CN104038349A - Effective and verifiable public key searching encryption method based on KP-ABE - Google Patents
Effective and verifiable public key searching encryption method based on KP-ABE Download PDFInfo
- Publication number
- CN104038349A CN104038349A CN201410316818.4A CN201410316818A CN104038349A CN 104038349 A CN104038349 A CN 104038349A CN 201410316818 A CN201410316818 A CN 201410316818A CN 104038349 A CN104038349 A CN 104038349A
- Authority
- CN
- China
- Prior art keywords
- search
- cloud server
- data
- user
- enc
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
本发明公开了一种基于KP-ABE的有效可验证的公钥可搜索加密方法,该方法包括可信权威中心、数据拥有者、云服务器、数据用户;可信权威中心为所有云用户生成证书;数据拥有者外包数据文件和关键词给云服务器;云服务器是提供存储服务并在收到用户发送的搜索请求后执行搜索操作;数据用户生成搜索口令发送给云服务器寻找目标文件。本发明首先为数据拥有者和云服务器生成了公私钥对,在发送密文关键词和搜索口令时,首先使用云服务器的公钥对其再加密,这样有效地防止了外部攻击者的离线猜测攻击行为,提高了信息和数据的安全性,而且,复杂度降低,大大减少了用户的运算量,效率得到了很大提高。
The invention discloses an effective and verifiable public key searchable encryption method based on KP-ABE. The method includes a trusted authority center, a data owner, a cloud server, and a data user; the trusted authority center generates certificates for all cloud users ; The data owner outsources data files and keywords to the cloud server; the cloud server provides storage services and executes the search operation after receiving the search request sent by the user; the data user generates a search password and sends it to the cloud server to find the target file. The present invention firstly generates a public-private key pair for the data owner and the cloud server, and when sending the cipher text keywords and search passwords, first uses the public key of the cloud server to re-encrypt them, thus effectively preventing offline guessing by external attackers The attack behavior improves the security of information and data, and the complexity is reduced, which greatly reduces the user's calculation load and greatly improves the efficiency.
Description
技术领域technical field
本发明属于数据加密领域,尤其涉及一种基于KP-ABE的有效可验证的公钥可搜索加密方法。The invention belongs to the field of data encryption, in particular to an effective and verifiable public key searchable encryption method based on KP-ABE.
背景技术Background technique
公钥可搜索加密是一个非常具有吸引力的密码学原语,它实现了基于密文的信息检索,特别适用于云计算环境。公钥可搜索加密方案(PEKS)使得用户凭借关键词在不泄露任何信息的情况下搜索加密数据。PEKS的概念是由Boneh等提出的,Baek等人提出了一种去除安全通道的PEKS,使得方案更加实用。在此之后,Hu等人和Zhao等人提出了可抵抗外部攻击者离线关键词猜测的新方案。简而言之,PEKS的概念是提供一种用户凭借关键词去搜索加密数据且不向包括服务器在内的其他方泄露任何信息的机制。随着云计算的快速发展,使得用户可以以低廉的价格使用云服务器的大量存储和计算的能力。这使得PEKS变得更加流行。尽管目前现存的PEKS可以安全有效地完成搜索操作,然而大多数方案却没有对服务器返回的搜索结果进行验证,同时也没有对搜索用户进行限制。在一个半诚实但可信的服务器的模型下,服务器可能只执行部分搜索操作或者只返回部分搜索结果。针对这一问题,Zheng等人首次针对此问题提出了一个新的密码学原语——基于属性加密的可验证的关键词搜索方案。该方案允许数据拥有者去控制搜索操作。访问控制策略的合法用户可以把费时的搜索操作外包给云服务器并且可以有效地验证服务器是否真实地执行了搜索操作。这意味着,具备满足数据拥有者的访问策略的条件的用户才可以进行搜索云服务器上的加密数据。此外,用户还可以对服务器返回的搜索结果进行正确性和完整性的验证。该方案运用模指数,属性加密,布隆过滤器,数字签名和基于属性加密的关键词搜索构造而成。然而该方案在正确性验证的时候所做的操作和云服务器的做法相同,然而对于用户自己来说,这需要很大的计算量。另外,该方案疏忽了离线猜测攻击。因为关键词密文、搜索口令和算法很容易被敌手获取,这样敌手便可执行搜索操作,从而打破关键词密文的不可区分性。Public-key searchable encryption is a very attractive cryptographic primitive, which implements information retrieval based on ciphertext, and is especially suitable for cloud computing environments. Public Key Searchable Encryption Scheme (PEKS) enables users to search encrypted data by keywords without revealing any information. The concept of PEKS was proposed by Boneh et al. Baek et al. proposed a PEKS that removes the security channel, making the solution more practical. Following this, Hu et al. and Zhao et al. proposed new schemes that are resistant to offline keyword guessing by external attackers. In short, the concept of PEKS is to provide a mechanism for users to search encrypted data by keywords without disclosing any information to other parties including the server. With the rapid development of cloud computing, users can use the massive storage and computing capabilities of cloud servers at low prices. This has made PEKS even more popular. Although the existing PEKS can safely and effectively complete the search operation, most of the solutions do not verify the search results returned by the server, and do not restrict the search users. Under a model of semi-honest but trusted servers, the server may only perform part of the search operation or return only part of the search results. In response to this problem, Zheng et al. proposed a new cryptographic primitive for this problem for the first time—a verifiable keyword search scheme based on attribute encryption. This scheme allows data owners to control search operations. Legitimate users of access control policies can outsource time-consuming search operations to cloud servers and can effectively verify that the server actually performed the search operation. This means that users who meet the conditions of the data owner's access policy can search the encrypted data on the cloud server. In addition, users can also verify the correctness and completeness of the search results returned by the server. The scheme is constructed by using modular exponent, attribute encryption, Bloom filter, digital signature and keyword search based on attribute encryption. However, this solution performs the same operation as the cloud server when verifying the correctness, but for the user itself, this requires a large amount of calculation. In addition, the scheme ignores the offline guessing attack. Because the keyword ciphertext, search password and algorithm are easily obtained by the adversary, the adversary can perform the search operation, thus breaking the indistinguishability of the keyword ciphertext.
发明内容Contents of the invention
本发明的目的在于提供一种基于KP-ABE的有效可验证的公钥可搜索加密方法,旨在在正确性验证方面大大减少用户的运算量,利用服务器的公钥对关键词密文进行再加密,防止外部攻击者的离线猜测攻击,提高方案的安全性。The purpose of the present invention is to provide an effective and verifiable public key searchable encryption method based on KP-ABE, which aims to greatly reduce the user's calculation load in terms of correctness verification, and use the server's public key to re-encrypt the keyword ciphertext. Encryption prevents offline guessing attacks by external attackers and improves the security of the solution.
