We use cookies to improve your experience with our site.

云计算环境下支持授权可追责的身份基密文等值测试

Identity-Based Encryption with Equality Test Supporting Accountable Authorization in Cloud Computing

  • 摘要:
    研究背景 信息时代,越来越多的人为了便利将需要处理的信息存储在云上,由具备强大存储和计算能力的云来代替他们进行操作。而为了在这种情况下保护数据的隐私安全,人们选择将数据加密之后再发送给云。因此,如何基于加密数据由第三方执行各种计算操作逐渐成为了密码学界和工业界的研究热点。身份基密文等值测试(IBEET)可以在不解密密文的情况下检测两个使用相同或不同公钥加密的密文对应的明文是否相等,可以用在邮件分类等实际应用场景。IBEET方案中,数据拥有者可以为第三方产生授权密钥,第三方使用该授权密钥对数据拥有者的数据进行密文等值测试。然而,现有的IBEET方案中,由于基于身份的密码体制中固有的密钥托管问题,非完全可信的密钥产生中心(PKG)可以随时为任何用户产生授权密钥,甚至也可能会为了利益,将授权密钥非法分享、出售,而且数据拥有者没有办法对PKG的这种行为进行追责。
    目的 本文的研究目标是针对在IBEET中非完全可信的PKG非法共享用户授权密钥,而用户无法追责的问题,提出一种支持授权追责的IBEET密码机制。
    方法 针对非完全可信PKG可以非法分享授权密钥而用户无法追责的问题,本文将IBEET中传统的授权算法改为了需要由数据拥有者、PKG以及测试者交互运行产生授权密钥的授权协议。协议使用了零知识证明(ZKP)保障PKG无法获知测试者最终得到的授权密钥。即,测试者最终的授权密钥可能有指数多个,测试者使用ZKP最终获取了其中一个,但PKG无法得知测试者具体获得了哪一个。此外,针对附加的授权可追责功能,本文设计了三个新的安全模型来分别保障针对恶意授权者、PKG以及测试者的安全性。抗恶意授权者的安全性确保了盗版授权密钥只可能由PKG或关联的测试者产生。而抗恶意PKG和抗恶意测试者的安全性保障了PKG和测试者无法陷害彼此。基于Gentry身份基加密方案,我们给出了一个具体的可证明安全的IBEET-AA方案。
    结果 本文提出了一个新的密码原语——支持授权可追责的身份基密文等值测试(IBEET-AA)。IBEET-AA不仅支持在不解密的前提下对密文对应明文的相等性进行检测,而且还能够追踪有争议的授权密钥,找到该授权密钥的真正产生者,从而支持有效追责。本文基于Gentry身份基加密,提出了一个具体的IBEET-AA方案,并分别基于q-DABDHE困难问题证明了方案的OW-ID-CPA和IND-ID-CPA安全性,基于q-SDH困难问题证明了方案抗抗恶意授权者和测试者的安全性,基于DL困难问题证明了方案抗恶意PKG的安全性。
    结论 本文首次提出了现有IBEET-AA方案中存在的恶意授权密钥分享问题,该问题使得现实应用中可能会出现非完全可信的PKG可以随意生成并分享数据拥有者的授权密钥,并且该行为不会被追踪到。针对这一问题,本文提出了支持授权可追责的IBEET,即IBEET-AA。应用在实际场景中时,IBEET-AA能够支持对密文进行等式检测的同时保障数据拥有者的合法授权权益。如果出现PKG或者测试者非法分享授权密钥的情况,任何人可以向第三方仲裁机构提出申请,IBEET-AA支持对该盗版授权密钥背后生产者的追踪。IBEET-AA解决了IBEET在实际中应用时会出现的问题,符合实际应用需求。

     

    Abstract: Identity-based encryption with equality test (IBEET) is proposed to check whether the underlying messages of ciphertexts, even those encrypted with different public keys, are the same or not without decryption. Since people prefer to encrypt before outsourcing their data for privacy protection nowadays, the research of IBEET on cloud computing applications naturally attracts attention. However, we claim that the existing IBEET schemes suffer from the illegal trapdoor sharing problem caused by the inherited key escrow problem of the Identity-Based Encryption (IBE) mechanism. In traditional IBEET, the private key generator (PKG) with the master secret key generates trapdoors for all authorized cloud servers. Considering the reality in practice, the PKG is usually not fully trusted. In this case, the Private-Key Generator (PKG) may generate, share, or even sell any trapdoor without any risk of being caught, or not being held accountable, which may lead to serious consequences such as the illegal sharing of a gene bank’s trapdoors. In this paper, to relieve the illegal trapdoor sharing problem in IBEET, we present a new notion, called IBEET Supporting Accountable Authorization (IBEET-AA). In IBEET-AA, if there is a disputed trapdoor, the generator will be distinguished among the PKG and suspected testers by an additional tracing algorithm. For the additional tracing function, except for the traditional indistinguishability (IND) and one-way (OW) security models in IBEET, we define three more security models to protect the tracing security against dishonest authorizers, PKG, and testers, respectively. Based on Gentry’s IBE scheme, we instantiate IBEET-AA and give a specific construction along with a formalized security proof with random oracles.

     

/

返回文章
返回