...
首页> 外文期刊>Journal of internet services and applications >Security models for delegated keyword searching within encrypted contents
【24h】

Security models for delegated keyword searching within encrypted contents

机译:加密内容内委托关键字搜索的安全模型

获取原文
   

获取外文期刊封面封底 >>

       

摘要

Within modern internet infrastructure including networks that are ubiquitous, there is often a need for delegatable communication between nodes without compromising the confidentiality of information. In practice, this should be enforced while allowing some basic functionality for intermediate delegated nodes such as searching through encrypted content. This can be achieved using a Public key encryption with keyword search (PEKS) scheme, first proposed by Boneh et al., which enables to search publicly encrypted messages for keywords without revealing any information about the message. The issue of PEKS schemes being vulnerable to keyword guessing attacks (KGAs) was first shown by Byun et al., and two of the most recent PEKS schemes, i.e., due to Rhee et al. in (ASIACCS, pp 376–379, 2009; IEICE Electron Express 6(5):237–243, 2009) and (J Syst Softw 83(5):763–771, 2010), respectively, are designed with this security in mind. In this paper, we treat this KGA problem in detail and define new security models to capture KGAs against PEKS and designated PEKS schemes. These models are more security sufficient than the model considered by Rhee et al. (J Syst Softw 83(5):763–771, 2010); indeed the latter model does not afford sufficient adversarial capability in the sense that it is much weaker than the adversarial capability considered in the original IND-CKA model of Boneh et al. Our new models allow to capture KGAs on three recent designated PEKS schemes that cannot be captured in the weaker model of Rhee et al.
机译:在包括无处不在的网络在内的现代互联网基础设施中,经常需要在节点之间进行可委托的通信而不损害信息的机密性。实际上,应该在允许中间委派节点具有一些基本功能(例如搜索加密内容)的同时强制执行此操作。这可以使用Boneh等人首先提出的带有关键字搜索的公钥加密(PEKS)方案来实现,该方案可以在公共加密的消息中搜索关键字,而无需透露有关消息的任何信息。 Byun等人首先展示了PEKS方案容易受到关键字猜测攻击(KGA)攻击的问题,而最近的两种PEKS方案(即Rhee等人)则表明了这一问题。 (ASIACCS,376-379,2009; IEICE Electron Express 6(5):237-243,2009)和(J Syst Softw 83(5):763-771,2010)分别在这种安全性下设计心神。在本文中,我们将详细处理此KGA问题,并定义新的安全模型以捕获针对PEKS和指定PEKS方案的KGA。这些模型比Rhee等人考虑的模型具有更高的安全性。 (J Syst Softw 83(5):763-771,2010);实际上,从比Boneh等人的原始IND-CKA模型考虑的对抗能力弱得多的意义上讲,后一种模型没有提供足够的对抗能力。我们的新模型允许使用三个最近指定的PEKS方案捕获KGA,而在Rhee等人的较弱模型中则无法捕获。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号