符号说明:Symbol Description:
F={F1}||{F2}||…||{Fn}:加密文件的集合;F={F 1 }||{F 2 }||...||{F n }: collection of encrypted files;
ID{Fi}:文件{Fi}的地址;ID{F i }: address of file {F i };
IDw:包含关键词w的文件的地址;ID w : the address of the file containing the keyword w;
WE:W的密文;W E : W's ciphertext;
BF:包含所有关键词的布隆过滤器;BF: Bloom filter containing all keywords;
SYMEnc():对称加密算法;SYM Enc (): Symmetric encryption algorithm;
ABE():基于密钥策略的属性加密算法。ABE(): Key policy-based attribute encryption algorithm.
本发明是这样实现的,一种基于KP-ABE的有效可验证的公钥可搜索加密方法,所述的基于KP-ABE的有效可验证的公钥可搜索加密方法包括可信权威中心、数据拥有者、云服务器、数据用户;可信权威中心选取双线性对和哈希函数,为系统生成公参pm和主密钥mk;通过运行RSA算法,为数据拥有者和云服务器生成公私钥对;通过访问结构中的Share(T,ac)算法,为用户生成私钥sk;数据拥有者从外包的数据文件F中提取关键词w;外包F,并生成关键词w密文cph并发送给云服务器;云服务器对数据拥有者发送来的数据提供存储服务并在收到用户发送的搜索口令tk后执行搜索,并将搜索结果和搜索证据返回给用户;数据用户用私钥sk生成搜索口令tk并发送给云服务器;在收到云服务器返回的搜索结果后,对结果的正确性和完整性进行验证;The present invention is achieved in this way, an effective and verifiable public key searchable encryption method based on KP-ABE, and the effective and verifiable public key searchable encryption method based on KP-ABE includes a trusted authority center, data Owner, cloud server, data user; the trusted authority center selects bilinear pairing and hash function to generate public parameter pm and master key mk for the system; generates public and private keys for data owner and cloud server by running RSA algorithm Yes; through the Share(T,ac) algorithm in the access structure, generate a private key sk for the user; the data owner extracts the keyword w from the outsourced data file F; outsource F, and generate the keyword w ciphertext cph and send it To the cloud server; the cloud server provides storage services for the data sent by the data owner and executes the search after receiving the search password tk sent by the user, and returns the search results and search evidence to the user; the data user uses the private key sk to generate a search The password tk is sent to the cloud server; after receiving the search result returned by the cloud server, the correctness and completeness of the result are verified;
所述的基于KP-ABE的有效可验证的公钥可搜索加密方法包括六个算法,l为安全参数,可信权威中心运行RSA算法为云服务器和数据拥有者生成公私钥对:{(n1,e1),d1}和{(n2,e2),d2};数据拥有者通过数字签名来保证数据文件的完整性,用云服务器的公钥对密文关键词进行再加密来防止外部攻击者的离线猜测攻击,当数据拥有者用SYMEnc()加密算法对数据文件加密后外包给云服务器,服务器返回加密文件的地址,记为ID{Fi},这样包含关键词w的数据文件即可表示为IDw=ID{F1}||ID{F2}…||ID{Fi}。The described effective and verifiable public key searchable encryption method based on KP-ABE comprises six algorithms, l is a security parameter, and the credible authority center runs the RSA algorithm to generate a public-private key pair for the cloud server and the data owner: {(n 1 ,e 1 ),d 1 } and {(n 2 ,e 2 ),d 2 }; the data owner guarantees the integrity of the data file through digital signature, and uses the public key of the cloud server to reconstruct the ciphertext keywords. Encryption to prevent offline guessing attacks by external attackers. When the data owner encrypts the data file with the SYM Enc () encryption algorithm and outsources it to the cloud server, the server returns the address of the encrypted file, which is recorded as ID{F i }, which contains the key The data file of word w can be expressed as ID w =ID{F 1 }||ID{F 2 }...||ID{F i }.
进一步,所述公钥可搜索加密方法具体包括:Further, the public key searchable encryption method specifically includes:
可信权威中心选取双线性对和哈希函数,为可搜索加密系统:可信授权中心管理数据拥有者、用户和云服务器;The trusted authority center selects bilinear pairing and hash function as a searchable encryption system: the trusted authority center manages data owners, users and cloud servers;
数据拥有者将数据文件传送至云服务器;The data owner sends the data file to the cloud server;
云服务器提供存储和检索服务;Cloud servers provide storage and retrieval services;
用户通过云服务器搜索存储在其上的数据文件;The user searches the data files stored on the cloud server through the cloud server;
可信权威中心生成公参pm和主密钥mk;通过运行如下RSA算法:The trusted authority center generates the public parameter pm and the master key mk; by running the following RSA algorithm:
按以下3个步骤:Follow these 3 steps:
i)选择不同的大素数p和q,计算n=p*q;i) select different large prime numbers p and q, and calculate n=p*q;
ii)选择e与互素,(n,e)作为公钥;ii) Choose e with Mutually prime, (n, e) as the public key;
iii)通过计算d,(n,d)作为私钥;iii) pass Calculate d, (n,d) as the private key;
这里数n,e,d分别为模数,加密指数和解密指数;here The numbers n, e, and d are modulus, encryption index and decryption index respectively;
按照此算法,选取不同的大素数p1和q1,p2和q2,为数据拥有者和服务器生成公私钥对{(n1,e1),d1}和{(n2,e2),d2};According to this algorithm, select different large prime numbers p 1 and q 1 , p 2 and q 2 to generate public-private key pairs {(n 1 ,e 1 ),d 1 } and {(n 2 ,e 2 ),d 2 };
通过访问结构中的Share(T,ac)算法,按如下步骤:By accessing the Share(T,ac) algorithm in the structure, follow the steps below:
访问树T的每一个叶子节点都关联着秘密ac的部分分享qv(0),对每一个叶子节点v∈lvs(T),选取t←Zp,计算和Bv=gt,记sk=(T,Av,Bv)|v∈lvs(T))为用户的私钥。Each leaf node of the access tree T is associated with the partial share q v (0) of the secret ac. For each leaf node v∈lvs(T), select t←Z p and calculate and B v =g t , record sk=(T,A v ,B v )|v∈lvs(T)) as the user's private key.
进一步,所述的基于KP-ABE的有效可验证的公钥可搜索加密方法包括六个算法,l为安全参数,可信权威中心运行RSA算法为云服务器和数据拥有者生成公私钥对:{(n1,e1),d1}和{(n2,e2),d2}。数据拥有者通过数字签名来保证数据文件的完整性,用云服务器的公钥对密文关键词进行再加密来防止外部攻击者的离线猜测攻击,当数据拥有者用SYMEnc()加密算法对数据文件加密后外包给云服务器,服务器返回加密文件的地址,记为ID{Fi},这样包含关键词w的数据文件即可表示为IDw=ID{F1}||ID{F2}…||ID{Fi}。Further, the effective and verifiable public key searchable encryption method based on KP-ABE includes six algorithms, l is a security parameter, and the trusted authority center runs the RSA algorithm to generate a public-private key pair for the cloud server and the data owner:{ (n 1 ,e 1 ),d 1 } and {(n 2 ,e 2 ),d 2 }. The data owner guarantees the integrity of the data file through a digital signature, and re-encrypts the ciphertext keywords with the public key of the cloud server to prevent offline guessing attacks by external attackers. When the data owner uses the SYM Enc () encryption algorithm to encrypt After the data file is encrypted, it is outsourced to the cloud server, and the server returns the address of the encrypted file, which is recorded as ID{F i }, so that the data file containing the keyword w can be expressed as ID w = ID{F 1 }||ID{F 2 }...||ID{F i }.
