计算机科学 ›› 2015, Vol. 42 ›› Issue (11): 197-202.doi: 10.11896/j.issn.1002-137X.2015.11.041

• 信息安全 • 上一篇    下一篇

标准模型下增强的无需安全信道的带关键词搜索的公钥加密

方黎明,黄志球,王建东   

  1. 南京航空航天大学计算机科学与技术学院 南京210016,南京航空航天大学计算机科学与技术学院 南京210016,南京航空航天大学计算机科学与技术学院 南京210016
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金项目(61272083,61300236),江苏省自然科学基金青年项目(BK20130809),中国博士后科学基金(2013M530254),中国博士后科学基金特别资助

Secure Channel Free Searchable Encryption in Standard Model

FANG Li-ming, HUANG Zhi-qiu and WANG Jian-dong   

  • Online:2018-11-14 Published:2018-11-14

摘要: Baek,Safavi-Naini和Susilo提出了无需安全信道的带关键词搜索的公钥加密方案。该方案中的安全模型限制了攻击者的能力,并且方案是在随机预言模型下可证安全的。然而在随机预言模型下证明安全的方案在实际执行中会导致不安全。通过改进安全模型使得攻击者能力更强,即允许攻击者获得非挑战密文和陷门之间的关系,同时构造了在增强的安全模型下不使用随机预言机可证安全的带关键词搜索的公钥加密方案。

关键词: 公钥加密,可搜索加密,无需安全信道,标准模型

Abstract: Recently,Baek et al.proposed an efficient public key encryption scheme with keyword search based on the scheme of Boneh et al.However,the security model of Baek et al.seriously limits the ability of the adversary.Rhee et al.enhanced the security model of the public key encryption with keyword search to properly incorporate the ability of an adversarys,and presented a PEKS in the random oracle model.Unfortunately,a proof in the random oracle model has shown that it possibly leads to insecure schemes when the random oracles are implemented in the standard model.This paper constructed an efficient public key encryption scheme with keyword search secure in the enhanced security model without random oracle.

Key words: Public key encryption,Searchable encryption,Secure channel free,Standard model

[1] Abdalla M,Bellare M,Catalano D,et al.Advances in Cryptology[C]∥CRYPTO 2005.Springer Berlin Heidelberg,2005:205-222
[2] Baek J,Safavi-Naini R,Susilo W.Computational Science and Its Applications[C]∥ICCSA 2008.Springer Berlin Heidelberg,2008:1249-1259
[3] Boneh D,Boyen X.Efficient selective-ID Identity based encryption without random oracles[C]∥Proc.of EUROCRYPT 2004.Springer Berlin Heidelberg,2004:223-238
[4] Boneh D,Di C G,Ostrovsky R,et al.Public Key Encryptionwith Keyword Search[C]∥Proc.of EUROCRYPT 2004.Springer Berlin Heidelberg,2004:506-522
[5] Canetti R,Goldreich O,Halevi S.The random oracle methodology,revisited[C]∥Proc.of 30th ACM STOC.ACM Press,1998:209-218
[6] Canetti R,Halevi S,Katz J.Chosen-Ciphertext Security fromIdentity-Based Encryption[C]∥Proc.of EUROCRYPT 2004.Springer Berlin Heidelberg,2004:202-222
[7] Fang L,Susilo W,Ge C,et al.Public key encryption with keyword search secure against keyword guessing attacks without random oracle[J].Information Sciences,2013,8:221-241
[8] Gentry C.Practical identity-based encryption without randomoracles[C]∥Proc.of EUROCRYPT 2006.Springer-Verlag,2006:457-464
[9] Gu C,Pan Y,Z A H.Efficient Public Key Encryption with Keyword Search Schemes from Pairings[M]∥Information Security and Cryptology:Third SKLOIS Conference.2008:372-382
[10] Waters B,Balfanz D,Durfee G,et al.Building an Encrypted and Searchable Audit Log[C]∥Network and Distributed System Security Symposium (NDSS 2004).2004
[11] Golle P,Staddon J,Waters B.Secure Conjunctive Search over Encrypted Data [C]∥Jakobsson M,Yung M,Zhou J,eds.Proc.ACNS 2004.Springer-Verlag,2004:31-45
[12] Hofheinz D,Weinreb E.Searchable encryption with decryption in the standard model:Report 2008/423[R].Cryptology ePrint Archive,2008:1-17
[13] Jeong I R,Kwon J O,Hong D,et al.Constructing PEKSschemes secure against keyword guessing attacks is possible? [J].Computer Communications,2009,32(2):394-396
[14] Park D J,Kim K,Lee P J.Public Key Encryption with Conjunctive Field Keyword Search[M]∥Lim C H,Yung M,eds.Information Security Applications:5th International Workshop,WISA 2004.Springer Berlin Heidelberg,2005:73-86
[15] Rhee H S,Park J H,Susilo W,et al.Improved searchable public key encryption with designated tester[C]∥Proc.of the 4th international Symposium on information,Computer,and Communications Security(ASIACCS ’09).ACM,New York,NY,2009:376-379
[16] Rhee H S,Susilo W,Kim H-J.Secure searchable public key encryption scheme against keyword guessing attacks[J].IEICE Electron,2009,6(5):237-243
[17] Rhee H S,Park J H,Lee D H.Generic construction of designa-ted tester public-key encryption with keyword search[J].Information Sciences,2012,205(1):93-109
[18] Xu P,Jin H,Wu Q,et al.Public-Key Encryption with FuzzyKeyword Search:A Provably Secure Scheme under Keyword Guessing Attack[J].IEEE Transactions on Computers,2013,62(11):2266-2277
[19] Yau W C,Heng S H,Goi B.Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes[C]∥Proc.of ATC 2008.Springer-Verlag,2008:100-105
[20] Zhang R,Imai H.Generic combination of public key encryption with keyword search and public key encryption[C]∥6th International Conference Proc.of Cryptology and Network Security.Springer-Verlag,2007:159-174
[21] 孙婷,王建东.基于模糊关键词搜索的无安全信道公钥加密[J].计算机应用与软件,2014,1(3):308-309 Sun Ting,Wang Jian-dong.Encrypting pubilc key without secure channel based on fuzzy keyword search[J].Computer Applications and Software,2014,1(3):308-309
[22] 李双.一种安全的具有匿名性的可搜索加密方案[J].计算机工程与应用,2013,9(16):97-102 Li Shuang.Safe anonymous identity based public key encryption with keyword search[J].Computer Engineering and Applications,2013,49(16):97-102
[23] 王映康,罗文俊.云存储环境下多用户可搜索加密方案[J].电信科学,2012,28(11):103-107 Wang Ying-kang,Luo Wen-jun.A scheme of multi-user searchable encryption in clould storage[J].Journal Electronic,2012,28(11):103-107
[24] 李双,徐茂智.基于属性的可搜索加密方案[J].计算机学报,2014,37(5):1017-1024 Li Shuang,Xu Mao-zhi.Attribute based public key encryption with keyword search[J].Chinese Journal of Computers,2014,37(5):1017-1024
[25] 杨健,杨邓奇,王剑.关键词可检索的公钥加密技术综述[J].计算机应用,2014,34(7):1878-1883,1896 Yang Jian,Yang Deng-qi,Wang Jian.Overview of public key encryption with keyword search[J].Journal of Computer Applications,2014,34(7):1878-1883,1896

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!