學術產出-學位論文
文章檢視/開啟
書目匯出
-
題名 Deniable Searchable Encryption 之效率改良與研究
Efficient Deniable Search for Over-Encrypted Data in Cloud Storage作者 呂宜學
Lu, Yi-Hsueh貢獻者 曾一凡
Tseng, Yi-Fan
呂宜學
Lu, Yi-Hsueh關鍵詞 可否認加密
可搜索加密
雲端
Deniable encryption
Searchable encryption
Cloud storage日期 2024 上傳時間 4-九月-2024 15:00:45 (UTC+8) 摘要 在過去幾年中,雲端儲存服務有了顯著的擴展。為了增強隱私和安全性,儲存在雲端的資料必須經過加密。因此,對儲存在雲端的加密資料進行搜尋提出了相當大的挑戰。 我們提出了一種有效的雲端搜尋加密機制,並增加了可否認性的特徵。在存在潛在威脅的情況下,該系統利用可否認性來迷惑對手,與其他機制相比,提供更高的效率。這種方法確保了儲存在雲端的敏感資料的安全性,同時為使用者提供更高等級的隱私保護。
In the past few years, there has been a significant expansion of cloud storage services. To enhance privacy and security, data stored in the cloud must undergo encryption. Consequently, conducting searches on encrypted data stored in the cloud presents a considerable challenge. We propose an efficient cloud search encryption mechanism with the added feature of deniability. In the presence of potential threats, this system leverages deniability to confuse adversaries, offering greater efficiency compared to alternative mechanisms. This approach ensures the security of sensitive data stored in the cloud while providing users with an elevated level of privacy protection.參考文獻 [1] R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120–126, February 1978. [2] M. O. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical report, USA, 1979. [3] Shafi Goldwasser and Silvio Micali. Probabilistic encryption. Journal of Computer and System Sciences, 28(2):270–299, 1984. [4] T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469–472, July 1985. [5] Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. Public key encryption with keyword search. In Advances in Cryptology- EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23, pages 506–522. Springer, 2004. [6] Joonsang Baek, Reihaneh Safavi-Naini, and Willy Susilo. Public key encryption with keyword search revisited. In Computational Science and Its Applications–ICCSA 2008: International Conference, Perugia, Italy, June 30–July 3, 2008, Proceedings, Part I 8, pages 1249–1259. Springer, 2008. [7] Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, and Haixia Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings 25, pages 205–222. Springer, 2005. [8] Yi-Fan Tseng, Chun-I Fan, and Zi-Cheng Liu. Fast keyword search over encrypted data with short ciphertext in clouds. Journal of Information Security and Applications, 70:103320, 2022. [9] Jian Shen, Chen Wang, Anxi Wang, Sai Ji, and Yan Zhang. A searchable and verifiable data protection scheme for scholarly big data. IEEE Access, 2021. [10] Abir Awad, Adrian Matthews, Yuansong Qiao, and Brian Lee. Chaotic searchable encryption for mobile cloud storage. IEEE Access, 2020. [11] Chaoyang Li, Mianxiong Dong, Jian Li, Gang Xu, Xiu-Bo Chen, Wen Liu, and Kaoru Ota. Efficient medical big data management with keyword-searchable encryption in healthchain. IEEE Access, 2019. [12] Po-Wen Chi and Ming-Hung Wang. Deniable search of encrypted cloud-storage data. Journal of Information Security and Applications, 58:102806, 2021. [13] A. Guillevic. Comparing the pairing efficiency over composite-order and prime- order elliptic curves. In Applied Cryptography and Network Security, pages 357–372, 2013. [14] Amit Sahai and Brent Waters. Fuzzy identity-based encryption. In Ronald Cramer, editor, Advances in Cryptology – EUROCRYPT 2005, pages 457–473. Springer Berlin Heidelberg, 2005. [15] Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based en- cryption for fine-grained access control of encrypted data. Proceedings of the ACM Conference on Computer and Communications Security, pages 89–98, 2006. [16] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryp- tion. In 2007 IEEE Symposium on Security and Privacy (SP ’07), pages 321–334, May 2007. [17] Brent Waters. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Dario Catalano, Nelly Fazio, Rosario Gennaro, and Antonio Nicolosi, editors, Public Key Cryptography – PKC 2011, pages 53–70, Berlin, Heidelberg, 2011. Springer Berlin Heidelberg. [18] Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, and Dong Hoon Lee. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Workshop on Secure Data Management, pages 75–83. Springer, 2006. [19] Wei-Chuen Yau, Swee-Huay Heng, and Bok-Min Goi. Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In Autonomic and Trusted Computing: 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings 5, pages 100–105. Springer, 2008. [20] Hyun Sook Rhee, Willy Susilo, and Hyun-Jeong Kim. Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electronics Express, 6(5):237–243, 2009. [21] Dan Boneh and Matthew Franklin. Identity-based encryption from the Weil pairing. SIAM J. Comput., 32:586–615, 2003. [22] Dawn Xiaoding Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. IEEE, pages —, 2000. [23] He Heng, Zhang Ji, Li Peng, Jin Yu, and Zhang Tao. A lightweight secure conjunctive keyword search scheme in hybrid cloud. Journal of Cloud Computing, 2018. [24] Zhang Ke, Long Jiahuan, Wang Xiaofen, Dai Hong-Ning, Liang Kaitai, and Muham- mad Imran. Lightweight searchable encryption protocol for industrial internet of things. IEEE Access, 2020. [25] Zheng Yandong, Lu Rongxing, Shao Jun, and Yin Fan. Achieving practical symmetric searchable encryption with search pattern privacy over cloud. IEEE Access, 2018. [26] Wang Jiabei, Zhang Rui, Li Jianhao, and Xiao Yuting. Owner-enabled secure authorized keyword search over encrypted data with flexible metadata. IEEE Access, 2020. [27] Huang Qiong and Li Hongbo. An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Journal of Information Security and Applications, 2017. [28] Chan Koon-Ming, Heng Swee-Huay, and Yau Wei-Chuen. Trapdoor privacy in public key encryption with keyword search: A review. IEEE Access, 2022. [29] Jiang Changsong, Xu Chunxiang, Zhang Zhao, and Chen Kefei. Sr-peks: Subversion-resistant public key encryption with keyword search. IEEE Access, 2023. [30] Li Hongbo, Huang Qiong, Huang Jianye, and Susilo Willy. Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search. IEEE Access, 2022. [31] Zhou Xiaotong, He Debiao, Ning Jianting, and Luo Min. Single-server public-key authenticated encryption with keyword search and its application in iiot. IEEE Access, 2023. [32] Xu Peng, Susilo Willy, Wang Wei, Chen Tianyang, Wu Qianhong, Liang Kaitai, and Jin Hai. Rose: Robust searchable encryption with forward and backward security. IEEE Access, 2021. [33] Chi Po-Wen and Lei Chin-Laung. Audit-free cloud storage via deniable attribute-based encryption. IEEE, 2018. [34] Li Huige, Zhang Fangguo, and Fan Chun-I. Deniable searchable symmetric encryption. Journal of Cloud Computing, 2017. [35] Zhang Yulei, Wen Long, Zhang Yongjie, and Wang Caifen. Designated server certificateless deniably authenticated encryption with keyword search. IEEE Access, 2020. [36] Li Fagen, Zhong Di, and Takagi Tsuyoshi. Efficient deniably authenticated encryption and its application to e-mail. IEEE Access, 2016. [37] Zhang Kai, Jiang Zhe, Ning Jianting, and Huang Xinyi. Subversion-resistant and consistent attribute-based keyword search for secure cloud storage. IEEE Access, 2022. [38] Xu Peng, Jin Hai, Wu Qianhong, and Wang Wei. Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack.IEEE Transactions on Computers, 2017. [39] Fan Qing, He Debiao, Chen Jianhua, and Peng Cong. Isoga: An isogeny-based quantum-resist searchable encryption scheme against keyword guessing attacks. IEEE Access, 2022. 描述 碩士
國立政治大學
資訊科學系
111753148資料來源 http://thesis.lib.nccu.edu.tw/record/#G0111753148 資料類型 thesis dc.contributor.advisor 曾一凡 zh_TW dc.contributor.advisor Tseng, Yi-Fan en_US dc.contributor.author (作者) 呂宜學 zh_TW dc.contributor.author (作者) Lu, Yi-Hsueh en_US dc.creator (作者) 呂宜學 zh_TW dc.creator (作者) Lu, Yi-Hsueh en_US dc.date (日期) 2024 en_US dc.date.accessioned 4-九月-2024 15:00:45 (UTC+8) - dc.date.available 4-九月-2024 15:00:45 (UTC+8) - dc.date.issued (上傳時間) 4-九月-2024 15:00:45 (UTC+8) - dc.identifier (其他 識別碼) G0111753148 en_US dc.identifier.uri (URI) https://nccur.lib.nccu.edu.tw/handle/140.119/153384 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 資訊科學系 zh_TW dc.description (描述) 111753148 zh_TW dc.description.abstract (摘要) 在過去幾年中,雲端儲存服務有了顯著的擴展。為了增強隱私和安全性,儲存在雲端的資料必須經過加密。因此,對儲存在雲端的加密資料進行搜尋提出了相當大的挑戰。 我們提出了一種有效的雲端搜尋加密機制,並增加了可否認性的特徵。在存在潛在威脅的情況下,該系統利用可否認性來迷惑對手,與其他機制相比,提供更高的效率。這種方法確保了儲存在雲端的敏感資料的安全性,同時為使用者提供更高等級的隱私保護。 