进一步,所述的基于KP-ABE的有效可验证的公钥可搜索加密方法的具体方案为:Further, the specific scheme of the effective and verifiable public key searchable encryption method based on KP-ABE is:
步骤一、初始化(1l):可信权威中心选择双线性对:e:G×G→GT,G和GT是阶为p的循环群,p为l比特长的素元,选择随机预言机模型下的哈希函数H1:{0,1}*→G;H2:{0,1}*→Zp是单向哈希函数,选择a,b,c←Zp,g←G,pm=(H1,H2,e,g,p,ga,gb,gc,G,GT),mk=(a,b,c)Step 1. Initialization (1 l ): The trusted authority center selects a bilinear pairing: e:G×G→G T , where G and G T are cyclic groups of order p, and p is a prime element with a length of l bits. Select The hash function H 1 :{0,1} * →G under the random oracle model; H 2 :{0,1} * →Z p is a one-way hash function, choose a,b,c←Z p , g←G, pm=(H 1 ,H 2 ,e,g,p,g a ,g b ,g c ,G,G T ),mk=(a,b,c)
接着选取k个独立的哈希函数H1',…,H'k,用来m比特的构造m比特的布隆过滤器BF发送给数据拥有者,为数据拥有者和云服务器生成公私钥对{(n1,e1),d1}和{(n2,e2),d2};Then select k independent hash functions H 1 ',...,H' k , use m bits to construct m bits Bloom filter BF and send it to the data owner to generate a public-private key pair for the data owner and the cloud server {(n 1 ,e 1 ),d 1 } and {(n 2 ,e 2 ),d 2 };
步骤二、密钥生成(mk,T):可信权威中心执行Share(T,ac)算法,访问树T的每一个叶子节点都会得到有关秘密ac的部分分享qv(0),对每一个叶子节点v∈lvs(T),选取t←Zp,计算和Bv=gt,记私钥sk=(T,Av,Bv)|v∈lvs(T));Step 2, key generation (mk, T): the trusted authority center executes the Share(T, ac) algorithm, and each leaf node of the access tree T will get the partial share q v (0) of the secret ac, for each For leaf node v∈lvs(T), select t←Z p and calculate Sum B v =g t , remember the private key sk=(T,A v ,B v )|v∈lvs(T));
步骤三、对关键词和文件地址的加密:(w,atts,ID(w))数据拥有者通过可信权威中心发送的哈希函数生成布隆过滤器,BF←BFGen({H1',…,H'k},{w1,…,wl}),对含有关键词w数据文件地址IDw和布隆过滤器,SYMEnc()加密算法加密,对称密钥为sk1:Step 3. Encryption of keywords and file addresses: (w,atts,ID(w)) The data owner generates a Bloom filter through the hash function sent by the trusted authority center, BF←BFGen({H 1 ', …,H' k },{w 1 ,…,w l }), for data file address ID w containing keyword w and Bloom filter, SYM Enc () encryption algorithm encryption, symmetric key is sk 1 :
BFEnc=SYM(BF),(IDw)Enc=SYM(IDw);BF Enc =SYM(BF),(ID w ) Enc =SYM(ID w );
用户数据拥有者对ABFEnc和(IDw)Enc进行签名:
在搜索结束后,属性满足访问策略的合法用户就可以解密C得到sk1,进而解密获取目标文件;After the search is over, legitimate users whose attributes meet the access policy can decrypt C to obtain sk 1 , and then decrypt to obtain the target file;
选择r1,r2←Zp,计算
步骤四、生成搜索口令(sk,w):选择s←Zp,对每个叶子节点v∈lvs(T)计算
步骤五、搜索(tk,cph):服务器从cph中选取属性集S来满足搜索口令中指定的访问树,如果这样的集合S不存在,返回0;反之,对每一个atj∈S,计算
步骤六、验证{W,F,A,B,C}数据用户接收到云服务器返回的搜索结果后,进行验证操作。Step 6. Verification {W, F, A, B, C} data The user performs verification operation after receiving the search result returned by the cloud server.
进一步,所述的验证操作的具体方法为:Further, the specific method of the verification operation is:
步骤一、搜索关键词的存在性:当数据用户仅仅收到云服务器返回的A时,首先用数据拥有者的公钥A进行验证若则通过验证;对C进行解密操作获取对称密钥sk1,解密A获取布隆过滤器BF,若BF(w)=0,意味着云服务器上不存在用户所搜索的关键词,反之,拒收返回结果;Step 1. Search for the existence of keywords: When the data user only receives A returned by the cloud server, first use the public key A of the data owner to verify if Then the verification is passed; decrypt C to obtain the symmetric key sk 1 , decrypt A to obtain the Bloom filter BF, if BF(w)=0, it means that the keyword searched by the user does not exist on the cloud server, otherwise, reject Return the result;
步骤二、搜索关键词的正确性:数据用户收到{W,F,A,B,C}时,计算W/f1和如果说明正确,反之,说明是错误结果;Step 2. The correctness of the search keywords: when the data user receives {W, F, A, B, C}, calculate W/f 1 and if The explanation is correct, otherwise, the explanation is a wrong result;
步骤三、包含关键词w的数据文件地址的完整性:当数据用户验证了关键词的正确性后,接着对B进行验证,若则通过解密C获取sk1,进而获取目标数据文件。Step 3. Integrity of the address of the data file containing the keyword w: After the data user verifies the correctness of the keyword, then verify B, if Then obtain sk 1 by decrypting C, and then obtain the target data file.
进一步,所述的基于KP-ABE的有效可验证的公钥可搜索加密方法的正确性的分析如下:Further, the analysis of the correctness of the effective and verifiable public key searchable encryption method based on KP-ABE is as follows:
步骤一、搜索匹配正确性:Step 1. Search for matching correctness:
云服务器在收到数据用户的搜索请求后,执行搜索操作,首先用自己的私钥对密文关键词和搜索口令进行解密,用RSA算法,然后,执行如下匹配操作:After the cloud server receives the search request from the data user, it executes the search operation. First, it uses its own private key to decrypt the ciphertext keyword and the search password, uses the RSA algorithm, and then performs the following matching operations:
如果w和w1是同一个关键词的话,那么e(W',tok1)Eroot和e(W,tok2)就是相等的,说明搜索成功;If w and w 1 are the same keyword, then e(W',tok 1 )E root and e(W,tok 2 ) are equal, indicating that the search is successful;
步骤二、验证正确性:Step 2. Verify correctness:
当数据用户收到云服务器返回的搜索结果{W,F,A,B,C}时,首先要对关键词的正确性进行验证,由F中找到f1,f2,作如下计算:When the data user receives the search result {W,F,A,B,C} returned by the cloud server, he must first verify the correctness of the keywords, find f 1 and f 2 from F, and perform the following calculation:
用户对自己搜索的关键词的哈希值H2(w1)计算如下:The hash value H 2 (w 1 ) of the keyword that the user searches for is calculated as follows:
若w和w1是同一个关键词时,相等,说明,搜索结果是正确的,在此之后,通过签名来验证数据文件地址的正确性和完整性。If w and w 1 are the same keyword, Equal, it means that the search result is correct. After that, verify the correctness and integrity of the address of the data file through the signature.
