谢亚亚1,,,
杨平平1,
王彩芬1,
杜小妮2
1.西北师范大学计算机科学与工程学院 兰州 730070
2.西北师范大学数学与统计学院 兰州 730070
基金项目:国家自然科学基金(61562077, 61662069, 61662071, 61772022),西北师范大学青年教师科研提升计划(NWNU-LKQN-13-12)
详细信息
作者简介:牛淑芬:女,1976年生,博士,副教授,研究方向为云计算和大数据网络的隐私保护
谢亚亚:女,1996 年生,硕士,研究方向为网络与信息安全
杨平平:女,1995 年生,硕士,研究方向为网络与信息安全
王彩芬:女,1963 年生,博士,教授,研究方向为网络安全
杜小妮:女,1972 年生,博士,教授,研究方向为流密码
通讯作者:谢亚亚 2418606113@qq.com
中图分类号:TN918.7计量
文章访问数:1880
HTML全文浏览量:758
PDF下载量:101
被引次数:0
出版历程
收稿日期:2019-07-30
修回日期:2020-03-21
网络出版日期:2020-04-15
刊出日期:2020-07-23
Identity-based Searchable Encryption Scheme for Encrypted Email System
Shufen NIU1,Yaya XIE1,,,
Pingping YANG1,
Caifen WANG1,
Xiaoni DU2
1. College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China
2. College of Computer Mathematics and Statistics, Northwest Normal University, Lanzhou 730070, China
Funds:The National Natural Science Foundation of China (61562077, 61662069, 61662071, 61772022), The Young Teacher’s Scientific Research Ability Promotion Program of Northwest Normal University (NWNU-LKQN-13-12)
摘要
摘要:在加密邮件系统中,公钥可搜索加密技术可以有效地解决在不解密的情况下搜索加密邮件的问题。针对公钥可搜索加密复杂的密钥管理问题,该文在加密邮件系统中引入了基于身份的密码体制。针对可搜索加密的离线关键字猜测攻击问题,该文采用了在加密关键字和生成陷门的同时进行认证,并且指定服务器去搜索加密电子邮件的方法。同时,在随机预言机模型下,基于判定性双线性Diffie-Hellman假设,证明方案满足陷门和密文不可区分性安全。数值实验结果表明,在陷门生成和关键字密文检测阶段,该方案与现有方案相比在计算效率上较高。
关键词:加密邮件系统/
可搜索加密/
基于身份的密码体制
Abstract:In encrypted email system, the public key searchable encryption technology can effectively solve the problem of searching for encrypted emails without decryption. In view of the complex key management problem of public key searchable encryption, an identity-based cryptosystem is introduced in the encrypted mail system. For the offline keyword guessing attack problem of searchable encryption, the method of encrypting keywords and generating trapdoors are adopted at the same time, and the server is designated to search for encrypted emails. At the same time, under the random oracle model, based on the decisional bilinear Diffie-Hellman assumption, the scheme is proved to satisfy the trapdoor and ciphertext indistinguishable security. The numerical experiments show that the scheme has higher computational efficiency than the existing schemes in the keyword trapdoor generation and keyword ciphertext test phase.
Key words:Encrypted emails system/
Searchable encryption/
Identity-based cryptosystem
PDF全文下载地址:
https://jeit.ac.cn/article/exportPdf?id=6a86149e-5e40-43d0-866b-79b9997aa116