CN108156138B - Fine-grained searchable encryption method for fog calculation - Google Patents

Fine-grained searchable encryption method for fog calculation Download PDF

Info

Publication number
CN108156138B
CN108156138B CN201711329739.7A CN201711329739A CN108156138B CN 108156138 B CN108156138 B CN 108156138B CN 201711329739 A CN201711329739 A CN 201711329739A CN 108156138 B CN108156138 B CN 108156138B
Authority
CN
China
Prior art keywords
key
node
terminal user
ciphertext
fog
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711329739.7A
Other languages
Chinese (zh)
Other versions
CN108156138A (en
Inventor
苗银宾
马建峰
伍祈应
王祥宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201711329739.7A priority Critical patent/CN108156138B/en
Publication of CN108156138A publication Critical patent/CN108156138A/en
Application granted granted Critical
Publication of CN108156138B publication Critical patent/CN108156138B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a fine-grained searchable encryption method for fog computing, which is characterized in that a cloud-fog-terminal user system structure is established by utilizing an attribute encryption technology and a searchable encryption technology of a ciphertext strategy, a fog node is used as an agent to share the computing burden of a terminal user by utilizing the attribute encryption technology and the searchable encryption technology of the ciphertext strategy, and the terminal user can quickly generate a trapdoor and decrypt a ciphertext, so that the light-weight searchable encryption is realized, fine-grained access control is supported, only legal data users can perform ciphertext retrieval, the fine-grained searchable encryption method has wide application prospect in an actual scene, fine-grained access control is realized, only legal data users can perform ciphertext retrieval, and the fine-grained encryption method has wide prospect in the actual scene.

Description

Fine-grained searchable encryption method for fog calculation
Technical Field
The invention belongs to the technical field of information security, and particularly relates to an attribute encryption technology and a searchable encryption technology of a ciphertext strategy, which can be used for realizing searchable encryption of fine granularity in the background of fog calculation.
Background
The internet of things is a technology capable of connecting objects to the internet to enable the objects to be more intelligent, and with the continuous increase of networking equipment, mass data generated can be stored and calculated through cloud computing, and terminal users are released from heavy equipment maintenance and data management. However, the traditional cloud computing has the problems of poor mobility, high time delay and the like of a network architecture, which brings great challenges to the development of the internet of things. Cloud computing is expanded to the edge of a network by the aid of fog computing, and the fog nodes serve as intermediaries of the Internet of things and the cloud computing, so that the problems of terminal node request delay, excessive cloud server storage and computing burden, excessive network transmission bandwidth pressure and the like caused by combination of the Internet of things and the cloud computing can be solved. Therefore, the fog calculation has wide application prospect.
However, the fog computing brings convenience and new challenges to data security, and when sensitive data is outsourced to the fog node and the cloud server in a clear text form, the data is out of direct physical control of a data owner, and may suffer from a malicious attack and a serious potential safety hazard. The general solution is to encrypt data before uploading the data, and further, in order to implement fine-grained access control, a data owner wants only an end user satisfying conditions to decrypt a ciphertext, and an identity-based encryption technique, an attribute encryption technique of a key policy, and an attribute encryption technique of a ciphertext policy are proposed in succession. Although the confidentiality of data is guaranteed to a certain extent by encryption, the traditional plaintext retrieval technology cannot be applied to ciphertext. The searchable encryption technology enables the terminal user to perform keyword query on the ciphertext, so that not only is the data security ensured, but also the document which the data user is interested in can be quickly located. Therefore, by combining the attribute encryption technology of the ciphertext strategy and the searchable encryption technology of the ciphertext strategy, not only is efficient ciphertext retrieval realized, but also fine-grained access control is supported.
The calculation and storage cost of the searchable encryption technology of the existing ciphertext strategy is in direct proportion to the complexity of the access strategy, which brings great limitation to the internet of things equipment with limited calculation resources. By establishing a cloud-fog-terminal user system structure, each fog node in fog computing is used as an agent to share a large amount of computing, and the equipment of the Internet of things with limited resources can quickly generate trapdoors and decryption texts. Therefore, how to design and realize a lightweight fine-grained searchable encryption method in the background of fog calculation becomes a critical problem to be solved urgently.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a fine-grained searchable encryption method for fog calculation by utilizing the attribute encryption technology and the searchable encryption technology of a ciphertext strategy. The cloud-fog-terminal user system structure is established, the attribute encryption technology and the searchable encryption technology of the ciphertext strategy are utilized, the fog node is used as an agent to share the calculation burden of a terminal user, the terminal user can quickly generate a trapdoor and decrypt a ciphertext, the lightweight searchable encryption is realized, fine-grained access control is supported, only legal data users can perform ciphertext retrieval, and the cloud-fog-terminal user system structure has wide application prospects in practical scenes.
In order to achieve the above object, the present invention adopts a technical solution that a fine-grained searchable encryption method for fog calculation includes the steps of:
step one, system initialization: the key generation center KGC generates a public parameter pm and a master key msk according to the security parameter k;
step two, generating a key: secret key generation center KGC generates fog node public key PK for fog nodeFNFog node database correlation public key
Figure BDA0001506381500000021
And an authorized terminal user list UL, when a new terminal user joins the terminal user list UL, the key generation center KGC generates a key according to the identity information ID of the terminal userEUAnd end user attribute set
Figure BDA0001506381500000022
Generating an end-user public key PKEUPublic key associated with end user database
Figure BDA0001506381500000023
And dividing the terminal user and the fog node into the generation of the terminal user private key SKEUAnd mist node private key SKFNAnd private key SK of terminal userEUSending to the terminal user, and sending the private key SK of the fog node to the terminal userFNSending the data to a fog node;
step three, an encryption stage: data owner utilizing symmetric key set sτThe plaintext document set F is changed to F1,…,FτEncrypting into a ciphertext document set C ═ C1,…,CτAnd fourthly, the data owner establishes an access control structure P and sends the access control structure P to the fog node, and the fog node is communicated with the end userOver-interaction, set the symmetric key sτCarry out encryption to generate a cipher key set
Figure BDA0001506381500000024
The data owner generates an index set { I } using an access control structure P and a key set WτAnd cipher text key set
Figure BDA0001506381500000031
Index set { IτC and ciphertext document set C ═ C1,…,CτSending the data to a cloud server through a fog node;
step four, generating a trap door: when the terminal user wants to inquire the keyword W', the fog node verifies whether the terminal user is in the authorized user list UL, if not, the operation is terminated, otherwise, the fog node and the terminal user generate the trapdoor T through interactionW'And will sink into the door TW'Sending the attribute set S of the terminal user to a cloud server;
step five, ciphertext search: the cloud server firstly verifies whether the terminal user attribute set S meets the access control structure P, and if not, the operation is terminated; otherwise, the cloud server will trap the door Tw'And index set { IτMatching is carried out, and the ciphertext set C' successfully matched is set as { C }π} and corresponding ciphertext key sets
Figure BDA0001506381500000032
Sending the data to a fog node;
step six, ciphertext decryption: ciphertext key set returned by mist node and terminal user through interactive decryption
Figure BDA0001506381500000033
Obtaining a symmetric key set s of plaintextπAccording to a symmetric key set sπThe returned cipher text set C ═ C is decryptedπGet the plaintext F' ═ Fπ}。
Further, in the step one, the common parameters
Figure BDA0001506381500000034
Master key msk ═ (x, y, { t)i}i∈[1,n]);
Wherein G is a p-order addition cycle group, G0,g1Are two different generators of G, GTIs a cyclic group of p factorial method, e is a bilinear map G → GT,H1Indicates that the set {0,1} is to be aggregated*Mapping to p-order integer Ring ZpX represents a first random number: x is formed as ZpAnd y represents a second random number: y is equal to Zp,tiRepresents a third random number: t is ti∈Zp,i∈[1,n]The value range of i is represented, and the system attribute set U is { att }1,…,attn},attnRepresenting the nth system attribute.
Further, the second step specifically includes the following steps:
firstly, a secret key generation center KGC generates a fog node public key PK for a fog nodeFNMist node database correlation public key
Figure BDA0001506381500000035
And an authorized end user list UL, wherein the fog node public key PKFN=e(g0,g0)yrMist node database correlation public key
Figure BDA0001506381500000036
r represents a fourth random number, r ∈ ZpS represents a random number common to the system, s ∈ Zp
Secondly, when a new terminal user joins the terminal user list UL, the key generation center KGC generates a key according to the identity information ID of the terminal userEUAnd end user attribute set
Figure BDA0001506381500000037
Generating an end-user public key PKEUPublic key associated with end user database
Figure BDA0001506381500000041
Wherein the end-user public key PKEU=e(g0,g0)yuEnd user database related public key
Figure BDA0001506381500000042
u represents a fifth random number: u is as large as Zp
Figure BDA0001506381500000043
J-th attribute representing data user, j ∈ [1, m ∈ >]Representing the value range of j;
thirdly, a secret key generation center KGC generates a terminal user private key SK for the terminal userEUGenerating a private key SK for the fog nodeFNWherein the end-user private key SKEU=(K0,{Kj,1}j∈[1,m]U), mist node private key SKFN=(K1,K2,K3,{Kj,2,Kj,3}j∈[1,m],r),K0Representing the first private key component:
Figure RE-GDA0001602929170000044
K1representing the second private key component:
Figure RE-GDA0001602929170000045
K2represents the third private key component:
Figure RE-GDA0001602929170000046
K3represents the fourth private key component:
Figure RE-GDA0001602929170000047
ajrepresents a sixth random number, aj∈Zp,Kj,1Represents the fifth private key component:
Figure RE-GDA0001602929170000048
mapping rho1Representing the mapping of attributes in the data user' S attribute set S to attributes of the corresponding system attribute set U, i.e.