效果汇总Effect summary
本发明的基于KP-ABE的有效可验证的公钥可搜索加密方法,首先为数据拥有者和云服务器生成了公私钥对,在发送密文关键词和搜索口令时,首先使用云服务器的公钥对其再加密,这样有效地防止了外部攻击者的离线猜测攻击行为,提高了方案的安全性,而且,复杂度降低,大大减少了用户的运算量,效率得到了很大提高。The effective and verifiable public-key searchable encryption method based on KP-ABE of the present invention first generates a public-private key pair for the data owner and the cloud server, and first uses the public-private key pair of the cloud server when sending ciphertext keywords and search passwords. It is re-encrypted with the key, which effectively prevents offline guessing attacks by external attackers, improves the security of the scheme, and reduces the complexity, greatly reduces the amount of calculation for users, and greatly improves the efficiency.
附图说明Description of drawings
图1是本发明实施例提供的基于KP-ABE的有效可验证的公钥可搜索加密方法的模型示意图;Fig. 1 is a model schematic diagram of an effective and verifiable public key searchable encryption method based on KP-ABE provided by an embodiment of the present invention;
图2是本发明实施例提供的本发明和对比方案执行正确性验证的运行时间的对比图。Fig. 2 is a comparison chart of the execution time of the correctness verification of the present invention and the comparison scheme provided by the embodiment of the present invention.
具体实施方式Detailed ways
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
本发明是这样实现的,如图1所示,一种基于KP-ABE的有效可验证的公钥可搜索加密方法包括可信权威中心、数据拥有者、云服务器、数据用户;可信权威中心为所有云用户生成证书;数据拥有者外包数据文件和关键词给云服务器;云服务器是提供存储服务并在收到用户发送的搜索请求后执行搜索操作;数据用户生成搜索口令发送给云服务器寻找目标文件。The present invention is realized in this way, as shown in Figure 1, a kind of effective and verifiable public key searchable encryption method based on KP-ABE comprises trusted authority center, data owner, cloud server, data user; Trusted authority center Generate certificates for all cloud users; data owners outsource data files and keywords to cloud servers; cloud servers provide storage services and perform search operations after receiving search requests from users; data users generate search passwords and send them to cloud servers to find Target file.
进一步,所述公钥可搜索加密方法具体包括:Further, the public key searchable encryption method specifically includes:
可信权威中心选取双线性对和哈希函数,为可搜索加密系统:可信授权中心管理数据拥有者、用户和云服务器;The trusted authority center selects bilinear pairing and hash function as a searchable encryption system: the trusted authority center manages data owners, users and cloud servers;
数据拥有者将数据文件传送至云服务器;The data owner sends the data file to the cloud server;
云服务器提供存储和检索服务;Cloud servers provide storage and retrieval services;
用户通过云服务器搜索存储在其上的数据文件;The user searches the data files stored on the cloud server through the cloud server;
可信权威中心生成公参pm和主密钥mk;通过运行如下RSA算法:The trusted authority center generates the public parameter pm and the master key mk; by running the following RSA algorithm:
按以下3个步骤:Follow these 3 steps:
i)选择不同的大素数p和q,计算n=p*q;i) select different large prime numbers p and q, and calculate n=p*q;
ii)选择e与互素,(n,e)作为公钥;ii) Choose e with Mutually prime, (n, e) as the public key;
iii)通过计算d,(n,d)作为私钥;iii) pass Calculate d, (n,d) as the private key;
这里数n,e,d分别为模数,加密指数和解密指数;here The numbers n, e, and d are modulus, encryption index and decryption index respectively;
按照此算法,选取不同的大素数p1和q1,p2和q2,为数据拥有者和服务器生成公私钥对{(n1,e1),d1}和{(n2,e2),d2};According to this algorithm, select different large prime numbers p 1 and q 1 , p 2 and q 2 to generate public-private key pairs {(n 1 ,e 1 ),d 1 } and {(n 2 ,e 2 ),d 2 };
通过访问结构中的Share(T,ac)算法,按如下步骤:By accessing the Share(T,ac) algorithm in the structure, follow the steps below:
访问树T的每一个叶子节点都关联着秘密ac的部分分享qv(0),对每一个叶子节点v∈lvs(T),选取t←Zp,计算和Bv=gt,记sk=(T,Av,Bv)|v∈lvs(T))为用户的私钥。Each leaf node of the access tree T is associated with the partial share q v (0) of the secret ac. For each leaf node v∈lvs(T), select t←Z p and calculate and B v =g t , record sk=(T,A v ,B v )|v∈lvs(T)) as the user's private key.
进一步,所述的基于KP-ABE的有效可验证的公钥可搜索加密方法包括六个算法,l为安全参数,可信权威中心运行RSA算法为云服务器和数据拥有者生成公私钥对:{(n1,e1),d1}和{(n2,e2),d2},数据拥有者通过数字签名来保证数据文件的完整性,用云服务器的公钥对密文关键词进行再加密来防止外部攻击者的离线猜测攻击,当数据拥有者用SYMEnc()加密算法对数据文件加密后外包给云服务器,服务器返回加密文件的地址,记为ID{Fi},这样包含关键词w的数据文件即可表示为IDw=ID{F1}||ID{F2}…||ID{Fi}。Further, the effective and verifiable public key searchable encryption method based on KP-ABE includes six algorithms, l is a security parameter, and the trusted authority center runs the RSA algorithm to generate a public-private key pair for the cloud server and the data owner:{ (n 1 ,e 1 ),d 1 } and {(n 2 ,e 2 ),d 2 }, the data owner guarantees the integrity of the data file through digital signature, and uses the public key of the cloud server to pair the ciphertext keywords Perform re-encryption to prevent offline guessing attacks by external attackers. When the data owner encrypts the data file with the SYM Enc () encryption algorithm and outsources it to the cloud server, the server returns the address of the encrypted file, which is recorded as ID{F i }, so A data file containing the keyword w can be expressed as ID w =ID{F 1 }||ID{F 2 }...||ID{F i }.
