信息网络安全 ›› 2016, Vol. 16 ›› Issue (1): 1-5.doi: 10.3969/j.issn.1671-1122.2016.01.001

• •    下一篇

云计算里一种陷门无法识别的公钥搜索加密方案

赵洋, 包文意(), 熊虎, 秦志光   

  1. 电子科技大学信息与软件工程学院,四川成都 611731
  • 收稿日期:2015-09-30 出版日期:2016-01-01 发布日期:2020-05-13
  • 作者简介:

    作者简介: 赵洋(1973-),男,四川,副教授,博士,主要研究方向为网络安全;包文意(1990-),男,四川,硕士研究生,主要研究方向为云计算下搜索加密;熊虎(1982-),男,四川,副教授,博士,主要研究方向为网络安全;秦志光(1956-),男,四川,教授,博士,主要研究方向为网络安全。

  • 基金资助:
    基金项目: 国家自然科学基金[61472064,61370026];国家高技术研究发展计划(国家863计划)[2015AA016007];四川省科技支撑计划[2014GZ0109]

A Scheme of Public Encryption Keyword Search with Indistinguishable Trapdoor

Yang ZHAO, Wenyi BAO(), Hu XIONG, Zhiguang QIN   

  1. School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu Sichuan 611731, China
  • Received:2015-09-30 Online:2016-01-01 Published:2020-05-13

摘要:

传统公钥搜索加密方案使用户能够在加密的条件下通过关键字搜索数据,但是这种方式需要通过安全信道的保证,而且它提供的陷门被证明是不安全的。虽然陷门无法识别的方案已经被提出,但是却不能支持模糊关键字搜索,这大大减弱了系统的有效性。文章提出的方案满足三个要求,一是利用服务器的公钥来加密关键字和数据文件,外部攻击者没有服务器密钥就不能从中得到任何信息,也就可以不用安全信道来传输;二是提出了一种陷门无法识别性方案,这样外部攻击者不能用关键字猜测攻击来攻击陷门;三是方案不仅支持精确关键字搜索加密,当输入的关键字有任何拼写错误或格式不一致的情况时,该方案也支持搜索,从而大大提高了系统的可用性。文章证明了该方案是安全的,满足私人保护的性质。

关键词: 云计算, 公钥搜索加密, 模糊, 陷门

Abstract:

The traditional PEKS enables users to search data by using keyword in the condition of encryption. But this scheme needs the security channel and its trapdoor was proved to be unsafe. It greatly reduces the effectiveness of the system. In this paper, we propose a scheme to achieve three targets. First, we use the server’s public key to encrypt the keywords and data, outside attackers have no server’s private key, he will not obtain any information of the keyword cipher texts, and we can use public channel to transport PEKS. Secondly, we put forward an indistinguishable trapdoor scheme; outside attackers can’t use the keyword guessing attack against the trapdoor. Third, our scheme not only supports accurate keyword search encryption, it also supports the search when the keywords which are input have any spelling mistake or format inconsistent situations and has greatly improved the availability of the system. We will prove that our scheme is safe and meet the character of the private protection.

Key words: cloud computing, public encryptionsearch, fuzzy, trapdoor

中图分类号: