All Title Author
Keywords Abstract

电子学报  2015 

一对多场景下的公钥时控性可搜索加密

DOI: 10.3969/j.issn.0372-2112.2015.04.019, PP. 760-768

Keywords: 定时发布,可搜索加密,一对多,可证明安全

Full-Text   Cite this paper   Add to My Lib

Abstract:

为有效解决多接收者时间相关密文检索问题,采用广播加密技术提出一对多公钥时控性可搜索加密机制——发送者将加密的数据发送至云服务器,使得仅授权用户组成员可检索下载包含特定关键词的密文,但只能在指定的未来时间之后解密.给出方案及其安全游戏模型的形式化定义,提出两种基于q-DBDHI问题的可证明安全方案,并严格证明所提方案在自适应选择明文攻击下是安全的.效率分析表明,两种方案在执行过程中,实现了计算、存储、传输规模与用户规模无关;与相关方案相比,方案2具有更高效率.

References

[1]  R L Rivest,A Shamir,D A Wagner.Time-lock puzzles and timed-release crypto,MIT/LCS/TR-684[R/OL].Cambridge,MA:MIT''s Laboratory of Computer Science.http://publications.csail.mit.edu/lcs/pubs/pdf/MIT-LCS-TR-684.pdf,1996-02-01.
[2]  D Boneh,G D Crescenzo,R Ostrovsky,G Persiano.Public key encryption with Keyword search[A].Proceedings of the 23rd International Conference on Advances in Cryptology-Eurocrypt 2004[C].Berlin:Springer,2004.506-522.
[3]  K Yuan,Z Liu,C Jia,J Yang,S Lv.Public key timed-release searchable encryption[A].Proceedings of the 4th IEEE International Conference on Emerging IntelligentData and Web Technologies[C].Piscataway,NJ:IEEE,2013.241-248.
[4]  袁科,刘哲理,贾春福,马昊玉,吕述望.TRE加密技术研究[J].计算机研究与发展,2014,51(6):1206-1220. Yuan Ke,Liu Zhe-li,Jia Chun-fu,Ma Hao-yu,Lü Shu-wang.Research on timed-release encryption[J].Journal of Computer Research and Development,2014,51(6):1206-1220.(in Chinese).
[5]  J Cathalo,B Libert,J-J Quisquater.Efficient and non-interactive timed-release encryption[A].Proceedings of the 7th International Conference on Information and Communications Security[C].Berlin:Springer,2005.291-303.
[6]  K Chalkias,D Hristu-Varsakelis,G Stephanides.Improved anonymous timed-release encryption[A].Proceedings of the 12th European Symposium on Computer Security—ESORICS 2007[C].Berlin:Springer,2007.311-326.
[7]  K Liang,Q Huang,R Schlegel,D S Wong,C Tang.A conditional proxy broadcast re-encryption scheme supporting timed-release[A].Proceedings of the 9th International Conference on Information Security Practice and Experience[C].Berlin:Springer,2013:132-146.
[8]  K Emura,A Miyaji,K Omote.A timed-release proxy re-encryption scheme and its application to fairly-opened multicast communication[A].Proceedings of the 4th International Conference on Provable Security[C].Berlin:Springer,2010.200-213.
[9]  K Emura,A Miyaji,K Omote.A timed-release proxy re-encryption scheme[J].IEICETrans on Fundamentals of Electronics,Communications and Computer Sciences,2011,E94-A(8):1682-1695.
[10]  Y H Hwang,P J Lee.Public key encryption with conjunctive keyword search and its extension to a multi-user system[A].Proceedings of the 1st International Conference on Pairing-Based Cryptography–Pairing 2007[C].Berlin:Springer,2007.2-22.
[11]  F Bao,R H Deng,X Ding,Y.Yang.Private query on encrypted data in multi-user settings[A].Proceedings of the 4th International Conference on Information Security Practice and Experience[C].Berlin:Springer,2008.71-85.
[12]  F Zhao,T Nishide,K Sakurai.Multi-user keyword search scheme for secure data sharing with fine-grained access control[A].Proceedings of the 14th International Conference on Information Security and Cryptology-ICISC 2011[C].Berlin:Springer,2012.406-418.
[13]  R Canetti,S Halevi,J Katz.Chosen-ciphertext security from identity-based encryption[A].Proceedings of the 23rd International Conference on Advances in Cryptology-Eurocrypt 2004[C].Berlin:Springer,2004.207-222.
[14]  D Boneh,X Boyen.Efficient selective-id secure identity-based encryption without random oracles[A].Proceedings of the 23rd International Conference on Advances in Cryptology-EUROCRYPT 2004[C].Berlin:Springer,2004.223-238.
[15]  C Delerablée.Identity-based broadcast encryption with constant size ciphertexts and private keys[A].Proceedings of the 13th International Conference on Advances in Cryptology-ASIACRYPT 2007[C].Berlin:Springer,2007.200-215.
[16]  T May.Timed-release crypto[EB/OL].http://www.cyphernet.org/cyphernomicon/chapter14/14.5.html.1993.

Full-Text

comments powered by Disqus