进一步,所述的基于KP-ABE的有效可验证的公钥可搜索加密方法的具体方案为:Further, the specific scheme of the effective and verifiable public key searchable encryption method based on KP-ABE is:
步骤一、初始化(1l):可信权威中心选择双线性对:e:G×G→GT,G和GT是阶为p的循环群,p为l比特长的素元,选择随机预言机模型下的哈希函数H1:{0,1}*→G;H2:{0,1}*→Zp是单向哈希函数,选择a,b,c←Zp,g←G,pm=(H1,H2,e,g,p,ga,gb,gc,G,GT),mk=(a,b,c)Step 1. Initialization (1 l ): The trusted authority center selects a bilinear pairing: e:G×G→G T , where G and G T are cyclic groups of order p, and p is a prime element with a length of l bits. Select The hash function H 1 :{0,1} * →G under the random oracle model; H 2 :{0,1} * →Z p is a one-way hash function, choose a,b,c←Z p , g←G, pm=(H 1 ,H 2 ,e,g,p,g a ,g b ,g c ,G,G T ),mk=(a,b,c)
接着选取k个独立的哈希函数H1',…,H'k,用来m比特的构造m比特的布隆过滤器BF发送给数据拥有者,为数据拥有者和云服务器生成公私钥对{(n1,e1),d1}和{(n2,e2),d2};Then select k independent hash functions H 1 ',...,H' k , use m bits to construct m bits Bloom filter BF and send it to the data owner to generate a public-private key pair for the data owner and the cloud server {(n 1 ,e 1 ),d 1 } and {(n 2 ,e 2 ),d 2 };
步骤二、密钥生成(mk,T):可信权威中心执行Share(T,ac)算法,访问树T的每一个叶子节点都会得到有关秘密ac的部分分享qv(0),对每一个叶子节点v∈lvs(T),选取t←Zp,计算和Bv=gt,记私钥sk=(T,Av,Bv)|v∈lvs(T));Step 2, key generation (mk, T): the trusted authority center executes the Share(T, ac) algorithm, and each leaf node of the access tree T will get the partial share q v (0) of the secret ac, for each For leaf node v∈lvs(T), select t←Z p and calculate Sum B v =g t , remember the private key sk=(T,A v ,B v )|v∈lvs(T));
步骤三、对关键词和文件地址的加密:(w,atts,ID(w))数据拥有者通过可信权威中心发送的哈希函数生成布隆过滤器,BF←BFGen({H1',…,H'k},{w1,…,wl}),对含有关键词w数据文件地址IDw和布隆过滤器,SYMEnc()加密算法加密,对称密钥为sk1:Step 3. Encryption of keywords and file addresses: (w,atts,ID(w)) The data owner generates a Bloom filter through the hash function sent by the trusted authority center, BF←BFGen({H 1 ', …,H' k },{w 1 ,…,w l }), for data file address ID w containing keyword w and Bloom filter, SYM Enc () encryption algorithm encryption, symmetric key is sk 1 :
BFEnc=SYM(BF),(IDw)Enc=SYM(IDw);BF Enc =SYM(BF),(ID w ) Enc =SYM(ID w );
用户数据拥有者对ABFEnc和(IDw)Enc进行签名:
在搜索结束后,属性满足访问策略的合法用户就可以解密C得到sk1,进而解密获取目标文件;After the search is over, legitimate users whose attributes meet the access policy can decrypt C to obtain sk 1 , and then decrypt to obtain the target file;
选择r1,r2←Zp,计算
步骤四、生成搜索口令(sk,w):选择s←Zp,对每个叶子节点v∈lvs(T)计算
步骤五、搜索(tk,cph):服务器从cph中选取属性集S来满足搜索口令中指定的访问树,如果这样的集合S不存在,返回0;反之,对每一个atj∈S,计算
步骤六、验证{W,F,A,B,C}数据用户接收到云服务器返回的搜索结果后,进行验证操作。Step 6. Verification {W, F, A, B, C} data The user performs verification operation after receiving the search result returned by the cloud server.
进一步,所述的验证操作的具体方法为:Further, the specific method of the verification operation is:
步骤一、搜索关键词的存在性:当数据用户仅仅收到云服务器返回的A时,首先用数据拥有者的公钥A进行验证若则通过验证;对C进行解密操作获取对称密钥sk1,解密A获取布隆过滤器BF,若BF(w)=0,意味着云服务器上不存在用户所搜索的关键词,反之,拒收返回结果;Step 1. Search for the existence of keywords: When the data user only receives A returned by the cloud server, first use the public key A of the data owner to verify if Then the verification is passed; decrypt C to obtain the symmetric key sk 1 , decrypt A to obtain the Bloom filter BF, if BF(w)=0, it means that the keyword searched by the user does not exist on the cloud server, otherwise, reject Return the result;
步骤二、搜索关键词的正确性:数据用户收到{W,F,A,B,C}时,计算W/f1和如果说明正确,反之,说明是错误结果;Step 2. The correctness of the search keywords: when the data user receives {W, F, A, B, C}, calculate W/f 1 and if The explanation is correct, otherwise, the explanation is a wrong result;
步骤三、包含关键词w的数据文件地址的完整性:当数据用户验证了关键词的正确性后,接着对B进行验证,若则通过解密C获取sk1,进而获取目标数据文件。Step 3. Integrity of the address of the data file containing the keyword w: After the data user verifies the correctness of the keyword, then verify B, if Then obtain sk 1 by decrypting C, and then obtain the target data file.
进一步,所述的基于KP-ABE的有效可验证的公钥可搜索加密方法的正确性的分析如下:Further, the analysis of the correctness of the effective and verifiable public key searchable encryption method based on KP-ABE is as follows:
步骤一、搜索匹配正确性:Step 1. Search for matching correctness:
云服务器在收到数据用户的搜索请求后,执行搜索操作,首先用自己的私钥对密文关键词和搜索口令进行解密,用RSA算法,然后,执行如下匹配操作:After the cloud server receives the search request from the data user, it executes the search operation. First, it uses its own private key to decrypt the ciphertext keyword and the search password, uses the RSA algorithm, and then performs the following matching operations:
如果w和w1是同一个关键词的话,那么e(W',tok1)Eroot和e(W,tok2)就是相等的,说明搜索成功;If w and w 1 are the same keyword, then e(W',tok 1 )E root and e(W,tok 2 ) are equal, indicating that the search is successful;
步骤二、验证正确性:Step 2. Verify correctness:
当数据用户收到云服务器返回的搜索结果{W,F,A,B,C}时,首先要对关键词的正确性进行验证,由F中找到f1,f2,作如下计算:When the data user receives the search result {W,F,A,B,C} returned by the cloud server, he must first verify the correctness of the keywords, find f 1 and f 2 from F, and perform the following calculation:
用户对自己搜索的关键词的哈希值H2(w1)计算如下:The hash value H 2 (w 1 ) of the keyword that the user searches for is calculated as follows:
若w和w1是同一个关键词时,W/f1和相等,说明,搜索结果是正确的,在此之后,通过签名来验证数据文件地址的正确性和完整性。If w and w 1 are the same keyword, W/f 1 and Equal, it means that the search result is correct. After that, verify the correctness and integrity of the address of the data file through the signature.
