浏览全部资源
扫码关注微信
1. 陕西师范大学 计算机科学学院,陕西 西安 710062
2. 湖北工业大学 计算机学院,湖北 武汉 430068
[ "邵志毅(1983-),男,陕西西安人,陕西师范大学博士生,主要研究方向为信息安全。" ]
[ "杨波(1963-),男,陕西渭南人,陕西师范大学教授、博士生导师,主要研究方向为密码学与信息安全。" ]
[ "吴振强(1968-),男,陕西商洛人,陕西师范大学教授、博士生导师,主要研究方向为网络安全。" ]
[ "张明武(1972-),男,湖北仙桃人,湖北工业大学副教授,主要研究方向为信息安全。" ]
网络出版日期:2014-11,
纸质出版日期:2014-11-30
移动端阅览
邵志毅, 杨波, 吴振强, 等. 针对服务器安全的指定验证者可搜索公钥加密[J]. 通信学报, 2014,35(Z2):106-111.
Zhi-yi SHAO, Bo YANG, Zhen-qiang WU, et al. Searchable public key encryption with designated verifier secure against the server[J]. Journal on communications, 2014, 35(Z2): 106-111.
邵志毅, 杨波, 吴振强, 等. 针对服务器安全的指定验证者可搜索公钥加密[J]. 通信学报, 2014,35(Z2):106-111. DOI: 10.3969/j.issn.1000-436x.2014.z2.014.
Zhi-yi SHAO, Bo YANG, Zhen-qiang WU, et al. Searchable public key encryption with designated verifier secure against the server[J]. Journal on communications, 2014, 35(Z2): 106-111. DOI: 10.3969/j.issn.1000-436x.2014.z2.014.
摘 要:在指定验证者的可搜索公钥加密(dPEKS)中,提出 IND-KGA-SERVER 安全模型,形式化描述针对服务器的安全。基于IND-KGA安全的dPEKS、数字证书授权中心CA、以及强不可伪造和不可否认的签名,在攻击者是服务器的情况下构造出抗 KG(keyword guessing)攻击的 dPEKS 方案。方案是从 IND-KGA 安全到IND-KGA-SERVER安全的编译器。
In designated verifier searchable public key encryption (dPEKS) schemes
the IND-KGA-SERVER security was proposed to formalize the security against the server.Based on the IND-KGA secure dPEKS
the CA (certificate authority)
and the strongly unforgeable and undeniable signature
the solution was proposed to show how to construct dPEKS schemes which are secure against KG (keyword guessing) attacks when the attacker is the server.The solution is a bootstrap from IND-KGA secure to IND-KGA-SERVER secure.
BONEH D , CRESCENZO G D , OSTROVSKY R , PERSIANO G . Public key encryption with keyword search [A ] . EUROCYPT [C ] . 2004 . 506 - 522 .
BAEK J,SAFAVI-NAINI R , SUSILO W . Public key encryption with keyword search revisited [A ] . ACIS [C ] . 2006 . 1249 - 1259 .
BYUN J W,RHEE H S , PARK H A , LEE D H . Off-line keyword guessing attacks on recent keyword search schemes over encrypted data [A ] . SDM [C ] . 2006 . 75 - 83 .
RHEE H S , SUSILO W , KIM H J . Secure searchable public key encryption scheme against keyword guessing attacks [J ] . IEICE Electronics Express , 2009 , 6 ( 5 ): 237 - 243 .
RHEE H S , PARK J H , SUSILO W , LEE D H . Trapdoor security in a searchable public-key encryption scheme with a designated tester [J ] . Journal of System and Software , 2010 , 83 ( 5 ): 763 - 771 .
FANG L , SUSILO W , GE C , WANG J . Public key encryption with keyword search secure against keyword guessing attacks without random oracle [J ] . Information Sciences , 2013 , 238 : 221 - 241 .
LI J , WANG Q , WANG C , et al . Fuzzy keyword search over encrypted data in cloud computing [A ] . INFOCOM [C ] . 2010 . 1 - 5 .
WANG C , CAO N , LI J , et al . Secure ranked keyword search over encrypted cloud data [A ] . ICDCS [C ] . 2010 . 253 - 262 .
