Font Size: a A A

Research On Leak-resistant Public Key Authenticated Encryption With Keyword Search Scheme

Posted on:2022-06-25Degree:MasterType:Thesis
Country:ChinaCandidate:N B YangFull Text:PDF
GTID:2518306491464994Subject:Computational Mathematics
Abstract/Summary:PDF Full Text Request
Cloud computing and 5G communication technology rapid development and wide application in our country.Government,hospital,schools and other institutions and individuals choose to financial records E-mail address and personal health records and other data stored in the cloud server share with others or oneself in any place to use.This,however,bring convenience to people at the same time also brought some security privacy issues.Cloud server is not completely trusted,because they are always unintentionally to steal sensitive information.Thus users can't ensure the data security of the storage in the cloud.In order to solve the problem of data storage security.Researchers have proposed in encrypted data stored on cloud server solution,its characteristic is all you need to download to decrypt the ciphertext to local access to data.However,when there is a large amount of data,it needs to consume a lot of computing overhead.Thus scholars have proposed Public Key Encryption with Keyword Search(PEKS),which can improve the efficiency of ciphertext Search and reduce the computing costs.Many scholars have proposed various kinds of PEKS,such as Public Key Authentication Encryption with Keyword Search(PAEKS),Fuzzy keyword public key searchable encryption and verifiable public key searchable encryption,but they have some problems of insufficient security and low computational efficiency.Therefore,our main contributions are as follows:1.It is found that most of the proposed PEKS schemes are easy to leak the keyword information.Secondly,most of the schemes are based on bilinear pairings with low computing efficiency.For this,we put forward pairing free public key authentication encryption with keyword search schemes.In this scheme,both the data sharing party and the receiving party are trusted users,and the key negotiation mechanism is introduced into the keyword encryption and search trap gate to resist the attacker's keyword guessing attack to prevent the disclosure of keyword information.The program in a single key encryption and the trapdoor efficiency achieves 0.5 to 1.5 milliseconds.2.We analyzes that most of the PEKS and PAEKS schemes can only satisfy one-to-one interaction.Therefore,a multi-recipient public key authentication encryption with keyword search scheme without pairing is proposed,and the encryption and decryption algorithms of data are added to make the scheme more perfect.Compared with the first PAEKS scheme proposed by Huang et al.,the computing cost of keyword ciphertext and the computing cost generated by trapdoor are reduced by 79.5% and 76.7% respectively in terms of efficiency.
Keywords/Search Tags:Cloud Storage, Leak-resistant, Public key Encryption with Keyword Search, Keywords guessing attacks, Without pairing, Multi-Recipient
PDF Full Text Request
Related items