政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/149646
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 110387/141319 (78%)
造访人次 : 46966790      在线人数 : 604
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/149646


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/149646


    题名: 基於晶格密碼學之可濾式相等性驗證公開金鑰加密
    Secure Public Key Encryption With Filtered Equality Test Over Lattices
    作者: 簡宗祐
    Chien, Tsung-You
    贡献者: 曾一凡
    Tseng, Yi-Fan
    簡宗祐
    Chien, Tsung-You
    关键词: 可濾式相等性驗證
    語意安全
    授權
    晶格密碼學
    Filtered equality test
    Semantic security
    Authorization
    Lattice base encryption
    日期: 2023
    上传时间: 2024-02-01 11:40:37 (UTC+8)
    摘要: 隨著電腦科技的急速發展,對安全通信的需求也相對增加,使得加密技術在現代生活中扮演了關鍵角色。相等性驗證的公開金鑰加密 (PKE-ET),使人們在不揭露明文之下也能對加密後的密文進行比對。人們可以透過PKE-ET的特性在一群被加密的文章或資料中,透過比對而找出他們認為有用的訊息。然而傳統的PKE-ET即使滿足了單一方向的加密,卻沒辦法阻止惡意攻擊者透過相等性驗證而突破語意安全。假設攻擊者知道某個特定的密文對應於兩個可能的明文之一,可以對密文進行相等性驗證而獲得哪個明文被加密的資訊,即使攻擊者不能確切地解密密文,但他仍然可以獲得加密訊息的某些有用資訊。為了應對這些問題,引入了可濾式的相等性驗證(FET)架構,提供了一種高級的相等性驗證方法。透過引入第三方授權機關,使攻擊者只能搜尋其擁有的陷門進行測試。同時,量子電腦對傳統加密系統構成了重大威脅,因為它們有潛力更快地解決離散對數問題。值得注意的是,到2022年,美國國家標準技術研究所(NIST)將晶格密碼學作為對抗量子威脅的有力防禦方法。本篇論文延伸Li等人的具有相等性驗證的晶格公開金鑰加密及Huang等人的可濾式相等性驗證公開金鑰加密,介紹了一種基於格子加密的新型PKE-FET方案,確保了對抗量子威脅的安全性。
    With the meteoric advancement in computer technology, there has been a corresponding surge in the demand for secure communication. Consequently, encryption technology has become an indispensable component of contemporary life. Public Key Encryption with Equality Testing (PKE-ET) empowers users to juxtapose encrypted ciphertexts without divulging the underlying plaintext. Leveraging PKE-ET's capabilities, individuals can sift through an array of encrypted content to pinpoint pertinent information. Yet, the Achilles' heel of traditional PKE-ET lies in its inability to thwart malicious entities from compromising semantic security via equality verification. Hypothetically, if an adversary discerns that a given ciphertext correlates to one of two potential plaintexts, they could harness equality testing to ascertain the encrypted plaintext. While such an attacker might be stymied in their efforts to directly decrypt the ciphertext, they can nonetheless glean valuable insights from the encrypted data. The Filterable Equality Testing (FET) framework was conceived to counteract these vulnerabilities, offering a refined equality verification technique. By enlisting a third-party authorization mechanism, it's ensured that adversaries are restricted to searches using only the trapdoors in their arsenal. In parallel, the emergence of quantum computers casts a looming shadow over conventional encryption methodologies, given their innate prowess in swiftly cracking the discrete logarithm dilemma. Significantly, as of 2022, the US National Institute of Standards and Technology (NIST) recognized lattice cryptography as a bulwark against these quantum menaces. This paper augments the lattice-based public key encryption methodologies pioneered by Li et al., and the filterable encryption approach championed by Huang et al., unveiling a novel PKE-FET strategy anchored in lattice encryption that fortifies defenses against quantum threats.
    參考文獻: [ABB10] S. Agrawal, D. Boneh, and X. Boyen, “Efficient lattice (h)ibe in the standard model,” in Advances in Cryptology – EUROCRYPT 2010, H. Gilbert, Ed., Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 553–572 (cit. p. 13).

    [CXT+21] Y.-C. Chen, X. Xie, H.-Y. Tsao, and R. Tso, “Public key encryption with filtered equality test revisited,” Designs, Codes and Cryptography, vol. 89, no. 10, pp. 2357–2372, 2021 (cit. pp. 2, 3, 21).

    [HTC17] K. Huang, R. Tso, and Y.-C. Chen, “Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption,” Journal of Computer and System Sciences, vol. 89, pp. 400–409, 2017 (cit. pp. 1–3, 8–10, 21).

    [HTC+15] K. Huang, R. Tso, Y.-C. Chen, et al., “Pke-aet: Public key encryption with authorized equality test,” The Computer Journal, vol. 58, no. 10, pp. 2686–2697, 2015 (cit. pp. 1–3, 23).

    [LLS+20] H. T. Lee, S. Ling, J. H. Seo, H. Wang, and T.-Y. Youn, “Public key encryption with equality test in the standard model,” Information Sciences, vol. 516, pp. 89–108, 2020 (cit. p. 1).

    [LB21] Q. Li and X. Boyen, “Efficient public-key encryption with equality test from lattices,” Theoretical Computer Science, vol. 892, pp. 85–107, 2021 (cit. pp. 2, 3, 6, 7, 10, 17–19).

    [MHZ+14] S. Ma, Q. Huang, M. Zhang, and B. Yang, “Efficient public key encryption with equality test supporting flexible authorization,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 458–470, 2014 (cit. p. 1).

    [MP12] D. Micciancio and C. Peikert, “Trapdoors for lattices: Simpler, tighter, faster, smaller,” in Advances in Cryptology – EUROCRYPT 2012, D. Pointcheval and T. Johansson, Eds., Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 700–718 (cit. p. 5).

    [MW19] Y. Ming and E. Wang, “Identity-based encryption with filtered equality test for smart city applications,” Sensors, vol. 19, no. 14, 2019 (cit. pp. 2, 3, 21).

    [Tan12] Q. Tang, “Public key encryption schemes supporting equality test with authorisation of different granularity,” International journal of applied cryptography, vol. 2, no. 4, pp. 304–321, 2012 (cit. p. 1).

    [YTH+10] G. Yang, C. H. Tan, Q. Huang, and D. S. Wong, “Probabilistic public key encryption with equality test,” in Topics in Cryptology-CT-RSA 2010: The Cryptographers'Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings, Springer, 2010, pp. 119–131 (cit. pp. 1, 2).
    描述: 碩士
    國立政治大學
    資訊科學系
    110753141
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0110753141
    数据类型: thesis
    显示于类别:[資訊科學系] 學位論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    314101.pdf410KbAdobe PDF0检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