Identity-based Searchable Encryption Scheme for Encrypted Email System

被引:5
作者
Niu Shufen [1 ]
Xie Yaya [1 ]
Yang Pingping [1 ]
Wang Caifen [1 ]
Du Xiaoni [2 ]
机构
[1] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Peoples R China
[2] Northwest Normal Univ, Coll Comp Math & Stat, Lanzhou 730070, Peoples R China
基金
中国国家自然科学基金;
关键词
Encrypted emails system; Searchable encryption; Identity-based cryptosystem; PUBLIC-KEY ENCRYPTION;
D O I
10.11999/JEIT190578
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In encrypted email system, the public key searchable encryption technology can effectively solve the problem of searching for encrypted emails without decryption. In view of the complex key management problem of public key searchable encryption, an identity-based cryptosystem is introduced in the encrypted mail system. For the offline keyword guessing attack problem of searchable encryption, the method of encrypting keywords and generating trapdoors are adopted at the same time, and the server is designated to search for encrypted emails. At the same time, under the random oracle model, based on the decisional bilinear Diffie-Hellman assumption, the scheme is proved to satisfy the trapdoor and ciphertext indistinguishable security. The numerical experiments show that the scheme has higher computational efficiency than the existing schemes in the keyword trapdoor generation and keyword ciphertext test phase.
引用
收藏
页码:1803 / 1810
页数:8
相关论文
共 17 条
  • [1] [Anonymous], 2015, PAIRING BASED CRYPTO
  • [2] Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
  • [3] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [4] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [5] BOYEN X., 2008, 2 INT C PAIR BAS CRY, P258, DOI [10.1007/978-3-540-85538- 5_3., DOI 10.1007/978-3-540-85538-5_3.]
  • [6] Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
  • [7] The random oracle methodology, revisited
    Canetti, R
    Goldreich, O
    Halevi, S
    [J]. JOURNAL OF THE ACM, 2004, 51 (04) : 557 - 594
  • [8] When mentors feel supported: Relationships with mentoring functions and proteges' perceived organizational support
    Hu, Changya
    Wang, Sheng
    Yang, Chun-Chi
    Wu, Tsung-yu
    [J]. JOURNAL OF ORGANIZATIONAL BEHAVIOR, 2014, 35 (01) : 22 - 37
  • [9] An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
    Huang, Qiong
    Li, Hongbo
    [J]. INFORMATION SCIENCES, 2017, 403 : 1 - 14
  • [10] JIAO Di, 2019, NETWORK SECURITY TEC, P19, DOI [10.3969/j.issn.1009-6833.2019.02.014., DOI 10.3969/J.ISSN.1009-6833.2019.02.014]