高级检索
    吴黎兵, 张宇波, 何德彪. 云计算中基于身份的双服务器密文等值判定协议[J]. 计算机研究与发展, 2017, 54(10): 2232-2243. DOI: 10.7544/issn1000-1239.2017.20170446
    引用本文: 吴黎兵, 张宇波, 何德彪. 云计算中基于身份的双服务器密文等值判定协议[J]. 计算机研究与发展, 2017, 54(10): 2232-2243. DOI: 10.7544/issn1000-1239.2017.20170446
    Wu Libing, Zhang Yubo, He Debiao. Dual Server Identity-Based Encryption with Equality Test for Cloud Computing[J]. Journal of Computer Research and Development, 2017, 54(10): 2232-2243. DOI: 10.7544/issn1000-1239.2017.20170446
    Citation: Wu Libing, Zhang Yubo, He Debiao. Dual Server Identity-Based Encryption with Equality Test for Cloud Computing[J]. Journal of Computer Research and Development, 2017, 54(10): 2232-2243. DOI: 10.7544/issn1000-1239.2017.20170446

    云计算中基于身份的双服务器密文等值判定协议

    Dual Server Identity-Based Encryption with Equality Test for Cloud Computing

    • 摘要: 随着云存储的快速普及以及公众隐私保护意识的提升,越来越多的隐私数据被加密存储在云上.因而,如何对密文数据特别是采用公钥密码体制加密的数据进行高效检索成为了一个重要研究内容.带密文等值判定的公钥加密协议是其中一种检索方法,它可以在不泄漏明文内容的情况下判定2段密文对应的明文是否相同.最近,一系列带密文等值判定的公钥加密协议被提出.然而,在这些协议中,只用了一个服务器来执行等值判定操作,不能抵抗恶意服务器的内部关键字猜测攻击.为了解决这个问题,首次提出了基于双服务器的带密文等值判定的公钥加密协议,并在随机预言机模型下证明了它的安全性.同时,也对设计的协议进行了性能分析,分析表明:该协议适合资源受限的移动设备.

       

      Abstract: With the rapid development of cloud storage and the increasing awareness of privacy, more and more private data are encrypted before outsourcing to the cloud. Thus, how to search in encrypted data has been a new research item in the scope of searchable encryption. One of the solutions is public key encryption with equality test (PKEET). It can check whether the plaintexts of two ciphertexts encrypted under different public keys are the same, without leakage any information about the plaintexts. Recently, many public key encryption schemes with equality test have been proposed. However, in these schemes, there were only one server be used to perform the equality test, which means that they could not withstand the inner keywords guessing attack. To solve this problem, we propose the first dual server identity-based encryption scheme with equality test (DS-IBEET). And we prove the security under random oracle model. In addition, performance evaluation shows that our scheme is suitable for resource-limited mobile devices.

       

    /

    返回文章
    返回