期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Public-Key Function-Private Inner-Product Predicate Encryption from Pairings
1
作者 WAN Ming WANG Geng GU Da-Wu 《密码学报(中英文)》 北大核心 2025年第1期227-246,共20页
This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals noth... This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals nothing about the predicate f,as long as f is drawn from an evasive distribution with sufficient entropy.The proposed scheme extends the group-based public-key function-private predicate encryption(FP-PE)for“small superset predicates”proposed by Bartusek et al.(Asiacrypt 19),to the setting of inner-product predicates.This is the first construction of public-key FP-PE with enhanced function privacy security beyond the equality predicates,which is previously proposed by Boneh et al.(CRYPTO 13).The proposed construction relies on bilinear groups,and the security is proved in the generic bilinear group model. 展开更多
关键词 predicate encryption function privacy inner product generic group model
在线阅读 下载PDF
Predicate encryption against master-key tampering attacks
2
作者 Yuejun Liu Rui Zhang Yongbin Zhou 《Cybersecurity》 CSCD 2019年第1期329-348,共20页
Many real world attacks often target the implementation of a cryptographic scheme,rather than the algorithm itself,and a system designer has to consider new models that can capture these attacks.For example,if the key... Many real world attacks often target the implementation of a cryptographic scheme,rather than the algorithm itself,and a system designer has to consider new models that can capture these attacks.For example,if the key can be tampered by physical attacks on the device,the security of the scheme becomes totally unclear.In this work,we investigate predicate encryption(PE),a powerful encryption primitive,in the setting of tampering attacks.First,we show that many existing frameworks to construct PE are vulnerable to tampering attacks.Then we present a new security notion to capture such attacks.Finally,we take Attrapadung’s framework in Eurocrypt’14 as an example to show how to"compile"these frameworks to tampering resilient ones.Moreover,our method is compatible with the original pair encoding schemes without introducing any redundancy. 展开更多
关键词 Tampering resilience predicate encryption Pair encoding Dual system encryption
原文传递
Predicate encryption against master-key tampering attacks
3
作者 Yuejun Liu Rui Zhang Yongbin Zhou 《Cybersecurity》 2018年第1期632-651,共20页
Many real world attacks often target the implementation of a cryptographic scheme,rather than the algorithm itself,and a system designer has to consider new models that can capture these attacks.For example,if the key... Many real world attacks often target the implementation of a cryptographic scheme,rather than the algorithm itself,and a system designer has to consider new models that can capture these attacks.For example,if the key can be tampered by physical attacks on the device,the security of the scheme becomes totally unclear.In this work,we investigate predicate encryption(PE),a powerful encryption primitive,in the setting of tampering attacks.First,we show that many existing frameworks to construct PE are vulnerable to tampering attacks.Then we present a new security notion to capture such attacks.Finally,we take Attrapadung’s framework in Eurocrypt’14 as an example to show how to“compile"these frameworks to tampering resilient ones.Moreover,our method is compatible with the original pair encoding schemes without introducing any redundancy. 展开更多
关键词 Tampering resilience predicate encryption Pair encoding Dual system encryption
原文传递
Less leakage and more precise:Efficient wildcard keyword search over encrypted data
4
作者 Yunling Wang Chenyang Gao +2 位作者 Yifei Huang Lei Fu Yong Yu 《High-Confidence Computing》 2025年第3期70-77,共8页
Wildcard searchable encryption allows the server to efficiently perform wildcard-based keyword searches over encrypted data while maintaining data privacy.A promising solution to achieve wildcard SSE is to extract the... Wildcard searchable encryption allows the server to efficiently perform wildcard-based keyword searches over encrypted data while maintaining data privacy.A promising solution to achieve wildcard SSE is to extract the characteristics of the queried keyword and check the existence based on a membership test structure.However,existing schemes have false positives of character order,that is,the server cannot identify the order between the first and the last wildcard character.Besides,the schemes also suffer from characteristic matching pattern leakage due to the one-by-one membership testing.In this paper,we present the first efficient wildcard SSE scheme to eliminate the false positives of character order and characteristic matching pattern leakage.To this end,we design a novel characteristic extraction technique that enables the client to exact the characteristics of the queried keyword maintaining the order between the first and the last wildcard character.Then,we utilize the primitive of Symmetric Subset Predicate Encryption,which supports checking if one set is a subset of another in one shot to reduce the characteristic matching pattern leakage.Finally,by performing a formal security analysis and implementing the scheme on a real-world database,we demonstrate that the desired security properties are achieved with high performance. 展开更多
关键词 Symmetric searchable encryption Wildcard keyword search Symmetric subset predicate encryption
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部