高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

多用户环境下无证书认证可搜索加密方案

张玉磊 文龙 王浩浩 张永洁 王彩芬

张玉磊, 文龙, 王浩浩, 张永洁, 王彩芬. 多用户环境下无证书认证可搜索加密方案[J]. 电子与信息学报, 2020, 42(5): 1094-1101. doi: 10.11999/JEIT190437
引用本文: 张玉磊, 文龙, 王浩浩, 张永洁, 王彩芬. 多用户环境下无证书认证可搜索加密方案[J]. 电子与信息学报, 2020, 42(5): 1094-1101. doi: 10.11999/JEIT190437
Yulei ZHANG, Long WEN, Haohao WANG, Yongjie ZHANG, Caifen WANG. Certificateless Authentication Searchable Encryption Scheme for Multi-user[J]. Journal of Electronics & Information Technology, 2020, 42(5): 1094-1101. doi: 10.11999/JEIT190437
Citation: Yulei ZHANG, Long WEN, Haohao WANG, Yongjie ZHANG, Caifen WANG. Certificateless Authentication Searchable Encryption Scheme for Multi-user[J]. Journal of Electronics & Information Technology, 2020, 42(5): 1094-1101. doi: 10.11999/JEIT190437

多用户环境下无证书认证可搜索加密方案

doi: 10.11999/JEIT190437
基金项目: 国家自然科学基金(61662069),甘肃省高等学校科研项目(2017A-003, 2018A-207)
详细信息
    作者简介:

    张玉磊:男,1979年生,副教授,研究方向为密码学和信息网络安全

    文龙:男,1996年生,硕士生,研究方向为网络与信息安全

    王浩浩:男,1993年生,硕士生,研究方向为网络与信息安全

    张永洁:女,1978年生,副教授,研究方向为密码学和信息网络安全

    王彩芬:女,1963年生,教授,研究方向为密码学与信息安全

    通讯作者:

    文龙 770293027@qq.com

  • 中图分类号: TP309

Certificateless Authentication Searchable Encryption Scheme for Multi-user

Funds: The National Natural Science Foundation of China(61662069), The Higher Educational Scientific Research Foundation of Gansu Province (2017A-003, 2018A-207)
  • 摘要:

    可搜索加密技术的提出使用户能够将数据加密后存储在云端,而且可以直接对密文数据进行检索。但现有的大部分可搜索加密方案都是单用户对单用户的模式,部分多用户环境下的可搜索加密方案是基于传统公钥密码或基于身份公钥密码系统,因此这类方案存在证书管理和密钥托管问题,且容易遭受内部关键词猜测攻击。该文结合公钥认证加密和代理重加密技术,提出一个高效的多用户环境下无证书认证可搜索加密方案。方案使用代理重加密技术对部分密文进行重加密处理,使得授权用户可以利用关键字生成陷门查询对应密文。在随机预言模型下,证明方案具有抵抗无证书公钥密码环境下两类攻击者的内部关键词猜测攻击的能力,且该方案的计算和通信效率优于同类方案。

  • 图  1  方案系统模型

    图  2  计算量对比

    表  1  计算性能分析

    方案KeyGen密文生成TrapdoorTest抗IKGA支持多用户
    文献[9]2TH+8Tsm=161.29183TH+2Th+5Tsm+3Tbp=
    235.8
    TH+Th+3Tsm=68.5Th+Tsm+2Tpa+Tbp=39.2××
    文献[11]2TH+4Tsm=112.27463TH+Th+4Tsm+3Tbp+
    3Tpa=224.1
    TH+Tpa+Tsm=44.12TH+Tsm+Th+2Tpa+
    Tbp=102.5
    ××
    文献[12]2Th+4Tsm=49.1384TH+3Th+5Tsm+Tbp+
    3Tpa=93.7
    TH+3Th+3Tsm+Tbp+
    2Tpa=95.5
    2Tsm+2Th+2Tpa+2Tbp+Tmul=78.1×
    本文2Th+4Tsm=49.1384TH+3Tsm+Tpa=68.6TH+Th+2Tsm+Tbp+
    2Tpa=83.1
    2Tsm+2Th+4Tpa+2Tbp+Tmul=78.8
    下载: 导出CSV

