首页 | 本学科首页   官方微博 | 高级检索  
     

支持非单调访问结构的可验证搜索属性加密方案
引用本文:林素青,张书华. 支持非单调访问结构的可验证搜索属性加密方案[J]. 计算机应用, 2022, 42(9): 2772-2779. DOI: 10.11772/j.issn.1001-9081.2021081446
作者姓名:林素青  张书华
作者单位:天津财经大学 理工学院,天津 300222
天津财经大学 管理可计算建模协同创新中心,天津 300222
基金项目:天津市教委高等学校科技发展基金计划项目(2017KJ237)
摘    要:针对属性基密文搜索方案多数只支持单调访问结构,且对搜索结果缺乏有效检验等问题,提出支持非单调访问结构且搜索可验证的密文关键字搜索属性加密方案。首先,由属性值构造多项式,根据多项式整除性质实现密文细粒度搜索的权限设置;然后,在确保不泄露隐私信息的前提下,由云服务器完成密文搜索和外包解密;最后,借助所提承诺方案实现对搜索结果的正确性检验。所提方案支持非单调访问结构且具备密文细粒度搜索、数据共享、外包解密和搜索可验证等多项功能。在随机预言机模型中,基于扩展多指数序列判定Diffie-Hellman (aMSE-DDH)假设,可证明该方案在选择密文攻击和选择关键字攻击情况下均具有选择性的不可区分安全性。实验结果表明,所提方案的终端解密时间与属性个数无关,仅需约12.9 ms。

关 键 词:属性加密  非单调访问结构  细粒度搜索  随机预言机模型  外包解密  
收稿时间:2021-08-12
修稿时间:2021-11-21

Attribute-based encryption scheme with verifiable search and non-monotonic access structure
Suqing LIN,Shuhua ZHANG. Attribute-based encryption scheme with verifiable search and non-monotonic access structure[J]. Journal of Computer Applications, 2022, 42(9): 2772-2779. DOI: 10.11772/j.issn.1001-9081.2021081446
Authors:Suqing LIN  Shuhua ZHANG
Affiliation:School of Science and Technology,Tianjin University of Finance and Economics,Tianjin 300222,China
Co?Innovation Center for Computable Modeling in Management Science,Tianjin University of Finance and Economics,Tianjin 300222,China
Abstract:Most existing attribute-based keyword search schemes only support monotonic access structure and lack efficient verification for search results. Aiming at these problems, a ciphertext keyword search attribute-based encryption scheme with verifiable search and non-monotonic access structure was proposed. Firstly, the polynomials were constructed by the attribute values, and the fine-grained ciphertext search permission setting was accomplished by divisibility property of the polynomials. Then, both keyword search and outsourced decryption were performed by the cloud servicer without revealing any private information. Finally, the search result verification was realized by utilizing the proposed commitment scheme. The proposed scheme supports multiple functions such as non-monotonic access structure, fine-grained search, data sharing, outsourced decryption, and verifiable search. Under the augmented Multi-Sequence of Exponents Decisional Diffie-Hellman (aMSE-DDH) assumption, it can be proved that this scheme has selective indistinguishability security under chosen ciphertext attacks and under chosen keyword attacks, respectively, in the random oracle model. Experimental results show that the terminal decryption time of the proposed scheme is not related to the attribute number, and is about 12.9 ms.
Keywords:attribute-based encryption  non-monotonic access structure  fine-grained search  random oracle model  outsourced decryption  
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号