将本发明与文献“Verifiable attribute-based keyword search overoutsourced encrypted data”(Q.Zheng,Xu,S.Ateniese,G.:Vabks,IACR Cryptology ePrint Archive2013(2013))中的方案进行对比,在本发明的方案中,首先为数据拥有者和云服务器生成了公私钥对,在发送密文关键词和搜索口令时,首先使用云服务器的公钥对其再加密,这样有效地防止了外部攻击者的离线猜测攻击行为。这在对比中是没有涉及到的。另外,与对比方案对比,对比方案在验证正确性时所进行的操作和云服务器是相同的,而本发明所用方法具有明显的优势,如表1所示:The present invention is compared with the scheme in the document "Verifiable attribute-based keyword search overoutsourced encrypted data" (Q. Zheng, Xu, S. Ateniese, G.: Vabks, IACR Cryptology ePrint Archive2013 (2013)), in the present invention In the scheme, firstly, a public-private key pair is generated for the data owner and the cloud server. When sending the ciphertext keywords and search passwords, firstly use the public key of the cloud server to re-encrypt them, which effectively prevents offline attacks by external attackers. Guess the attack. This is not covered in the comparison. In addition, compared with the comparison scheme, the operation performed by the comparison scheme when verifying correctness is the same as that of the cloud server, while the method used in the present invention has obvious advantages, as shown in Table 1:
表1Table 1
BF代表布隆过滤器;这里复杂度考虑的是渐近复杂度,主要是Pair和ET。Pair代表双线性对运算;ET代表群GT中的指数运算;S代表用户的属性的数量。和对比方案一样,因为乘法运算和哈希运算比起对运算和指数运算起来,复杂度较低。所以在讨论复杂度时,忽略了乘法运算和哈希运算。BF stands for Bloom filter; here the complexity considers the asymptotic complexity, mainly Pair and E T . Pair represents bilinear pairing operation; E T represents the exponential operation in group G T ; S represents the number of attributes of the user. As in the comparison scheme, because the multiplication and hashing operations are less complex than the pairing and exponentiation operations. So when discussing complexity, multiplication and hash operations are ignored.
用户对服务器返回的搜索结果的正确性进行验证:The user verifies the correctness of the search results returned by the server:
C语言编程,采用Ubuntu Linux12.04系统。电脑配置为:Intel(R)Core(TM)i3-3240Cpu,2GBRAM。基于对运算的密码算法(PBC)实验室0.514版本。所有实验结果取的是50次的实验平均值。分别选取了512比特长和1024比特长的模长度,属性数量范围10到50个。最终,如图2所示,实验结果显示,本发明的验证方法效率高,具有更强的实用性。C language programming, using Ubuntu Linux12.04 system. Computer configuration: Intel(R) Core(TM) i3-3240Cpu, 2GB RAM. Pairwise-Based Cryptography (PBC) Lab Version 0.514. All experimental results are the average value of 50 experiments. The modulus lengths of 512 bits and 1024 bits are respectively selected, and the number of attributes ranges from 10 to 50. Finally, as shown in Figure 2, the experimental results show that the verification method of the present invention has high efficiency and stronger practicability.
图2示出了本发明的方案和对比方案执行正确性验证的运行时间。相比对比方案,本发明方案的运行时间不会随着属性数量的增加而变化,进一步说明了本发明的实用性。图中的双斜线代表着在垂直方向的中断,这里使用的是ORIGIN8.0软件进行数据分析并作图。Fig. 2 shows the execution time of correctness verification for the scheme of the present invention and the comparison scheme. Compared with the comparison scheme, the running time of the scheme of the present invention does not change with the increase of the number of attributes, which further illustrates the practicability of the present invention. The double slashes in the figure represent interruptions in the vertical direction, and ORIGIN8.0 software was used here for data analysis and graphing.
上述虽然结合附图对本发明的具体实施方式进行了描述,但并非对本发明保护范围的限制,所属领域技术人员应该明白,在本发明的技术方案的基础上,本领域技术人员不需要付出创造性的劳动即可做出的各种修改或变形仍在本发明的保护范围之内。Although the specific implementation of the present invention has been described above in conjunction with the accompanying drawings, it is not a limitation to the protection scope of the present invention. Those skilled in the art should understand that on the basis of the technical solution of the present invention, those skilled in the art do not need to pay any creative effort. Various modifications or deformations that can be made by labor are still within the protection scope of the present invention.
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410316818.4A CN104038349B (en) | 2014-07-03 | 2014-07-03 | Effective and verifiable public key searching encryption method based on KP-ABE |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410316818.4A CN104038349B (en) | 2014-07-03 | 2014-07-03 | Effective and verifiable public key searching encryption method based on KP-ABE |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104038349A true CN104038349A (en) | 2014-09-10 |
CN104038349B CN104038349B (en) | 2017-05-03 |
Family
ID=51468946
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410316818.4A Expired - Fee Related CN104038349B (en) | 2014-07-03 | 2014-07-03 | Effective and verifiable public key searching encryption method based on KP-ABE |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104038349B (en) |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104394155A (en) * | 2014-11-27 | 2015-03-04 | 暨南大学 | Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness |
CN105024802A (en) * | 2015-07-13 | 2015-11-04 | 西安理工大学 | Multi-user and multi-keyword searchable encryption method based on bilinear pairing in cloud storage |
CN105282167A (en) * | 2015-11-06 | 2016-01-27 | 福建工程学院 | Searchable certificateless public key encryption method |
CN105468986A (en) * | 2015-12-02 | 2016-04-06 | 深圳大学 | Confidential information retrieval method and system |
CN105721146A (en) * | 2016-03-03 | 2016-06-29 | 江苏大学 | Big data sharing method for cloud storage based on SMC |
CN105812141A (en) * | 2016-03-07 | 2016-07-27 | 东北大学 | Outsourcing encrypted data-orientated verifiable intersection operation method and system |
CN105933281A (en) * | 2016-03-29 | 2016-09-07 | 深圳大学 | Quantum homomorphism symmetry searchable encryption method and system |
CN106131029A (en) * | 2016-07-19 | 2016-11-16 | 南京邮电大学 | A kind of efficient cipher text searching method resisting attribute key abuse |
CN106650205A (en) * | 2016-09-28 | 2017-05-10 | 西安电子科技大学 | Cloud medical data monitoring system and monitoring method with efficient privacy protection function |
CN106874516A (en) * | 2017-03-15 | 2017-06-20 | 电子科技大学 | Efficient cipher text retrieval method based on KCB trees and Bloom filter in a kind of cloud storage |
CN106941482A (en) * | 2016-12-20 | 2017-07-11 | 中国科学技术大学 | A kind of data storage and access control method based on key derivation |
CN107256248A (en) * | 2017-06-07 | 2017-10-17 | 福州大学 | Encryption method can search for based on asterisk wildcard in cloud storage safety |
CN107920121A (en) * | 2017-11-22 | 2018-04-17 | 湖南城市学院 | A kind of PE testing method based on internet |
