一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

支持關(guān)鍵字搜索的無證書密文等值測試加密方案

張玉磊 陳文娟 張永潔 張雪微 王彩芬

張玉磊, 陳文娟, 張永潔, 張雪微, 王彩芬. 支持關(guān)鍵字搜索的無證書密文等值測試加密方案[J]. 電子與信息學(xué)報(bào), 2020, 42(11): 2713-2719. doi: 10.11999/JEIT190752
引用本文: 張玉磊, 陳文娟, 張永潔, 張雪微, 王彩芬. 支持關(guān)鍵字搜索的無證書密文等值測試加密方案[J]. 電子與信息學(xué)報(bào), 2020, 42(11): 2713-2719. doi: 10.11999/JEIT190752
Yulei ZHANG, Wenjuan CHEN, Yongjie ZHANG, Xuewei ZHANG, Caifen WANG. Certificateless Puklic Key Encryption With Equality Test of Supporting Keyword Search[J]. Journal of Electronics & Information Technology, 2020, 42(11): 2713-2719. doi: 10.11999/JEIT190752
Citation: Yulei ZHANG, Wenjuan CHEN, Yongjie ZHANG, Xuewei ZHANG, Caifen WANG. Certificateless Puklic Key Encryption With Equality Test of Supporting Keyword Search[J]. Journal of Electronics & Information Technology, 2020, 42(11): 2713-2719. doi: 10.11999/JEIT190752

支持關(guān)鍵字搜索的無證書密文等值測試加密方案

doi: 10.11999/JEIT190752 cstr: 32379.14.JEIT190752
基金項(xiàng)目: 國家自然科學(xué)基金(61662069),甘肅省高等學(xué)??蒲许?xiàng)目(2017A-003, 2018A-207)
詳細(xì)信息
    作者簡介:

    張玉磊:男,1979年生,博士,副教授,研究方向?yàn)槊艽a學(xué)與信息安全

    陳文娟:女,1993年生,碩士生,研究方向?yàn)槊艽a學(xué)與信息安全

    張永潔:女,1978年生,碩士,副教授,研究方向?yàn)槊艽a學(xué)與信息安全

    張雪微:女,1995年生,碩士生,研究方向?yàn)槊艽a學(xué)與信息安全

    王彩芬:女,1963年生,博士,教授,研究方向?yàn)槊艽a學(xué)與信息安全

    通訊作者:

    陳文娟 497604722@qq.com

  • 中圖分類號(hào): TP309

Certificateless Puklic Key Encryption With Equality Test of Supporting Keyword Search

Funds: The National Natural Science Foundation of China(61662069), The Higher Educational Scientific Research Foundation of Gansu Province (2017A-003, 2018A-207)
  • 摘要: 公鑰加密等值測試(PKEET)可以實(shí)現(xiàn)云環(huán)境下不同公鑰加密數(shù)據(jù)之間的密文等值比較,即不對(duì)密文解密的情況下測試兩個(gè)密文對(duì)應(yīng)的明文是否一致。但是,密文等值測試加密不提供關(guān)鍵字密文搜索功能。已有密文等值測試加密方案直接以消息生成陷門作為等值測試的憑證,測試的準(zhǔn)確度不高,搜索效率較低。針對(duì)此問題,該文首先提出了支持關(guān)鍵字搜索的無證書密文等值測試加密(CLEETS)方案。方案通過關(guān)鍵字檢索判斷是否包含自己需要的信息,根據(jù)判斷結(jié)果選擇執(zhí)行等值測試,從而避免無效測試。然后,在隨機(jī)預(yù)言機(jī)模型下證明該方案滿足適應(yīng)性選擇關(guān)鍵詞不可區(qū)分性。最后,對(duì)方案進(jìn)行功能和效率對(duì)比。對(duì)比結(jié)果表明,該文方案的計(jì)算代價(jià)略高,但是方案在密文等值測試加密中實(shí)現(xiàn)了關(guān)鍵字的檢索功能,彌補(bǔ)了效率低的不足。
  • 圖  1  系統(tǒng)模型圖

    表  1  功能對(duì)比

    方案等值測試關(guān)鍵字搜索搜索陷門生成測試內(nèi)容
    文獻(xiàn)[6]方案不支持支持與關(guān)鍵字綁定判斷密文對(duì)應(yīng)明文是否相等
    文獻(xiàn)[16]方案支持不支持與密文或加密者綁定判斷密文是否包含關(guān)鍵字
    本文方案支持支持以上兩者都具備以上兩者都具備
    下載: 導(dǎo)出CSV

    表  2  通信開銷

    方案部分私鑰長度秘密值長度公鑰長度密文長度
    文獻(xiàn)[6]方案|2Zq||2Zq||2G1|n(|G1|+lgq)
    本文方案|2G1||2Zq||2G1|n(|G1|+|G2|+lgq)
    下載: 導(dǎo)出CSV

    表  3  計(jì)算代價(jià)(ms)

    密鑰生成加密陷門授權(quán)測試算法1測試算法2
    4Tex +2TH +2Tsm=38.2524Tex +3Tb +Tmul +2TH +2Tsm=
    40.365
    TH +Tex +Tmul =11.473Tex =5.6112Tb +Tex=6.9534Tb +2TH=14.208
    下載: 導(dǎo)出CSV
  • 張鍵紅, 李鵬燕. 一種有效的云存儲(chǔ)數(shù)據(jù)完整性驗(yàn)證方案[J]. 信息網(wǎng)絡(luò)安全, 2017(3): 1–5. doi: 10.3969/j.issn.1671-1122.2017.03.001