    表  2  通信量分析比较

    方案公钥PK大小密文大小陷门T大小
    文献[9]$4\left| {{G_1}} \right|$$\left| {{G_1}} \right| + \left| {{Z_q}} \right|$$3\left| {{G_1}} \right|$
    文献[11]$2\left| {{G_1}} \right|$$\left| {{G_1}} \right| + \left| {{Z_q}} \right|$$\left| {{G_1}} \right|$
    文献[12]$2\left| {{G_1}} \right|$$2\left| {{G_1}} \right|$$\left| {{G_2}} \right|$
    本文$2\left| {{G_1}} \right|$$2\left| {{G_1}} \right|$$\left| {{G_2}} \right|$
    下载: 导出CSV
  • BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]. 2004 International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2004: 506–522.
    CHANG Y C and MITZENMACHER M. Privacy preserving keyword searches on remote encrypted data[C]. The 3rd International Conference on Applied Cryptography and Network Security, New York, USA, 2005: 442–455.
    KAMARA S, PAPAMANTHOU C, and ROEDER T. Dynamic searchable symmetric encryption[C]. 2012 ACM Conference on Computer and Communications Security, Raleigh, USA, 2012: 965–976.
    SAMANTHULA B K, JIANG Wei, and Bertino E. Privacy-preserving complex query evaluation over semantically secure encrypted data[C]. The 19th European Symposium on Research in Computer Security, Wroclaw, Poland, 2014: 400–418.
    SHAO Jun, CAO Zhenfu, LIANG Xiaohui, et al. Proxy re-encryption with keyword search[J]. Information Sciences, 2010, 180(13): 2576–2587. doi: 10.1016/j.ins.2010.03.026
    LEE S H and LEE I Y. A study of practical proxy reencryption with a keyword search scheme considering cloud storage structure[J]. The Scientific World Journal, 2014: 615679. doi: 10.1155/2014/615679
    郭丽峰, 卢波. 有效的带关键字搜索的代理重加密方案[J]. 计算机研究与发展, 2014, 51(6): 1221–1228. doi: 10.7544/issn1000-1239.2014.20130329

    GUO Lifeng and LU Bo. Efficient proxy re-encryption with keyword search scheme[J]. Journal of Computer Research and Development, 2014, 51(6): 1221–1228. doi: 10.7544/issn1000-1239.2014.20130329
    HUANG Qiong and LI Hongbo. An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks[J]. Information Sciences, 2017, 403/404: 1–14. doi: 10.1016/j.ins.2017.03.038
    PENG Yanguo, CUI Jiangtao, PENG Changgen, et al. Certificateless public key encryption with keyword search[J]. China Communications, 2014, 11(11): 100–113. doi: 10.1109/CC.2014.7004528
    WU T, MENG Fanya, CHEN C, et al. On the security of a certificateless searchable public key encryption scheme[C]. The 10th International Conference on Genetic and Evolutionary Computing, Fuzhou, China, 2016: 113–119.
    MA Mimi, HE Debiao, KHAN M K, et al. Certificateless searchable public key encryption scheme for mobile healthcare system[J]. Computers & Electrical Engineering, 2018, 65: 413–424. doi: 10.1016/j.compeleceng.2017.05.014
    MA Mimi, HE Debiao, KUMAR N, et al. Certificateless searchable public key encryption scheme for industrial internet of things[J]. IEEE Transactions on Industrial Informatics, 2018, 14(2): 759–767. doi: 10.1109/TII.2017.2703922
    CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: Improved definitions and efficient constructions[J]. Journal of Computer Security, 2011, 19(5): 895–934. doi: 10.3233/JCS-2011-0426
    RANE D D and GHORPADE V R. Multi-user multi-keyword privacy preserving ranked based search over encrypted cloud data[C]. 2015 International Conference on Pervasive Computing, Pune, India, 2015: 1–4.
    YANG Yanjiang, LU Haibing, and WENG Jian. Multi-user private keyword search for cloud computing[C]. The 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science, Athens, Greece, 2011: 264–271.
    CHANG Y and WU J. Multi-user searchable encryption scheme with constant-size keys[C]. The 2017 IEEE 7th International Symposium on Cloud and Service Computing, Kanazawa, Japan, 2017: 98–103.
    WANG Guofeng, LIU Chuanyi, Dong Yingfei, et al. IDCrypt: A multi-user searchable symmetric encryption scheme for cloud applications[J]. IEEE Access, 2018, 6: 2908–2921. doi: 10.1109/ACCESS.2017.2786026
    TANG Qiang. Nothing is for free: Security in searching shared and encrypted data[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(11): 1943–1952. doi: 10.1109/TIFS.2014.235938
    CARO A D and IOVINO V. JPBC library[EB/OL]. http://gas.dia.unisa.it/projects/jpbc/index.html#.VTDrLSOl_Cw, 2013.
  • 加载中
图(2) / 表(2)
计量
  • 文章访问数:  3515
  • HTML全文浏览量:  1379
  • PDF下载量:  170
  • 被引次数: 0
出版历程
  • 收稿日期:  2019-06-13
  • 修回日期:  2019-12-24
  • 网络出版日期:  2020-01-07
  • 刊出日期:  2020-06-04

目录

    /

    返回文章
    返回