Publications-Theses

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 適用於加密資料且具有陷門隱私的模式匹配機制
Pattern Matching over Encrypted Data with Trapdoor Privacy
作者 陳文宜
Chen, Wen-Yi
貢獻者 曾一凡
Tseng, Yi-Fan
陳文宜
Chen, Wen-Yi
關鍵詞 可搜索加密
模式匹配
陷門隱私
Searchable Encryption
Pattern Matching
Trapdoor Privacy
日期 2024
上傳時間 4-Sep-2024 15:00:20 (UTC+8)
摘要 模式匹配至今已應用於許多領域,例如基因和醫學數據分析。在明文資料上執行模式匹配是一項簡單的工作,但當我們必須保護資料和模式的隱私時,將會是一項挑戰。現有的解決方案是透過可搜尋加密來建構對加密資料的模式匹配。在本文中,我們參考了具有關鍵字搜尋的公開金鑰認證加密,並將機制設計為在加密資料上做模式匹配的認證版本,同時達到短密文的特性。我們的工作是確保陷門不會洩露用戶搜尋的關鍵字訊息,並對加密資料進行有效的模式匹配。
Pattern matching has been applied in many fields, such as genomic and medical data analysis. Performing pattern matching on plaintext data is a simple work, but it is challenge when we have to preserve the privacy of analyzed data and patterns. Existing solution is that we can construct pattern matching over encrypted data by searchable encryption. In this thesis, we refer to the concept of Public-key Authenticated Encryption with Keyword Search (PAEKS), and design the mechanism as an authenticated version of pattern matching over encrypted data, while achieving short ciphertext. Our work is to ensure trapdoor will not leak the keyword information searched by the user, and do pattern matching over encrypted data effectively.
參考文獻 [ABC+05] Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, and Haixia Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings 25, pages 205–222. Springer, 2005. [BCC20] Anis Bkakria, Nora Cuppens, and Frédéric Cuppens. Privacy-preserving pattern matching on encrypted data. In Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II 26, pages 191–220. Springer, 2020. [BDCOP04] Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. Public key encryption with keyword search. In Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23, pages 506–522. Springer, 2004. [Boy08] Xavier Boyen. The uber-assumption family: A unified complexity framework for bilinear groups. In International Conference on Pairing-Based Cryptography, pages 39–56. Springer, 2008. [BRPL06] Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, and Dong Hoon Lee. Offline keyword guessing attacks on recent keyword search schemes over encrypted data. In Workshop on secure data management, pages 75–83. Springer, 2006. [BW07] Dan Boneh and Brent Waters. Conjunctive, subset, and range queries on encrypted data. In Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings 4, pages 535–554. Springer, 2007. [CS15] Melissa Chase and Emily Shen. Substring-searchable symmetric encryption. Proceedings on Privacy Enhancing Technologies, 2015. [DFOS18] Nicolas Desmoulins, Pierre-Alain Fouque, Cristina Onete, and Olivier Sanders. Pattern matching on encrypted streams. In Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part I 24, pages 121–148. Springer, 2018. [GSW04] Philippe Golle, Jessica Staddon, and Brent Waters. Secure conjunctive keyword search over encrypted data. In Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings 2, pages 31–45. Springer, 2004. [HL07] Yong Ho Hwang and Pil Joong Lee. Public key encryption with conjunctive keyword search and its extension to a multi-user system. In International conference on pairing-based cryptography, pages 2–22. Springer, 2007. [HL17] Qiong Huang and Hongbo Li. An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Information Sciences, 403:1–14, 2017. [KSC+21] Jongkil Kim, Willy Susilo, Yang-Wai Chow, Joonsang Baek, and Intae Kim. Pattern matching over encrypted data with a short ciphertext. In Information Security Applications: 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11–13, 2021, Revised Selected Papers 22, pages 132–143. Springer, 2021. [LHHS22] Hongbo Li, Qiong Huang, Jianye Huang, and Willy Susilo. Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search. IEEE Transactions on Information Forensics and Security, 18:396–410, 2022. [LLAN14] Kristin Lauter, Adriana López-Alt, and Michael Naehrig. Private computation on encrypted genomic data. In International Conference on Cryptology and Information Security in Latin America, pages 3–27. Springer, 2014. [NE19] Mahnaz Noroozi and Ziba Eslami. Public key authenticated encryption with keyword search: revisited. IET Information Security, 13(4):336–342, 2019. [PKL04] Dong Jin Park, Kihyun Kim, and Pil Joong Lee. Public key encryption with conjunctive field keyword search. In International Workshop on Information Security Applications, pages 73–86. Springer, 2004. [PL21] Xiangyu Pan and Fagen Li. Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability. Journal of Systems Architecture, 115:102075, 2021. [PSE20] Nasrollah Pakniat, Danial Shiraly, and Ziba Eslami. Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial iot. Journal of Information Security and Applications, 53:102525, 2020. [QCH+20] Baodong Qin, Yu Chen, Qiong Huang, Ximeng Liu, and Dong Zheng. Public-key authenticated encryption with keyword search revisited: Security model and constructions. Information Sciences, 516:515–528, 2020. [RPL12] Hyun Sook Rhee, Jong Hwan Park, and Dong Hoon Lee. Generic construction of designated tester public-key encryption with keyword search. Information Sciences, 205:93–109, 2012. [RSK09] Hyun Sook Rhee, Willy Susilo, and Hyun-Jeong Kim. Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electronics Express, 6(5):237–243, 2009. [WZM+19] Libing Wu, Yubo Zhang, Mimi Ma, Neeraj Kumar, and Debiao He. Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical internet of things. Annals of Telecommunications, 74:423–434, 2019. [YHG08] Wei-Chuen Yau, Swee-Huay Heng, and Bok-Min Goi. Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In Autonomic and Trusted Computing: 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings 5, pages 100–105. Springer, 2008. [ZZ11] Bo Zhang and Fangguo Zhang. An efficient public key encryption with conjunctive-subset keywords search. Journal of Network and Computer Applications, 34(1):262–267, 2011.