CN108039943A (en) * | 2017-12-06 | 2018-05-15 | 清华大学深圳研究生院 | A kind of encryption searching method that can verify that |
CN108418796A (en) * | 2018-01-30 | 2018-08-17 | 西安电子科技大学 | Method for integrity verification and associated deletion of multiple copies of cloud data, and cloud storage system |
CN108512840A (en) * | 2018-03-21 | 2018-09-07 | 杭州弗兰科信息安全科技有限公司 | One kind is based on letting out the encrypted cipher text retrieval method of sequence |
CN109086615A (en) * | 2018-08-03 | 2018-12-25 | 上海海事大学 | A kind of support multiple key search public key encryption method of anti-keyword guessing attack |
CN109299804A (en) * | 2018-11-19 | 2019-02-01 | 安徽师范大学 | Medical appointment registration system with doctor search function |
CN109347833A (en) * | 2018-10-24 | 2019-02-15 | 中国科学院信息工程研究所 | Attribute encryption based access control method and system for machine learning environment |
CN109492410A (en) * | 2018-10-09 | 2019-03-19 | 华南农业大学 | Data can search for encryption and keyword search methodology, system and terminal, equipment |
CN109543439A (en) * | 2018-12-04 | 2019-03-29 | 北京锐安科技有限公司 | A kind of service request method and device of car networking |
CN110266687A (en) * | 2019-06-21 | 2019-09-20 | 杭州云象网络技术有限公司 | A kind of Internet of Things TSM Security Agent data sharing modularity using block chain technology |
CN110392038A (en) * | 2019-06-03 | 2019-10-29 | 西安电子科技大学 | A verifiable multi-key searchable encryption method in multi-user scenarios |
CN110602099A (en) * | 2019-09-16 | 2019-12-20 | 广西师范大学 | Privacy protection method based on verifiable symmetric searchable encryption |
CN112311781A (en) * | 2020-10-23 | 2021-02-02 | 西安电子科技大学 | Encryption method with safe forward and backward direction and recoverable keyword shielding |
CN113158174A (en) * | 2021-04-06 | 2021-07-23 | 上海交通大学 | Automatic search system of grouping cipher actual key information based on graph theory |
CN114268482A (en) * | 2021-12-15 | 2022-04-01 | 北京工业大学 | A Fast Policy Retrieval Method Based on Attribute Bloom Filter |
WO2022099891A1 (en) * | 2020-11-10 | 2022-05-19 | 杭州趣链科技有限公司 | Data query method, apparatus and system, and data set processing method |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107342900A (en) * | 2017-07-11 | 2017-11-10 | 陈焕英 | A kind of allocation of computer device of signal communication bag |
CN110138561B (en) * | 2019-03-22 | 2021-09-17 | 西安电子科技大学 | Efficient ciphertext retrieval method based on CP-ABE automatic correction and cloud computing service system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20120069387A (en) * | 2010-12-20 | 2012-06-28 | 고려대학교 산학협력단 | A method for searching keyword based on public key |
CN103179114A (en) * | 2013-03-15 | 2013-06-26 | 华中科技大学 | A fine-grained access control method for data in cloud storage |
CN103281377A (en) * | 2013-05-31 | 2013-09-04 | 北京鹏宇成软件技术有限公司 | Cryptograph data storage and searching method for cloud |
CN103401839A (en) * | 2013-07-02 | 2013-11-20 | 河海大学 | Attribute protection based multiple authorization center encryption method |
CN103731432A (en) * | 2014-01-11 | 2014-04-16 | 西安电子科技大学昆山创新研究院 | Multi-user supported searchable encryption system and method |
-
2014
- 2014-07-03 CN CN201410316818.4A patent/CN104038349B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20120069387A (en) * | 2010-12-20 | 2012-06-28 | 고려대학교 산학협력단 | A method for searching keyword based on public key |
CN103179114A (en) * | 2013-03-15 | 2013-06-26 | 华中科技大学 | A fine-grained access control method for data in cloud storage |
CN103281377A (en) * | 2013-05-31 | 2013-09-04 | 北京鹏宇成软件技术有限公司 | Cryptograph data storage and searching method for cloud |
CN103401839A (en) * | 2013-07-02 | 2013-11-20 | 河海大学 | Attribute protection based multiple authorization center encryption method |
CN103731432A (en) * | 2014-01-11 | 2014-04-16 | 西安电子科技大学昆山创新研究院 | Multi-user supported searchable encryption system and method |
Non-Patent Citations (1)
Title |
---|
QINGJI ZHENG,SHOUHUAI XU, GIUSEPPE ATENIESE: "VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data", 《IEEE INFOCOM 2014 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS》 * |
Cited By (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104394155B (en) * | 2014-11-27 | 2017-12-12 | 暨南大学 | It can verify that multi-user's cloud encryption keyword searching method of integrality and completeness |
CN104394155A (en) * | 2014-11-27 | 2015-03-04 | 暨南大学 | Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness |
CN105024802A (en) * | 2015-07-13 | 2015-11-04 | 西安理工大学 | Multi-user and multi-keyword searchable encryption method based on bilinear pairing in cloud storage |
CN105024802B (en) * | 2015-07-13 | 2018-05-29 | 西安理工大学 | Multi-user's multi-key word based on Bilinear map can search for encryption method in cloud storage |
CN105282167A (en) * | 2015-11-06 | 2016-01-27 | 福建工程学院 | Searchable certificateless public key encryption method |
CN105468986A (en) * | 2015-12-02 | 2016-04-06 | 深圳大学 | Confidential information retrieval method and system |
CN105721146A (en) * | 2016-03-03 | 2016-06-29 | 江苏大学 | Big data sharing method for cloud storage based on SMC |
CN105721146B (en) * | 2016-03-03 | 2018-12-21 | 江苏大学 | A kind of big data sharing method towards cloud storage based on SMC |
CN105812141B (en) * | 2016-03-07 | 2018-11-27 | 东北大学 | It is a kind of to can verify that intersection operation method and system towards outsourcing encryption data |
CN105812141A (en) * | 2016-03-07 | 2016-07-27 | 东北大学 | Outsourcing encrypted data-orientated verifiable intersection operation method and system |
CN105933281B (en) * | 2016-03-29 | 2019-05-07 | 深圳大学 | A method and system for quantum homomorphic symmetric searchable encryption |
CN105933281A (en) * | 2016-03-29 | 2016-09-07 | 深圳大学 | Quantum homomorphism symmetry searchable encryption method and system |
CN106131029A (en) * | 2016-07-19 | 2016-11-16 | 南京邮电大学 | A kind of efficient cipher text searching method resisting attribute key abuse |
CN106131029B (en) * | 2016-07-19 | 2019-03-29 | 南京邮电大学 | A kind of efficient cipher text searching method for resisting attribute key abuse |
CN106650205A (en) * | 2016-09-28 | 2017-05-10 | 西安电子科技大学 | Cloud medical data monitoring system and monitoring method with efficient privacy protection function |
CN106650205B (en) * | 2016-09-28 | 2019-03-19 | 西安电子科技大学 | A kind of cloud medical data monitoring method of efficient secret protection |
CN106941482A (en) * | 2016-12-20 | 2017-07-11 | 中国科学技术大学 | A kind of data storage and access control method based on key derivation |
