
浏览全部资源
扫码关注微信
1. 陕西师范大学 计算机科学学院,陕西 西安 710062
2. 湖北工业大学 计算机学院,湖北 武汉 430068
Online First:2014-11,
Published:30 November 2014
移动端阅览
Zhi-yi SHAO, Bo YANG, Zhen-qiang WU, et al. Searchable public key encryption with designated verifier secure against the server[J]. Journal on Communications, 2014, 35(Z2): 106-111.
Zhi-yi SHAO, Bo YANG, Zhen-qiang WU, et al. Searchable public key encryption with designated verifier secure against the server[J]. Journal on Communications, 2014, 35(Z2): 106-111. DOI: 10.3969/j.issn.1000-436x.2014.z2.014.
摘 要:在指定验证者的可搜索公钥加密(dPEKS)中,提出 IND-KGA-SERVER 安全模型,形式化描述针对服务器的安全。基于IND-KGA安全的dPEKS、数字证书授权中心CA、以及强不可伪造和不可否认的签名,在攻击者是服务器的情况下构造出抗 KG(keyword guessing)攻击的 dPEKS 方案。方案是从 IND-KGA 安全到IND-KGA-SERVER安全的编译器。
In designated verifier searchable public key encryption (dPEKS) schemes
the IND-KGA-SERVER security was proposed to formalize the security against the server.Based on the IND-KGA secure dPEKS
the CA (certificate authority)
and the strongly unforgeable and undeniable signature
the solution was proposed to show how to construct dPEKS schemes which are secure against KG (keyword guessing) attacks when the attacker is the server.The solution is a bootstrap from IND-KGA secure to IND-KGA-SERVER secure.
BONEH D , CRESCENZO G D , OSTROVSKY R , PERSIANO G . Public key encryption with keyword search [A ] . EUROCYPT [C ] . 2004 . 506 - 522 .
BAEK J,SAFAVI-NAINI R , SUSILO W . Public key encryption with keyword search revisited [A ] . ACIS [C ] . 2006 . 1249 - 1259 .
BYUN J W,RHEE H S , PARK H A , LEE D H . Off-line keyword guessing attacks on recent keyword search schemes over encrypted data [A ] . SDM [C ] . 2006 . 75 - 83 .
RHEE H S , SUSILO W , KIM H J . Secure searchable public key encryption scheme against keyword guessing attacks [J ] . IEICE Electronics Express , 2009 , 6 ( 5 ): 237 - 243 .
RHEE H S , PARK J H , SUSILO W , LEE D H . Trapdoor security in a searchable public-key encryption scheme with a designated tester [J ] . Journal of System and Software , 2010 , 83 ( 5 ): 763 - 771 .
FANG L , SUSILO W , GE C , WANG J . Public key encryption with keyword search secure against keyword guessing attacks without random oracle [J ] . Information Sciences , 2013 , 238 : 221 - 241 .
LI J , WANG Q , WANG C , et al . Fuzzy keyword search over encrypted data in cloud computing [A ] . INFOCOM [C ] . 2010 . 1 - 5 .
WANG C , CAO N , LI J , et al . Secure ranked keyword search over encrypted cloud data [A ] . ICDCS [C ] . 2010 . 253 - 262 .
CAO N , WANG C , LI M , et al . Privacy-preserving multi-keyword ranked search over encrypted cloud data [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 1 ): 222 - 233 .
WANG C , CAO N , REN K , et al . Enabling secure and efficient ranked keyword search over outsourced cloud data [J ] . IEEE Transactions on Parallel and Distributed Systems , 2012 , 23 ( 8 ): 1467 - 1479 .
LI M , YU S , CAO N , et al . Authorized private keyword search over encrypted data in cloud computing [A ] . ICDCS [C ] . 2011 . 383 - 392 .
BONEH D , RAGHUNATHAN A , SEGEV G . Function-private identity-based encryption:Hiding the function in functional encryption [A ] . CRYPTO [C ] . Springer Berlin Heidelberg , 2013 . 461 - 478 .
BONEH D , RAGHUNATHAN A , SEGEV G . Function-private subspace-membership encryption and its applications [A ] . ASIACRYPT [C ] . Springer Berlin Heidelberg , 2013 . 255 - 275 .
LI J , WANG Q , WANG C , et al . Fuzzy keyword search over encrypted data in cloud computing [A ] . INFOCOM [C ] . 2010 . 1 - 5 .
WANG C , CAO N , LI J , et al . Secure ranked keyword search over encrypted cloud data [A ] . ICDCS [C ] . 2010 . 253 - 262 .
CAO N , WANG C , LI M , et al . Privacy-preserving multi-keyword ranked search over encrypted cloud data [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 1 ): 222 - 233 .
WANG C , CAO N , REN K , et al . Enabling secure and efficient ranked keyword search over outsourced cloud data [J ] . IEEE Transactions on Parallel and Distributed Systems , 2012 , 23 ( 8 ): 1467 - 1479 .
LI M , YU S , CAO N , et al . Authorized private keyword search over encrypted data in cloud computing [A ] . ICDCS [C ] . 2011 . 383 - 392 .
BONEH D , RAGHUNATHAN A , SEGEV G . Function-private identity-based encryption:hiding the function in functional encryption [A ] . CRYPTO [C ] . Springer Berlin Heidelberg , 2013 . 461 - 478 .
BONEH D , RAGHUNATHAN A , SEGEV G . Function-private subspace-membership encryption and its applications [A ] . ASIACRYPT [C ] . Springer Berlin Heidelberg , 2013 . 255 - 275 .
HAIDAR A N , ABDALLAH A E . Formal modeling of PKI based authentication [J ] . Electronic Notes in Theoretical Computer Science , 2009 , 235 : 55 - 70 .
GOLLMANN D , MEIER J , SABELFELD A . Computer Security [M ] . Springer,Germany , 2006 .
AN J , DODIS Y , RABIN T . On the security of joint signature and encryption [A ] . Eurocrypt [C ] . 2002 . 83 - 107 .
BONEH D , SHEN E , WATERS B . Strongly unforgeable signatures based on computational Diffie-Hellman [A ] . PKC [C ] . 2006 . 229 - 240 .
SHAO Z , GAO Y . Practical verifiably encrypted signatures without random oracles [EB/OL ] . http://dx.doi.org/10.1016/j.ins.2014.03.092 http://dx.doi.org/10.1016/j.ins.2014.03.092 .
CHAUM D , ANTWERPEN H V . Undeniable signatures [A ] . CRYPTO [C ] . 1989 . 212 - 216 .
KUROSAWA K , NOJIMA R . Relation between verifiable random functions and convertible undeniable signatures,and new constructions [J ] . IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences , 2014 , 97 ( 1 ): 215 - 224 .
SCHULDT J C N , MATSUURA K . An efficient convertible undeniable signature scheme with delegatable verification [A ] . ISPEC [C ] . 2010 . 276 - 293 .
HUANG Q , WONG D S , SUSILO W . The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles [J ] . Information Sciences , 2013 , 228 : 222 - 238 .
KATA J , LINDELL Y . Introduction to Modern Cryptography:Principles and Protocols [M ] . CRC Press,Boca Raton , 2007 .
JEONG I R , KWON J O , HONG D , LEE D H . Constructing PEKS schemes secure against keyword guessing attacks is possible [J ] . Computer Communications , 2009 , 32 ( 2 ): 394 - 396 .
0
Views
397
下载量
0
CSCD
Publicity Resources
Related Articles
Related Author
Related Institution
京公网安备11010802024621