首页 | 本学科首页   官方微博 | 高级检索  
     

多用户环境下无证书认证可搜索加密方案
引用本文:张玉磊,文龙,王浩浩,张永洁,王彩芬.多用户环境下无证书认证可搜索加密方案[J].电子与信息学报,2020,42(5):1094-1101.
作者姓名:张玉磊  文龙  王浩浩  张永洁  王彩芬
作者单位:1.西北师范大学计算机科学与工程学院 兰州 7300702.甘肃卫生职业学院 兰州 7300703.深圳技术大学 深圳 518118
基金项目:国家自然科学基金(61662069),甘肃省高等学校科研项目(2017A-003, 2018A-207)
摘    要:可搜索加密技术的提出使用户能够将数据加密后存储在云端,而且可以直接对密文数据进行检索。但现有的大部分可搜索加密方案都是单用户对单用户的模式,部分多用户环境下的可搜索加密方案是基于传统公钥密码或基于身份公钥密码系统,因此这类方案存在证书管理和密钥托管问题,且容易遭受内部关键词猜测攻击。该文结合公钥认证加密和代理重加密技术,提出一个高效的多用户环境下无证书认证可搜索加密方案。方案使用代理重加密技术对部分密文进行重加密处理,使得授权用户可以利用关键字生成陷门查询对应密文。在随机预言模型下,证明方案具有抵抗无证书公钥密码环境下两类攻击者的内部关键词猜测攻击的能力,且该方案的计算和通信效率优于同类方案。

关 键 词:可搜索加密    无证书    多用户环境    代理重加密    内部关键词猜测攻击
收稿时间:2019-06-13

Certificateless Authentication Searchable Encryption Scheme for Multi-user
Yulei ZHANG,Long WEN,Haohao WANG,Yongjie ZHANG,Caifen WANG.Certificateless Authentication Searchable Encryption Scheme for Multi-user[J].Journal of Electronics & Information Technology,2020,42(5):1094-1101.
Authors:Yulei ZHANG  Long WEN  Haohao WANG  Yongjie ZHANG  Caifen WANG
Affiliation:1.College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China2.Gansu Health Vocational College, Lanzhou 730070, China3.Shenzhen Technology University, Shenzhen 518118, China
Abstract:The searchable encryption technology enables users to encrypt data and store it in the cloud, and can directly retrieve ciphertext data. Most existing searchable encryption schemes are single-to-single mode, and the searchable encryption scheme in some multi-user environments is based on public key cryptography or identity-based public key cryptosystem. Such schemes have certificate management and key escrow issues and scheme are vulnerable to suffer internal keyword guessing attacks. Public key authentication encryption and proxy re-encryption technology are combined, and an efficient certificateless authentication searchable encryption scheme is proposed for multi-user environment. The scheme uses proxy re-encryption technology to re-encrypt portion of ciphertexts, so that authorized users can generate trapdoor with the keywords to query ciphertext. In the random oracle model, the scheme is proved that it has the ability to resist the internal keyword guessing of two type attackers in the certificateless public key cryptosystem, and the calculation and communication efficiency of the scheme is better than the similar scheme.
Keywords:
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号