描述 碩士
國立政治大學
資訊科學系
111753144
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0111753144
資料類型 thesis
dc.contributor.advisor 曾一凡zh_TW
dc.contributor.advisor Tseng, Yi-Fanen_US
dc.contributor.author (Authors) 陳文宜zh_TW
dc.contributor.author (Authors) Chen, Wen-Yien_US
dc.creator (作者) 陳文宜zh_TW
dc.creator (作者) Chen, Wen-Yien_US
dc.date (日期) 2024en_US
dc.date.accessioned 4-Sep-2024 15:00:20 (UTC+8)-
dc.date.available 4-Sep-2024 15:00:20 (UTC+8)-
dc.date.issued (上傳時間) 4-Sep-2024 15:00:20 (UTC+8)-
dc.identifier (Other Identifiers) G0111753144en_US
dc.identifier.uri (URI) https://nccur.lib.nccu.edu.tw/handle/140.119/153382-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊科學系zh_TW
dc.description (描述) 111753144zh_TW
dc.description.abstract (摘要) 模式匹配至今已應用於許多領域,例如基因和醫學數據分析。在明文資料上執行模式匹配是一項簡單的工作,但當我們必須保護資料和模式的隱私時,將會是一項挑戰。現有的解決方案是透過可搜尋加密來建構對加密資料的模式匹配。在本文中,我們參考了具有關鍵字搜尋的公開金鑰認證加密,並將機制設計為在加密資料上做模式匹配的認證版本,同時達到短密文的特性。我們的工作是確保陷門不會洩露用戶搜尋的關鍵字訊息,並對加密資料進行有效的模式匹配。zh_TW
dc.description.abstract (摘要) Pattern matching has been applied in many fields, such as genomic and medical data analysis. Performing pattern matching on plaintext data is a simple work, but it is challenge when we have to preserve the privacy of analyzed data and patterns. Existing solution is that we can construct pattern matching over encrypted data by searchable encryption. In this thesis, we refer to the concept of Public-key Authenticated Encryption with Keyword Search (PAEKS), and design the mechanism as an authenticated version of pattern matching over encrypted data, while achieving short ciphertext. Our work is to ensure trapdoor will not leak the keyword information searched by the user, and do pattern matching over encrypted data effectively.en_US
dc.description.tableofcontents Chapter 1 Introduction 1 1.1 Technical Overview 2 1.2 Contribution 3 1.3 Related Work 3 Chapter 2 Preliminaries 5 2.1 Bilinear Pairing 5 2.2 Complexity Assumptions 5 2.3 Algorithm Definitions 6 2.4 System Model 6 2.5 Security Model 7 Chapter 3 Proposed Scheme 10 Chapter 4 Security Proof 12 4.1 Proof of ciphertext indistinguishability 12 4.2 Proof of trapdoor indistinguishability 14 Chapter 5 Comparison 17 Chapter 6 Conclusion 18 Reference 19zh_TW
dc.format.extent 591814 bytes-
dc.format.mimetype application/pdf-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0111753144en_US
dc.subject (關鍵詞) 可搜索加密zh_TW
dc.subject (關鍵詞) 模式匹配zh_TW
dc.subject (關鍵詞) 陷門隱私zh_TW
dc.subject (關鍵詞) Searchable Encryptionen_US
dc.subject (關鍵詞) Pattern Matchingen_US
dc.subject (關鍵詞) Trapdoor Privacyen_US
dc.title (題名) 適用於加密資料且具有陷門隱私的模式匹配機制zh_TW
dc.title (題名) Pattern Matching over Encrypted Data with Trapdoor Privacyen_US
dc.type (資料類型) thesisen_US
dc.relation.reference (參考文獻) [ABC+05] Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, and Haixia Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings 25, pages 205–222. Springer, 2005. [BCC20] Anis Bkakria, Nora Cuppens, and Frédéric Cuppens. Privacy-preserving pattern matching on encrypted data. In Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II 26, pages 191–220. Springer, 2020. [BDCOP04] Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. Public key encryption with keyword search. In Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23, pages 506–522. Springer, 2004. [Boy08] Xavier Boyen. The uber-assumption family: A unified complexity framework for bilinear groups. In International Conference on Pairing-Based Cryptography, pages 39–56. Springer, 2008. [BRPL06] Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, and Dong Hoon Lee. Offline keyword guessing attacks on recent keyword search schemes over encrypted data. In Workshop on secure data management, pages 