CAO N , WANG C , LI M , et al . Privacy-preserving multi-keyword ranked search over encrypted cloud data [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 1 ): 222 - 233 .
WANG C , CAO N , REN K , et al . Enabling secure and efficient ranked keyword search over outsourced cloud data [J ] . IEEE Transactions on Parallel and Distributed Systems , 2012 , 23 ( 8 ): 1467 - 1479 .
LI M , YU S , CAO N , et al . Authorized private keyword search over encrypted data in cloud computing [A ] . ICDCS [C ] . 2011 . 383 - 392 .
BONEH D , RAGHUNATHAN A , SEGEV G . Function-private identity-based encryption:Hiding the function in functional encryption [A ] . CRYPTO [C ] . Springer Berlin Heidelberg , 2013 . 461 - 478 .
BONEH D , RAGHUNATHAN A , SEGEV G . Function-private subspace-membership encryption and its applications [A ] . ASIACRYPT [C ] . Springer Berlin Heidelberg , 2013 . 255 - 275 .
LI J , WANG Q , WANG C , et al . Fuzzy keyword search over encrypted data in cloud computing [A ] . INFOCOM [C ] . 2010 . 1 - 5 .
WANG C , CAO N , LI J , et al . Secure ranked keyword search over encrypted cloud data [A ] . ICDCS [C ] . 2010 . 253 - 262 .
CAO N , WANG C , LI M , et al . Privacy-preserving multi-keyword ranked search over encrypted cloud data [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 1 ): 222 - 233 .
WANG C , CAO N , REN K , et al . Enabling secure and efficient ranked keyword search over outsourced cloud data [J ] . IEEE Transactions on Parallel and Distributed Systems , 2012 , 23 ( 8 ): 1467 - 1479 .
LI M , YU S , CAO N , et al . Authorized private keyword search over encrypted data in cloud computing [A ] . ICDCS [C ] . 2011 . 383 - 392 .
BONEH D , RAGHUNATHAN A , SEGEV G . Function-private identity-based encryption:hiding the function in functional encryption [A ] . CRYPTO [C ] . Springer Berlin Heidelberg , 2013 . 461 - 478 .
BONEH D , RAGHUNATHAN A , SEGEV G . Function-private subspace-membership encryption and its applications [A ] . ASIACRYPT [C ] . Springer Berlin Heidelberg , 2013 . 255 - 275 .
HAIDAR A N , ABDALLAH A E . Formal modeling of PKI based authentication [J ] . Electronic Notes in Theoretical Computer Science , 2009 , 235 : 55 - 70 .
GOLLMANN D , MEIER J , SABELFELD A . Computer Security [M ] . Springer,Germany , 2006 .
AN J , DODIS Y , RABIN T . On the security of joint signature and encryption [A ] . Eurocrypt [C ] . 2002 . 83 - 107 .
BONEH D , SHEN E , WATERS B . Strongly unforgeable signatures based on computational Diffie-Hellman [A ] . PKC [C ] . 2006 . 229 - 240 .
SHAO Z , GAO Y . Practical verifiably encrypted signatures without random oracles [EB/OL ] . http://dx.doi.org/10.1016/j.ins.2014.03.092 http://dx.doi.org/10.1016/j.ins.2014.03.092 .
CHAUM D , ANTWERPEN H V . Undeniable signatures [A ] . CRYPTO [C ] . 1989 . 212 - 216 .
KUROSAWA K , NOJIMA R . Relation between verifiable random functions and convertible undeniable signatures,and new constructions [J ] . IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences , 2014 , 97 ( 1 ): 215 - 224 .
SCHULDT J C N , MATSUURA K . An efficient convertible undeniable signature scheme with delegatable verification [A ] . ISPEC [C ] . 2010 . 276 - 293 .
HUANG Q , WONG D S , SUSILO W . The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles [J ] . Information Sciences , 2013 , 228 : 222 - 238 .
KATA J , LINDELL Y . Introduction to Modern Cryptography:Principles and Protocols [M ] . CRC Press,Boca Raton , 2007 .
JEONG I R , KWON J O , HONG D , LEE D H . Constructing PEKS schemes secure against keyword guessing attacks is possible [J ] . Computer Communications , 2009 , 32 ( 2 ): 394 - 396 .
0
浏览量
0
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构