    ZHANG Jianhong and LI Pengyan. An efficient data integrity verification scheme for cloud storage[J]. Netinfo Security, 2017(3): 1–5. doi: 10.3969/j.issn.1671-1122.2017.03.001
    MAYER-SCHONBERGER V and CUKIER K. Big data: A Revolution that Will Transform How We Live, Work and Think[M]. London: John Murray, 2013: 94–98.
    SONG D X, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. 2000 IEEE Symposium on Security and Privacy, Berkeley, USA, 2000: 44–55. doi: 10.1109/SECPRI.2000.848445.
    BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]. International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2004: 506–522. doi: 10.1007/978-3-540-24676-3_30.
    江明明, 郭宇燕, 余磊, 等. 有效的標(biāo)準(zhǔn)模型下格上基于身份的代理重加密[J]. 電子與信息學(xué)報(bào), 2019, 41(1): 61–66. doi: 10.11999/JEIT180146

    JIANG Mingming, GUO Yuyan, YU Lei, et al. Efficient identity-based proxy re-encryption on lattice in the standard model[J]. Journal of Electronics &Information Technology, 2019, 41(1): 61–66. doi: 10.11999/JEIT180146
    PENG Yanguo, CUI Jiangtao, PENG Changgen, et al. Certificateless public key encryption with keyword search[J]. China Communications, 2014, 11(11): 100–113. doi: 10.1109/CC.2014.7004528
    MA Mimi, HE Debiao, KUMAR N, et al. Certificateless searchable public key encryption scheme for industrial internet of things[J]. IEEE Transactions on Industrial Informatics, 2018, 14(2): 759–767. doi: 10.1109/TII.2017.2703922
    MA Mimi, HE Debiao, KHAN M K, et al. Certificateless searchable public key encryption scheme for mobile healthcare system[J]. Computers & Electrical Engineering, 2018, 65: 413–424. doi: 10.1016/j.compeleceng.2017.05.014
    張玉磊, 劉祥震, 郎曉麗, 等. 云存儲(chǔ)環(huán)境下多服務(wù)器的密鑰聚合可搜索加密方案[J]. 電子與信息學(xué)報(bào), 2019, 41(3): 674–679. doi: 10.11999/JEIT180418

    ZHANG Yulei, LIU Xiangzhen, LANG Xiaoli, et al. Multi-server key aggregation searchable encryption scheme in cloud environment[J]. Journal of Electronics &Information Technology, 2019, 41(3): 674–679. doi: 10.11999/JEIT180418
    張玉磊, 劉文靜, 劉祥震, 等. 基于授權(quán)的多服務(wù)器可搜索密文策略屬性基加密方案[J]. 電子與信息學(xué)報(bào), 2019, 41(8): 1808–1814. doi: 10.11999/JEIT180944

    ZHANG Yulei, LIU Wenjing, LIU Xiangzhen, et al. Searchable multi-server CP-ABE scheme based on authorization[J]. Journal of Electronics &Information Technology, 2019, 41(8): 1808–1814. doi: 10.11999/JEIT180944
    YANG Guomin, TAN C H, HUANG Qiong, et al. Probabilistic public key encryption with equality test[C]. Cryptographers’ Track at the RSA Conference 2010, San Francisco, USA, 2010: 119–131. doi: 10.1007/978-3-642-11925-5_9.
    TANG Qiang. Towards public key encryption scheme supporting equality test with fine-grained authorization[C]. The 16th Australasian Conference on Information Security and Privacy, Melbourne, Australia, 2011: 389–406.
    TANG Qiang. Public key encryption supporting plaintext equality test and user-specified authorization[J]. Security and Communication Networks, 2012, 5(12): 1351–1362. doi: 10.1002/sec.418
    TANG Qiang. Public key encryption schemes supporting equality test with authorisation of different granularity[J]. International Journal of Applied Cryptography, 2012, 2(4): 304–321. doi: 10.1504/IJACT.2012.048079
    MA Sha, HUANG Qiong, ZHANG Mingwu, et al. Efficient public key encryption with equality test supporting flexible authorization[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(3): 458–470. doi: 10.1109/TIFS.2014.2378592
    MA Sha. Identity-based encryption with outsourced equality test in cloud computing[J]. Information Sciences, 2016, 328: 389–402. doi: 10.1016/j.ins.2015.08.053
    QU Haipeng, YAN Zhen, LIN Xijun, et al. Certificateless public key encryption with equality test[J]. Information Sciences, 2018, 462: 76–92. doi: 10.1016/j.ins.2018.06.025
    HUANG Kaibin, TSO R, CHEN Yuchi, et al. PKE-AET: Public key encryption with authorized equality test[J]. The Computer Journal, 2015, 58(10): 2686–2697. doi: 10.1093/comjnl/bxv025
    LEE H T, LING San, SEO J H, et al. Semi-generic construction of public key encryption and identity-based encryption with equality test[J]. Information Sciences, 2016, 373: 419–440. doi: 10.1016/j.ins.2016.09.013
    The pairing-based cryptography library[EB/OL]. http://crypto.stanford.edu/pbc/, 2015.
  • 加載中
圖(1) / 表(3)
計(jì)量
  • 文章訪問數(shù):  1854
  • HTML全文瀏覽量:  895
  • PDF下載量:  96
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2019-09-29
  • 修回日期:  2020-04-23
  • 網(wǎng)絡(luò)出版日期:  2020-05-28
  • 刊出日期:  2020-11-16

目錄

    /

    返回文章
    返回