Public-Key Authenticated Encryption with Keyword Search Without Pairings
-
摘要: 随着云计算与5G通信的快速发展与广泛应用,云移动用户数迅速增长.云数据的隐私性保护越来越受大众关注.早期提出的带关键字搜索的公钥加密方案(public key encryption scheme with keyword search, PEKS)和公共通道带关键字搜索的公钥加密方案(secure channel free PEKS, SCF-PEKS)允许系统中的任何用户向服务器发送加密文件供接收者检索,起到一定的隐私保护作用.但之后Rhee等人的工作中发现方案仍存在关键词隐私性安全不足.同时,多数的公钥可搜索加密方案是基于双线性对下计算的.在运算能力有限的设备上应用,其计算效率会有所限制.针对以上问题,提出一种非双线性对运算的公共通道的公钥认证可搜索加密方案(non bilinear pairs secure channel free public key authentication encryption with keyword search scheme, NBP-SCF-PAEKS),该方案的计算效率相对于双线性对方案高,并且在关键词检索过程具有访问控制功能.在不使用随机预言机模型下,通过Game-Hopping方法证明方案满足适应性选择关键词攻击下多关键词密文不可区分性以及适应性选择关键词攻击的陷门不可区分性,使得方案模型抵抗在线模式下外部攻击者关键词猜测攻击和离线模式下内部攻击者关键词猜测攻击.根据方案设计进行仿真实验,结果表明:该方案相对于其他方案是高效安全的.Abstract: With the rapid development and wide application of cloud computing and 5G communication, the number of cloud mobile users has increased rapidly. The privacy protection of cloud data is getting more and more attention. Public key encryption scheme with keyword search (PEKS) and secure channel free public key encryption with keyword search (SCF-PEKS) allow any user in the system to send encrypted files to the server for retrieval by the receiver, which plays a certain role of privacy protection. However, Rhee et al. found that the scheme may result in loss of privacy security of keywords in their work. Meanwhile, many of public-key searchable encryption schemes are calculated based on bilinear pairings, and their computational efficiency is limited on battery-limited devices. To address these issue, we propose a non bilinear pairs secure channel free public key authentication encryption with keyword search scheme (NBP-SCF-PAEKS). The scheme has higher computational efficiency than the bilinear pair scheme, and has access control function in keyword retrieval process. Without random oracle model, we prove that the scheme can resist the online keyword guessing attack and the offline keyword guessing attack, by ensuring the multi-keyword ciphertext indistinguishability under adaptive chosen keyword attack and the keyword trapdoor indistinguishability under adaptive chosen keyword attack through game-hopping method. Compared with other schemes, the simulation results show that the scheme is efficient and secure.
-
-
期刊类型引用(8)
1. 胡鑫明,蒋大海,雷妮,巩芫芳,宁少楠,冯武彤. 一种EtherCAT主站存取网络结构设计. 现代电子技术. 2024(03): 91-96 . 百度学术
2. 王永峰,康晋菊,胡啸,张彪,封成玉. 基于EtherCAT总线的Modbus-RTU主站网关设计. 网络安全与数据治理. 2024(06): 42-46+52 . 百度学术
3. 侯欢,李翔龙,谢希杨. 面向EtherCAT总线的伺服系统误差及插补算法误差辨识方法. 机床与液压. 2024(13): 15-21 . 百度学术
4. 孔伟,陈为. 基于ET1100的EtherCAT测控从站设计与实现. 电子设计工程. 2023(05): 184-188 . 百度学术
5. 贺海涛. 面向智慧矿山的设备通信协议设计. 计算机技术与发展. 2023(10): 73-79 . 百度学术
6. 倪雄军,李健俊,李钰靓,文德明,姜学峰,张益南,李威,张晓东. 卷接设备IPC控制系统网络安全监测模型的构建. 烟草科技. 2022(01): 99-106 . 百度学术
7. 尹震宇,许鹏,徐福龙. 基于FPGA SoC的EtherCAT协议栈设计与实现. 小型微型计算机系统. 2022(08): 1751-1755 . 百度学术
8. 龚翔,冯涛,杜谨泽. 基于CPN的安全协议形式化建模及安全分析方法. 通信学报. 2021(09): 240-253 . 百度学术
其他类型引用(16)
计量
- 文章访问数: 1240
- HTML全文浏览量: 7
- PDF下载量: 299
- 被引次数: 24