Figure RE-GDA0001602929170000049
Kj,2Represents the sixth private key component:
Figure RE-GDA00016029291700000410
Kj,3represents the seventh private key component:
Figure RE-GDA00016029291700000411
bjdenotes a seventh random number, bj∈ZpV represents an eighth random number, v ∈ Zp
Fourthly, the secret key generation center KGC uses the secret key SK of the terminal userEUSending to the terminal user, and sending the private key SK of the fog node to the terminal userFNAnd sending the data to the fog node.
Further, the third step specifically includes the following steps:
first, the data owner utilizes a symmetric key set sτThe plaintext document set F is changed to F1,…,FτEncrypting into a ciphertext document set C ═ C1,…,CτA data owner establishes an access control structure P and sends the access control structure P to a selected fog node;
in the second step, the access control structure P is a tree structure, each node in the tree includes a polynomial and a threshold, and the fog node selects a polynomial q for the root node rr(v) And a threshold value kr(v) Where v is an argument, q is the argument when v is 0r(0) θ represents a ninth random number, θ ∈ ZpThreshold value kr(v) In the range of 1. ltoreq. kr(v)≤numr,numrRepresenting the number of child nodes of the root node r;
thirdly, selecting a polynomial q for a non-leaf node xx(v) And a threshold value kx(v) Polynomial qx(v) The following conditions are satisfied:
dx(v)=kx(v)-1,
qx(0)=qparent(x)(index(x));
wherein d isx(v) Denotes qx(v) And q when the argument v is 0x(0)=qparent(x)(index (x)), parent (x) indicates the parent node of node x, index (x) indicates the order of parent (x) child nodes, and a threshold value kx(v) In the range of 1. ltoreq. kx(v)≤numx,numxRepresenting the number of the child nodes of the node x;
the fourth step, selecting a polynomial q for the leaf node ll(v) And a threshold value kl(v) Wherein the polynomial ql(v) Threshold value k ═ Sl(v)=1;
Fifthly, the fog node encrypts a symmetric key sτObtain a temporary ciphertext key CTτAnd the temporary cipher text key CT is usedτSent to the data owner with the temporary cipher text key CTτ=(CT1,CT2,{CTl}l∈L),CT1Representing the first temporary ciphertext key:
Figure BDA0001506381500000051
CT2representing the second temporary ciphertext key:
Figure BDA0001506381500000052
CTlrepresenting the third temporary ciphertext key:
Figure BDA0001506381500000053
l represents a set of leaf child nodes;
sixthly, the data owner encrypts the temporary ciphertext key CTτObtaining a ciphertext key
Figure BDA0001506381500000054
Wherein
Figure BDA0001506381500000055
CT'1Representing the first ciphertext key:
Figure BDA0001506381500000056
CT'2represents the second ciphertext key:
Figure BDA0001506381500000057
CT3representing the third ciphertext key:
Figure BDA0001506381500000058
CCτrepresenting the fourth ciphertext key: CC (challenge collapsar)τ=sτ·e(g0,g0)yhH represents a tenth random number, h ∈ Zp
Seventh step, plaintext document FτThe data owner is a plaintext document FτEstablishing a ciphertext index Iτ,Iτ=(I0,I1,{Il,1,Il,2}l∈L) In which I0Denotes a first index component, I0=e(g0,g0)ys,I1A second index component is represented that is,
Figure BDA0001506381500000059
Il,1a third index component is represented that is,
Figure BDA00015063815000000510
Il,2denotes the fourth index component, Il,2=(s-dl)/H1(W), dlDenotes an eleventh random number, dl∈Zp
Eighth step, the data owner combines the cipher key set
Figure BDA00015063815000000511
Index set { IτC and ciphertext document set C ═ C1,…,CτAnd sending the data to the cloud server through the selected fog node.
