首页 | 本学科首页   官方微博 | 高级检索  
     

具有高效授权的无证书公钥认证可搜索加密方案
引用本文:郎晓丽,曹素珍,刘祥震,张玉磊,王斐.具有高效授权的无证书公钥认证可搜索加密方案[J].计算机工程与科学,2020,42(3):418-426.
作者姓名:郎晓丽  曹素珍  刘祥震  张玉磊  王斐
作者单位:(西北师范大学计算机科学与工程学院,甘肃 兰州 730070)
摘    要:设计了1个高效授权的无证书密码环境下的公钥认证可搜索加密方案的安全模型,并提出了具体的具有高效授权的无证书公钥认证可搜索加密方案。该方案中云服务器利用数据属主对密文关键词索引的签名进行数据属主的身份验证;其次,数据用户对授权服务器进行授权,授权服务器可以对数据用户进行验证,若数据用户合法,则协助数据用户对云服务器返回的密文执行有效性的验证;同时,数据属主与数据用户利用云服务器公钥生成的密文关键词索引与陷门搜索凭证,可以保证密文关键词索引与陷门搜索凭证满足公开信道中的传输安全。最后使用仿真验证了所提方案的效率。

关 键 词:可搜索加密  公钥认证  授权  数据用户身份验证  
收稿时间:2019-06-28
修稿时间:2019-08-29

A certificateless public key authenticated searchable encryption scheme with efficient authorization
LANG Xiao-li,CAO Su-zhen,LIU Xiang-zhen,ZHANG Yu-lei,WANG Fei.A certificateless public key authenticated searchable encryption scheme with efficient authorization[J].Computer Engineering & Science,2020,42(3):418-426.
Authors:LANG Xiao-li  CAO Su-zhen  LIU Xiang-zhen  ZHANG Yu-lei  WANG Fei
Affiliation:(College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China)  
Abstract:This paper designs a security model of the public key authenticated searchable encryption scheme in efficiently authoried certificateless environments, and proposes a specific certificateless public key authenticated searchable encryption scheme with efficient authorization. In this scheme, the cloud server uses the signature of the data owner on the ciphertext keyword index to verify the data owner identity. Secondly, the data user authorizes the authorization server to verify the identity of the data user. If the data user is legal, the server help the data user to verify the validity of the ciphertext returned by the cloud server. At the same time, the data owner and the data user use the cloud server public key to generate the ciphertext keyword index and the trapdoor search credentials that satisfies the transmission security on the public channel. Finally, the efficiency of the proposed scheme is verified by experimental simulation.
Keywords:searchable encryption  public key authentication  authorization  data user verification  
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机工程与科学》浏览原始摘要信息
点击此处可从《计算机工程与科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号