zh_TW dc.description.abstract (摘要) In the past few years, there has been a significant expansion of cloud storage services. To enhance privacy and security, data stored in the cloud must undergo encryption. Consequently, conducting searches on encrypted data stored in the cloud presents a considerable challenge. We propose an efficient cloud search encryption mechanism with the added feature of deniability. In the presence of potential threats, this system leverages deniability to confuse adversaries, offering greater efficiency compared to alternative mechanisms. This approach ensures the security of sensitive data stored in the cloud while providing users with an elevated level of privacy protection. en_US dc.description.tableofcontents Chinese Abstract . . . . . . . . . . . . . . . . . . . i English Abstract . . . . . . . . . . . . . . . . . . . ii Contents . . . . . . . . . . . . . . . . . . . . . . iii 1 Introduction . . . . . . . . . . . . . . . . . . . 1 1.1 Organization . . . . . . . . . . . . . . . . . . 3 2 Preliminaries . . . . . . . . . . . . . . . . . . 5 2.1 Notations . . . . . . . . . . . . . . . . . . . 5 2.2 Bilinear Pairing . . . . . . . . . . . . . . . . 5 2.3 Searchable Encryption . . . . . . . . . . . . . 6 2.4 Identity-Based Encryption . . . . . . . . . . . 7 2.5 Deniable Searchable Encryption . . . . . . . . . 9 2.5.1 Security for DSE . . . . . . . . . . . . . . 10 3 The Proposed Scheme . . . . . . . . . . . . . . . 13 4 Security Proof . . . . . . . . . . . . . . . . . 16 5 Instantiation . . . . . . . . . . . . . . . . . . 19 6 Conclusion . . . . . . .. . . . . . . . . . . . . 22 7 Future work . . . . . . . . . . . . . . . . . . . 23 Reference . . . .. . . . . . . . . . . . . . . . . 24 zh_TW dc.format.extent 408195 bytes - dc.format.mimetype application/pdf - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0111753148 en_US dc.subject (關鍵詞) 可否認加密 zh_TW dc.subject (關鍵詞) 可搜索加密 zh_TW dc.subject (關鍵詞) 雲端 zh_TW dc.subject (關鍵詞) Deniable encryption en_US dc.subject (關鍵詞) Searchable encryption en_US dc.subject (關鍵詞) Cloud storage en_US dc.title (題名) Deniable Searchable Encryption 之效率改良與研究 zh_TW dc.title (題名) Efficient Deniable Search for Over-Encrypted Data in Cloud Storage en_US dc.type (資料類型) thesis en_US dc.relation.reference (參考文獻) [1] R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120–126, February 1978. [2] M. O. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical report, USA, 1979. [3] Shafi Goldwasser and Silvio Micali. Probabilistic encryption. Journal of Computer and System Sciences, 28(2):270–299, 1984. [4] T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469–472, July 1985. [5] Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. Public key encryption with keyword search. In Advances in Cryptology- EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23, pages 506–522. Springer, 2004. [6] Joonsang Baek, Reihaneh Safavi-Naini, and Willy Susilo. Public key encryption with keyword search revisited. In Computational Science and Its Applications–ICCSA 2008: International Conference, Perugia, Italy, June 30–July 3, 2008, Proceedings, Part I 8, pages 1249–1259. Springer, 2008. [7] Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, and Haixia Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings 25, pages 205–222. Springer, 2005. [8] Yi-Fan Tseng, Chun-I Fan, and Zi-Cheng Liu. Fast keyword search over encrypted data with short ciphertext in clouds. Journal of Information Security and Applications, 70:103320, 2022. [9] Jian Shen, Chen Wang, Anxi Wang, Sai Ji, and Yan Zhang. A searchable and verifiable data protection scheme for scholarly big data. IEEE Access, 2021. [10] Abir Awad, Adrian Matthews, Yuansong Qiao, and Brian Lee. Chaotic searchable encryption for mobile cloud storage. IEEE Access, 2020. [11] Chaoyang Li, Mianxiong Dong, Jian Li, Gang Xu, Xiu-Bo Chen, Wen Liu, and Kaoru Ota. Efficient medical big data management with keyword-searchable encryption in healthchain. IEEE Access, 2019. [12] Po-Wen Chi and Ming-Hung Wang. Deniable search of encrypted cloud-storage data. Journal of Information Security and Applications, 58:102806, 2021. [13] A. Guillevic. Comparing the pairing efficiency over composite-order and prime- order elliptic curves. In Applied Cryptography and Network Security, pages 357–372, 2013. [14] Amit Sahai and Brent Waters. Fuzzy identity-based encryption. In Ronald Cramer, editor, Advances in Cryptology – EUROCRYPT 2005, pages 457–473. Springer Berlin Heidelberg, 2005. [15] Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based en- cryption for fine-grained access control of encrypted data. Proceedings of the ACM Conference on Computer and Communications Security, pages 89–98, 2006. [16] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryp- tion. In 2007 IEEE Symposium on Security and Privacy (SP ’07), pages 321–334, May 2007. [17] Brent Waters. