《山东大学学报(理学版)》 ›› 2023, Vol. 58 ›› Issue (9): 16-27.doi: 10.6040/j.issn.1671-9352.0.2022.154
Jiao LYU1(),Xi ZHANG1,Jing QIN1,2,*()
摘要:
针对可搜索代理重加密被用于实现密文数据交换共享, 但其不支持时间可控的访问授权, 也不能抵抗离线关键词猜测攻击的问题, 提出一个时间可控的指定测试者可搜索代理重加密方案, 该方案支持数据所有者将云端密文数据的搜索和解密权限在指定的时间范围内动态地授予数据使用者, 并且能够抵抗外部敌手的离线关键词猜测攻击。此外, 将该方案应用于不同医院之间共享患者电子病历场景, 基于联盟区块链设计一个具体的电子病历共享方案。
中图分类号:
1 |
SHAO Jun , CAO Zhenfu , LIANG Xiaohui , et al. Proxy re-encryption with keyword search[J]. Information Sciences, 2010, 180 (13): 2576- 2587.
doi: 10.1016/j.ins.2010.03.026 |
2 | BONEH D, CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]//Advances in Cryptology-EUROCRYPT. Berlin: Springer, 2004: 506-522. |
3 | BYUN J W, RHEE H S, PARK H A, et al. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data[C]//Secure Data Management, Third VLDB Workshop. Berlin: Springer, 2006: 75-83. |
4 | YAU W C, HENG S H, GOI B M. Off-line keyword guessing attacks on recent public key encryption with keyword search schemes[C]//International Conference on Autonomic & Trusted Computing. Berlin: Springer, 2008: 100-105. |
5 | BAEK J, SAFAVI-NAINI R, SUSILO W. Public key encryption with keyword search revisited[C]//International Conference on Computational Science and Its Applications. Berlin: Springer, 2008: 1249-1259. |
6 |
RHEE H S , PARK J H , SUSILO W , et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester[J]. Journal of Systems and Software, 2010, 83 (5): 763- 771.
doi: 10.1016/j.jss.2009.11.726 |
7 | ZHU Binrui , SUN Jiameng , QIN Jin , et al. A secure data sharing scheme with designated server[J]. Security and Communication Networks, 2019, 2019, 4268731. |
8 | LU Yang , WANG Gang , LI Jiguo , et al. Efficient designated server identity-based encryption with conjunctive keyword search[J]. Annals of Telecommunications, 2017, 72 (5/6): 359- 370. |
9 | WU Libing , ZHANG Yubo , MA Mimi , et al. Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things[J]. Annales des Telecommunications, 2019, 74 (7/8): 423- 434. |
10 | BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and atomic proxy cryptography[C]//Advances in Cryptology— EUROCRYPT 1998. Berlin: Springer, 1998: 127-144. |
11 |
FANG Liming , SUSILO W , GE Chunpeng , et al. Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search[J]. Theoretical Computer Science, 2012, 462, 39- 58.
doi: 10.1016/j.tcs.2012.08.017 |
12 |
WANG Xuan , HUANG Xinyi , YANG Xiaoyuan , et al. Further observation on proxy re-encryption with keyword search[J]. Journal of Systems and Software, 2012, 85 (3): 643- 654.
doi: 10.1016/j.jss.2011.09.035 |
13 | CHEN Zhenhua, LI Shundong, GUO Yimin, et al. A limited proxy re-encryption with keyword search for data access control in cloud computing[C]//Network and System Security. Cham: Springer, 2014: 82-95. |
14 |
CHEN Zhenhua , LI Shundong , HANG Qiong , et al. A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage[J]. Concurrency and Computation: Practice and Experience, 2016, 28 (10): 2858- 2876.
doi: 10.1002/cpe.3754 |
15 |
LIANG Kaitai , SUSILO W . Searchable attribute-based mechanism with efficient data sharing for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2015, 10 (9): 1981- 1992.
doi: 10.1109/TIFS.2015.2442215 |
16 |
CHEN Yanli , HU Yuanyuan , ZHU Minhui , et al. Attribute-based keyword search with proxy re-encryption in the cloud[J]. IEICE Transactions on Communications, 2018, E101.B (8): 1798- 1808.
doi: 10.1587/transcom.2017EBP3274 |
17 | 刘振华, 周佩琳, 段淑红. 支持关键词搜索的属性代理重加密方案[J]. 电子与信息学报, 2018, 40 (3): 683- 689. |
LIU Zhenhua , ZHOU Peilin , DUAN Shuhong . Attribute-based proxy re-encryption scheme with keyword search[J]. Journal of Electronics & Information Technology, 2018, 40 (3): 683- 689. | |
18 |
EMURA K , MIYAJI A , OMOTE K . A timed-release proxy re-encryption scheme[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011, E94.A (8): 1682- 1695.
doi: 10.1587/transfun.E94.A.1682 |
20 | LIANG K, HUANG Q, SCHLEGEL R, et al. A conditional proxy broadcast re-encryption scheme supporting timed-release[C]//Information Security Practice and Experience. Berlin: Springer, 2013: 132-146. |
21 |
LIU Qin , WANG Guojun , WU Jie . Time-based proxy re-encryption scheme for secure data sharing in a cloud environment[J]. Information Sciences, 2014, 258, 355- 370.
doi: 10.1016/j.ins.2012.09.034 |
22 |
YANG Yang , MA Maode . Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for E-health clouds[J]. IEEE Transactions on Information Forensics and Security, 2016, 11 (4): 746- 759.
doi: 10.1109/TIFS.2015.2509912 |
23 | BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[C]//Advances in Cryptology-CRYPTO 2001. Berlin: Springer, 2001: 213-229. |
24 | CANETTI R, HALEVI S, KATZ J. Chosen-ciphertext security from identity-based encryption[C]// Advances in Cryptology-EUROCRYPT 2004. Berlin: Springer, 2004: 207-222. |
25 | 张亮, 刘百祥, 张如意, 等. 区块链技术综述[J]. 计算机工程, 2019, 45 (5): 1- 12. |
ZHANG Liang , LIU Baixiang , ZHANG Ruyi , et al. Overview of blockchain technology[J]. Computer Engineering, 2019, 45 (5): 1- 12. | |
27 | 刘懿中, 刘建伟, 张宗洋, 等. 区块链共识机制研究综述[J]. 密码学报, 2019, 6 (4): 395- 432. |
LIU Yizhong , LIU Jianwei , ZHANG Zongyang , et al. Overview on blockchain consensus mechanisms[J]. Journal of Cryptologic Research, 2019, 6 (4): 395- 432. |
[1] | 郑京竺,杨海宁,苏烨,秦静. 一个盲公开可验证的矩阵乘积外包计算方案[J]. 《山东大学学报(理学版)》, 2019, 54(11): 1-11. |
[2] | 左黎明,陈兰兰,周庆. 一种基于证书的短签名方案[J]. 《山东大学学报(理学版)》, 2019, 54(1): 79-87. |
[3] | 李瑞峰,易铮阁,袁文勇,杨晓元,钮可. 基于ECDSA的云存储审计方案[J]. 《山东大学学报(理学版)》, 2022, 57(5): 57-65. |
|