带关键字搜索的代理重加密的研究及其实现
发布时间:2018-01-06 06:37
本文关键词:带关键字搜索的代理重加密的研究及其实现 出处:《山西大学》2014年硕士论文 论文类型:学位论文
更多相关文章: 代理重加密 双线性对 选择密文安全 带关键词搜索的代理重加密
【摘要】:随着云计算技术在全球范围内的迅猛发展,用户将大量复杂的数据存储到云平台上。尽管云存储给用户提供了很多便利,但是安全和隐私问题阻碍着云计算技术被广泛应用。为了提高云数据存储的安全性和保护用户的隐私,如何对加密的数据进行高效地搜索查询,即带关键字搜索的加密体制成为密码学的一个活跃研究课题。本文主要研究带关键字搜索的代理重加密((Proxy encryption with key word search)PRES)体制的安全模型和方案的构造。给出了指定检验者的具有关键字搜索性质的代理重加密(dPRES)的定义和安全模型,且构造出了一个在适应性合谋模型下可证明CCA-安全的dPRES方案,而且所构造方案在标准模型下可证明安全。该方案基于三个相关的困难问题:判定双线性Diffie-Hellman即(DBDH)假设;Hash Diffie-Hellman(HDH)假设;商判定双线性Diffie-Hellman即(QDBDH)假设。我们所构造的方案有以下三个优点:首先,当用户传递给指定检验者关键字的陷门时,不使用安全信道;第二,我们所构造的dPRES方案能够抵制关键字离线猜测攻击;第三,本方案不使用强不可伪造一次性签名方案,从而使得我们的方案更加有效。本文还对算法涉及的双线性映射运算用java语言编码实现,具体包括了:元素相等性判断,散列值计算,自身加操作计算,相加计算,曲线元素的实现,椭圆曲线两点线性映射对计算,大整数运算工具函数等具体的程序实现函数。为新构造的方案部署到实际的云计算、邮件服务系统等实际应用提供了方便。
[Abstract]:With the rapid development of cloud computing technology in the world, users will store a large number of complex data on the cloud platform, although cloud storage provides users with a lot of convenience. In order to improve the security of cloud data storage and protect the privacy of users, how to efficiently search and query encrypted data. The encryption system with keyword search has become an active research topic in cryptography. Proxy encryption with key word search. The definition and security model of proxy reencryption with keyword search property are given. And a dPRES scheme which can prove CCA-security under adaptive collusion model is constructed. Moreover, the proposed scheme can be proved to be safe under the standard model. The scheme is based on three related difficult problems: the bilinear Diffie-Hellman hypothesis; Hash Diffie-Hellman hypothesis; Quotient decision bilinear Diffie-Hellman (QDBDH) hypothesis. Our scheme has the following three advantages: first, when the user passes to the trapping door of the specified verifier keyword. Do not use secure channels; Secondly, the proposed dPRES scheme can resist the off-line keyword guessing attack. Third, this scheme does not use strong unforgeable one-time signature scheme, which makes our scheme more effective. The bilinear mapping algorithm involved in the algorithm is also implemented by java language coding. It includes: element equality judgment, hash value calculation, self-addition operation calculation, addition calculation, curve element realization, elliptic curve two-point linear mapping pair calculation. Large integer operation tool functions and other specific program implementation functions, for the new scheme to deploy to the actual cloud computing, mail service systems and other practical applications to provide convenience.
【学位授予单位】:山西大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN918.4
【参考文献】
相关期刊论文 前1条
1 陈康;郑纬民;;云计算:系统实例与研究现状[J];软件学报;2009年05期
,本文编号:1386737
本文链接:https://www.wllwen.com/kejilunwen/wltx/1386737.html