(IBEKS)使用身份等信息作为公钥,绑定了公钥和用户(私钥),省去了CA认证的环节,但是也带来了一些问题,比如密钥托管、密钥撤销等。基于此,首次提出无证书的可搜索方案(CL-PEKS)的抽象定义和构造算法,对算法的一致性进行了验证,并且分析了算法复杂度。同时给出了抵抗第一、二类选择关键词密文攻击(type I、type II IND-CCA2)语义安全的CL-PEKS定义。该方案实现了密文关键词可搜索功能,同时解决了IBEKS中的密钥托管问题。