首页 | 官方网站   微博 | 高级检索  
     

基于身份的具有否认认证的关键字可搜索加密方案
引用本文:曹素珍,丁宾宾,丁晓晖,窦凤鸽,王彩芬.基于身份的具有否认认证的关键字可搜索加密方案[J].电子与信息学报,2022,44(3):1086-1092.
作者姓名:曹素珍  丁宾宾  丁晓晖  窦凤鸽  王彩芬
作者单位:1.西北师范大学 兰州 7300002.深圳技术大学 深圳 518118
摘    要:云存储技术的发展实现了资源共享,为用户节省了数据管理开销.可搜索加密技术,既保护用户隐私又支持密文检索,方便了用户查找云端密文数据.现有的公钥关键字可搜索加密方案虽然支持身份认证,但未实现否认的属性.为了更好地保护发送者的身份隐私,该文将否认认证与公钥关键字可搜索加密技术相结合,提出一种基于身份的具有否认认证的关键字可...

关 键 词:身份隐私  否认认证  可搜索加密
收稿时间:2021-02-18

Identity-based Public Key Keyword Searchable Encryption Scheme with Denial Authentication
CAO Suzhen,DING Binbin,DING Xiaohui,DOU Fengge,WANG Caifen.Identity-based Public Key Keyword Searchable Encryption Scheme with Denial Authentication[J].Journal of Electronics & Information Technology,2022,44(3):1086-1092.
Authors:CAO Suzhen  DING Binbin  DING Xiaohui  DOU Fengge  WANG Caifen
Affiliation:1.Northwest Normal University, Lanzhou 730000, China2.Shenzhen Technology University, Shenzhen 518118, China
Abstract:The development of cloud storage technology achieves resource sharing, which reduces users data management overhead. Searchable encryption technology protects users privacy and supports ciphertext retrieval, making it easy for users to find encrypted data in the cloud. Although existing public key searchable encryption schemes support authentication, the denial property is not implemented. To protect better the senders identity privacy, an Identity-based Public Key keyword Searchable Encryption scheme with Denial Authentication (IDAPKSE) is proposed. In the proposed scheme, the sender uploads the ciphertext and has the ability to deny that he or she uploaded the ciphertext to the cloud server. At the same time, the receiver can confirm the origin of the ciphertext, however, even with the cooperation of a third party, the receiver can not prove the facts in his/her possession to the third party. Under the random oracle model, based on the Bilinear Diffie-Hellman(BDH) and Decisional Bilinear Diffie-Hellman(DBDH) assumptions, the proposed scheme satisfies unforgeability of the ciphertexts, and indistinguishability of ciphertexts and trapdoors.
Keywords:
本文献已被 万方数据 等数据库收录!
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号