75–83. Springer, 2006. [BW07] Dan Boneh and Brent Waters. Conjunctive, subset, and range queries on encrypted data. In Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings 4, pages 535–554. Springer, 2007. [CS15] Melissa Chase and Emily Shen. Substring-searchable symmetric encryption. Proceedings on Privacy Enhancing Technologies, 2015. [DFOS18] Nicolas Desmoulins, Pierre-Alain Fouque, Cristina Onete, and Olivier Sanders. Pattern matching on encrypted streams. In Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part I 24, pages 121–148. Springer, 2018. [GSW04] Philippe Golle, Jessica Staddon, and Brent Waters. Secure conjunctive keyword search over encrypted data. In Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings 2, pages 31–45. Springer, 2004. [HL07] Yong Ho Hwang and Pil Joong Lee. Public key encryption with conjunctive keyword search and its extension to a multi-user system. In International conference on pairing-based cryptography, pages 2–22. Springer, 2007. [HL17] Qiong Huang and Hongbo Li. An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Information Sciences, 403:1–14, 2017. [KSC+21] Jongkil Kim, Willy Susilo, Yang-Wai Chow, Joonsang Baek, and Intae Kim. Pattern matching over encrypted data with a short ciphertext. In Information Security Applications: 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11–13, 2021, Revised Selected Papers 22, pages 132–143. Springer, 2021. [LHHS22] Hongbo Li, Qiong Huang, Jianye Huang, and Willy Susilo. Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search. IEEE Transactions on Information Forensics and Security, 18:396–410, 2022. [LLAN14] Kristin Lauter, Adriana López-Alt, and Michael Naehrig. Private computation on encrypted genomic data. In International Conference on Cryptology and Information Security in Latin America, pages 3–27. Springer, 2014. [NE19] Mahnaz Noroozi and Ziba Eslami. Public key authenticated encryption with keyword search: revisited. IET Information Security, 13(4):336–342, 2019. [PKL04] Dong Jin Park, Kihyun Kim, and Pil Joong Lee. Public key encryption with conjunctive field keyword search. In International Workshop on Information Security Applications, pages 73–86. Springer, 2004. [PL21] Xiangyu Pan and Fagen Li. Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability. Journal of Systems Architecture, 115:102075, 2021. [PSE20] Nasrollah Pakniat, Danial Shiraly, and Ziba Eslami. Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial iot. Journal of Information Security and Applications, 53:102525, 2020. [QCH+20] Baodong Qin, Yu Chen, Qiong Huang, Ximeng Liu, and Dong Zheng. Public-key authenticated encryption with keyword search revisited: Security model and constructions. Information Sciences, 516:515–528, 2020. [RPL12] Hyun Sook Rhee, Jong Hwan Park, and Dong Hoon Lee. Generic construction of designated tester public-key encryption with keyword search. Information Sciences, 205:93–109, 2012. [RSK09] Hyun Sook Rhee, Willy Susilo, and Hyun-Jeong Kim. Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electronics Express, 6(5):237–243, 2009. [WZM+19] Libing Wu, Yubo Zhang, Mimi Ma, Neeraj Kumar, and Debiao He. Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical internet of things. Annals of Telecommunications, 74:423–434, 2019. [YHG08] Wei-Chuen Yau, Swee-Huay Heng, and Bok-Min Goi. Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In Autonomic and Trusted Computing: 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings 5, pages 100–105. Springer, 2008. [ZZ11] Bo Zhang and Fangguo Zhang. An efficient public key encryption with conjunctive-subset keywords search. Journal of Network and Computer Applications, 34(1):262–267, 2011.zh_TW