高级检索
    郭丽峰 卢 波. 有效的带关键字搜索的代理重加密方案[J]. 计算机研究与发展, 2014, 51(6): 1221-1228.
    引用本文: 郭丽峰 卢 波. 有效的带关键字搜索的代理重加密方案[J]. 计算机研究与发展, 2014, 51(6): 1221-1228.
    Guo Lifeng and Lu Bo. Efficient Proxy Re-encryption with Keyword Search Scheme[J]. Journal of Computer Research and Development, 2014, 51(6): 1221-1228.
    Citation: Guo Lifeng and Lu Bo. Efficient Proxy Re-encryption with Keyword Search Scheme[J]. Journal of Computer Research and Development, 2014, 51(6): 1221-1228.

    有效的带关键字搜索的代理重加密方案

    Efficient Proxy Re-encryption with Keyword Search Scheme

    • 摘要: 2010年,Shao等人首次引入带关键字搜索的代理重加密(proxy re-encryption with keyword search, PRES)的概念,而且构造出1个在随机预言模型下可证明安全的双向PRES方案,同时该作者提出一个公开问题:怎么构造有效的在标准模型下可证明安全的PRES方案.针对这一公开问题,给出了指定检验者的具有关键字搜索性质的代理重加密(proxy re-encryption with keyword search with a designated tester, dPRES)的定义和安全模型,且构造出1个在适应性合谋模型下可证明具有抵制适应性选择关键字攻击和适应性选择密文攻击安全性的dPRES方案,而且所构造方案在标准模型下可证明安全.所构造的方案有以下3个优点:首先,当用户传递给指定检验者关键字的陷门时,不使用安全信道;第二,能够抵制关键字离线猜测攻击;第三,本方案不使用强不可伪造一次性签名方案,从而使得该方案更加有效.

       

      Abstract: The concept of proxy re-encryption with keyword search (PRES) was introduced by Shao et al. in 2010 and a bidirectional PRES scheme in the random oracle model was constructed. They addressed an open problem on how to design an efficient PRES scheme in the standard model. In this paper, we give the definition and security model of PRES with a designated tester (dPRES) and present an efficient dPRES scheme which is proven secure against chosen keyword attack and chosen ciphertext attack in the adaptive corruption model without resorting to random oracle. Our dPRES scheme obtains three advantages: firstly, when a user transmits the trapdoor of keyword to his designated tester, the user does not use a secure channel; secondly, the proposed dPRES scheme resists keyword off-line guessing attacks; thirdly, because Shao et al.'s PRES needs strongly unforgeable one-time signatures, their scheme was less efficient. We propose a dPRES scheme against an adaptive chosen keyword with no attached strongly-unforgeable one-time signature so that our dPRES scheme is more efficient. Proxy re-encryption with keyword search has practical applicatioins in such as distributed file system, email forword etc.

       

    /

    返回文章
    返回