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Dario Catalano, Nelly Fazio, Rosario Gennaro, and Antonio Nicolosi, editors, Public Key Cryptography – PKC 2011, pages 53–70, Berlin, Heidelberg, 2011. Springer Berlin Heidelberg. [18] Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, and Dong Hoon Lee. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Workshop on Secure Data Management, pages 75–83. Springer, 2006. [19] Wei-Chuen Yau, Swee-Huay Heng, and Bok-Min Goi. Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In Autonomic and Trusted Computing: 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings 5, pages 100–105. Springer, 2008. [20] Hyun Sook Rhee, Willy Susilo, and Hyun-Jeong Kim. Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electronics Express, 6(5):237–243, 2009. [21] Dan Boneh and Matthew Franklin. Identity-based encryption from the Weil pairing. SIAM J. Comput., 32:586–615, 2003. [22] Dawn Xiaoding Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. IEEE, pages —, 2000. [23] He Heng, Zhang Ji, Li Peng, Jin Yu, and Zhang Tao. A lightweight secure conjunctive keyword search scheme in hybrid cloud. Journal of Cloud Computing, 2018. [24] Zhang Ke, Long Jiahuan, Wang Xiaofen, Dai Hong-Ning, Liang Kaitai, and Muham- mad Imran. Lightweight searchable encryption protocol for industrial internet of things. IEEE Access, 2020. [25] Zheng Yandong, Lu Rongxing, Shao Jun, and Yin Fan. Achieving practical symmetric searchable encryption with search pattern privacy over cloud. IEEE Access, 2018. [26] Wang Jiabei, Zhang Rui, Li Jianhao, and Xiao Yuting. Owner-enabled secure authorized keyword search over encrypted data with flexible metadata. IEEE Access, 2020. [27] Huang Qiong and Li Hongbo. An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Journal of Information Security and Applications, 2017. [28] Chan Koon-Ming, Heng Swee-Huay, and Yau Wei-Chuen. Trapdoor privacy in public key encryption with keyword search: A review. IEEE Access, 2022. [29] Jiang Changsong, Xu Chunxiang, Zhang Zhao, and Chen Kefei. Sr-peks: Subversion-resistant public key encryption with keyword search. IEEE Access, 2023. [30] Li Hongbo, Huang Qiong, Huang Jianye, and Susilo Willy. Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search. IEEE Access, 2022. [31] Zhou Xiaotong, He Debiao, Ning Jianting, and Luo Min. Single-server public-key authenticated encryption with keyword search and its application in iiot. IEEE Access, 2023. [32] Xu Peng, Susilo Willy, Wang Wei, Chen Tianyang, Wu Qianhong, Liang Kaitai, and Jin Hai. Rose: Robust searchable encryption with forward and backward security. IEEE Access, 2021. [33] Chi Po-Wen and Lei Chin-Laung. Audit-free cloud storage via deniable attribute-based encryption. IEEE, 2018. [34] Li Huige, Zhang Fangguo, and Fan Chun-I. Deniable searchable symmetric encryption. Journal of Cloud Computing, 2017. [35] Zhang Yulei, Wen Long, Zhang Yongjie, and Wang Caifen. Designated server certificateless deniably authenticated encryption with keyword search. IEEE Access, 2020. [36] Li Fagen, Zhong Di, and Takagi Tsuyoshi. Efficient deniably authenticated encryption and its application to e-mail. IEEE Access, 2016. [37] Zhang Kai, Jiang Zhe, Ning Jianting, and Huang Xinyi. Subversion-resistant and consistent attribute-based keyword search for secure cloud storage. IEEE Access, 2022. [38] Xu Peng, Jin Hai, Wu Qianhong, and Wang Wei. Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack.IEEE Transactions on Computers, 2017. [39] Fan Qing, He Debiao, Chen Jianhua, and Peng Cong. Isoga: An isogeny-based quantum-resist searchable encryption scheme against keyword guessing attacks. IEEE Access, 2022. zh_TW