CN106941482B (en) * | 2016-12-20 | 2020-01-03 | 中国科学技术大学 | Data storage and access control method based on key derivation |
CN106874516A (en) * | 2017-03-15 | 2017-06-20 | 电子科技大学 | Efficient cipher text retrieval method based on KCB trees and Bloom filter in a kind of cloud storage |
CN107256248A (en) * | 2017-06-07 | 2017-10-17 | 福州大学 | Encryption method can search for based on asterisk wildcard in cloud storage safety |
CN107256248B (en) * | 2017-06-07 | 2020-05-08 | 福州大学 | Wildcard-based searchable encryption method in cloud storage security |
CN107920121A (en) * | 2017-11-22 | 2018-04-17 | 湖南城市学院 | A kind of PE testing method based on internet |
CN108039943A (en) * | 2017-12-06 | 2018-05-15 | 清华大学深圳研究生院 | A kind of encryption searching method that can verify that |
CN108418796A (en) * | 2018-01-30 | 2018-08-17 | 西安电子科技大学 | Method for integrity verification and associated deletion of multiple copies of cloud data, and cloud storage system |
CN108512840A (en) * | 2018-03-21 | 2018-09-07 | 杭州弗兰科信息安全科技有限公司 | One kind is based on letting out the encrypted cipher text retrieval method of sequence |
CN109086615A (en) * | 2018-08-03 | 2018-12-25 | 上海海事大学 | A kind of support multiple key search public key encryption method of anti-keyword guessing attack |
CN109492410B (en) * | 2018-10-09 | 2020-09-01 | 华南农业大学 | Data searchable encryption and keyword search method, system, terminal and equipment |
CN109492410A (en) * | 2018-10-09 | 2019-03-19 | 华南农业大学 | Data can search for encryption and keyword search methodology, system and terminal, equipment |
CN109347833A (en) * | 2018-10-24 | 2019-02-15 | 中国科学院信息工程研究所 | Attribute encryption based access control method and system for machine learning environment |
CN109299804A (en) * | 2018-11-19 | 2019-02-01 | 安徽师范大学 | Medical appointment registration system with doctor search function |
CN109543439A (en) * | 2018-12-04 | 2019-03-29 | 北京锐安科技有限公司 | A kind of service request method and device of car networking |
CN109543439B (en) * | 2018-12-04 | 2021-07-13 | 北京锐安科技有限公司 | A service request method and device for Internet of Vehicles |
CN110392038B (en) * | 2019-06-03 | 2021-07-13 | 西安电子科技大学 | A Verifiable Multi-Key Searchable Encryption Method in Multi-User Scenarios |
CN110392038A (en) * | 2019-06-03 | 2019-10-29 | 西安电子科技大学 | A verifiable multi-key searchable encryption method in multi-user scenarios |
CN110266687B (en) * | 2019-06-21 | 2021-08-17 | 杭州云象网络技术有限公司 | Method for designing Internet of things security agent data sharing module by adopting block chain technology |
CN110266687A (en) * | 2019-06-21 | 2019-09-20 | 杭州云象网络技术有限公司 | A kind of Internet of Things TSM Security Agent data sharing modularity using block chain technology |
CN110602099B (en) * | 2019-09-16 | 2021-04-06 | 广西师范大学 | Privacy protection method based on verifiable symmetric searchable encryption |
CN110602099A (en) * | 2019-09-16 | 2019-12-20 | 广西师范大学 | Privacy protection method based on verifiable symmetric searchable encryption |
CN112311781A (en) * | 2020-10-23 | 2021-02-02 | 西安电子科技大学 | Encryption method with safe forward and backward direction and recoverable keyword shielding |
CN112311781B (en) * | 2020-10-23 | 2021-11-12 | 西安电子科技大学 | A forward-backward secure encryption method with recoverable keyword masking |
WO2022099891A1 (en) * | 2020-11-10 | 2022-05-19 | 杭州趣链科技有限公司 | Data query method, apparatus and system, and data set processing method |
CN113158174A (en) * | 2021-04-06 | 2021-07-23 | 上海交通大学 | Automatic search system of grouping cipher actual key information based on graph theory |
CN114268482A (en) * | 2021-12-15 | 2022-04-01 | 北京工业大学 | A Fast Policy Retrieval Method Based on Attribute Bloom Filter |
CN114268482B (en) * | 2021-12-15 | 2024-12-13 | 北京工业大学 | A fast strategy retrieval method based on attribute bloom filter |
Also Published As
Publication number | Publication date |
---|---|
CN104038349B (en) | 2017-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104038349B (en) | Effective and verifiable public key searching encryption method based on KP-ABE | |
US11381398B2 (en) | Method for re-keying an encrypted data file | |
Li et al. | Full verifiability for outsourced decryption in attribute based encryption | |
Cui et al. | AKSER: Attribute-based keyword search with efficient revocation in cloud computing | |
Liu et al. | Efficient verifiable public key encryption with keyword search based on KP-ABE | |
CN104038341B (en) | A kind of cross-system of identity-based acts on behalf of re-encryption method | |
Pandiaraja et al. | RETRACTED ARTICLE: A Novel Data Privacy-Preserving Protocol for Multi-data Users by using genetic algorithm | |
CN106789044B (en) | Searchable encryption method for cipher text data public key stored in cloud on grid under standard model | |
CN104967693B (en) | Towards the Documents Similarity computational methods based on full homomorphism cryptographic technique of cloud storage | |
CN108989026A (en) | A kind of voidable method of user property under publish/subscribe environment | |
CN108171066A (en) | The cross-domain searching method of keyword and system in a kind of medical treatment cloud under secret protection | |
CN105024802A (en) | Multi-user and multi-keyword searchable encryption method based on bilinear pairing in cloud storage | |
CN105049196A (en) | Searchable encryption method of multiple keywords at specified location in cloud storage | |
CN104993931A (en) | Multi-user encrypted search method in cloud storage | |
CN110120873A (en) | Mining Frequent Itemsets based on cloud outsourcing transaction data | |
Ying et al. | Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing | |
Sandhia et al. | Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography | |
CN117240452A (en) | A blockchain-based secure sharing method for plateau data | |
KR101140576B1 (en) | Multi?user search system and method of encrypted document | |
Suveetha et al. | Ensuring confidentiality of cloud data using homomorphic encryption | |
Abo-Alian et al. | Auditing-as-a-service for cloud storage | |
CN115174600A (en) | Ciphertext data encryption and safe retrieval method and device for cloud storage system | |
Tang et al. | Aggregation‐Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack | |
Chavan et al. | Secure CRM cloud service using RC5 algorithm | |
CN112637233B (en) | Safe averaging method based on multi-user data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170503 |