Further, the fourth step specifically includes the following steps:
step one, when a terminal user wants to inquire a keyword W', a fog node verifies whether the terminal user is in an authorized user list UL, if not, the operation is terminated, otherwise, the operation is switched to the step two;
second, the fog node generates a first-stage trapdoor TW',1And the first stage trapdoor T is connectedW',1To be sent to the end-user,wherein the first stage trap door TW',1=(T1,{Tj,1}j∈[1,m]),T1Representing a first component of the first stage trapdoor,
Figure BDA0001506381500000061
Tj,1representing a second component of the first stage trapdoor,
Figure BDA0001506381500000062
eta represents a twelfth random number, eta belongs to Zp
Third, the end user receives the first stage trapdoor TW',1Post-generation second stage trapdoor TW',2And the second stage is trapped in the door TW',2Sent to the fog node, wherein the second stage trapdoor TW',2=(T0,T'1,{T'j,1,Tj,2}j∈[1,m]),T0Representing a first component, T, of the second-stage trapdoor0=u+λ,T'1Representing a second component of the second stage trapdoor,
Figure BDA0001506381500000063
a third component representing a second stage trapdoor,
Figure BDA0001506381500000064
Tj,2a fourth component representing the second stage trapdoor,
Figure BDA0001506381500000065
λ represents a thirteenth random number, λ ∈ Zp
Fourthly, the fog node receives the trapdoor T of the second stageW',2Post-forming trapdoor TW'And will trap the door TW'And sending the terminal user attribute set S to a cloud server, wherein
Figure BDA0001506381500000066
T'0Representing a first component, T ', of the trapdoor'0=T0η+r,
Figure BDA0001506381500000067
A second component of the trapdoor is represented,
Figure BDA0001506381500000068
a third component of the trapdoor is represented,
Figure BDA0001506381500000069
further, the step five specifically includes the following steps:
firstly, the cloud server verifies whether the terminal user attribute set S meets the access control structure P, if not, the operation is terminated, and the operation is finished; if yes, turning to the second step;
second, the cloud server is the end user's per attribute
Figure BDA00015063815000000610
Calculating a first intermediate variable
Figure BDA00015063815000000611
And a second intermediate variable
Figure BDA00015063815000000612
Wherein
Figure BDA00015063815000000613
Figure BDA00015063815000000614
In particular, when the equation
Figure BDA00015063815000000615
And H1(W')=H1When the (W) is established, the (W),
wherein
Figure BDA00015063815000000616
Figure BDA00015063815000000617
Thirdly, the cloud server matches the trapdoor T according to the following equationw'And index set { IτThe successfully matched ciphertext set C' and the corresponding ciphertext key set
Figure BDA0001506381500000071
Sending the data to a fog node;
Figure BDA0001506381500000072
further, the sixth step specifically includes the following steps:
the first step is as follows: the fog node calculates the intermediate quantity D of the root node according to a recursion algorithmr
If att (l) ε S, the leaf node intermediate quantities are calculated: dl=e(Katt(l),3,Cl)=e(g0,g0)xvql(0)Wherein q isl(0) A leaf node polynomial q when the argument v is 0l(v) A value of (d);
calculating intermediate quantity of root nodes:
Figure BDA0001506381500000073
if the access structure P has only two layers, the intermediate quantity D of the child node is obtainedxEqual to the leaf node intermediate quantity DlThen D can be solvedr=e(g0,g0)xvqr(0)Terminating the recursion; otherwise to DxCall push-through
Figure BDA0001506381500000074
The solution is continued until recursion reaches the father node of the leaf node, and D can be solvedr=e(g0,g0)xvqr(0)=e(g0,g0)xvθTerminating the recursion; wherein the operator
Figure BDA0001506381500000075
i table index (x), psixSet of random children representing x nodes, | ψx|=kx(v),|ψxThe | representation set ψxJ is the set ψxThe elements of (1); operator
Figure BDA0001506381500000076
x' is a sub-node of node x, psix'Set of random children nodes representing x' nodes, | ψx'|=kx'(v),|ψx'The | representation set ψx'The size of (d);
the second step is that: the fog node calculates a key correlation quantity M and sets a secret text C ═ Cπ} and corresponding ciphertext key sets
Figure BDA0001506381500000077
Sending the data to a terminal user;
Figure BDA0001506381500000078
the third step: the end user can obtain a symmetric key set s of a plaintext according to the following formulaπAnd thus, the dense text set C ═ C is decryptedπGet the plaintext F' ═ Fπ};
Figure BDA0001506381500000079
Compared with the prior art, the invention has the following beneficial technical effects that the problems of poor mobility and high time delay of the network architecture of the existing cloud platform are solved by establishing a cloud-fog-terminal user system structure, the computing burden of the terminal user is shared by a fog node as an agent by combining the attribute encryption technology of a ciphertext strategy and the searchable encryption technology, the contradiction between the security and the retrievability of ciphertext data is solved, the efficiency of generating a trap and decrypting a ciphertext by the terminal user is greatly improved, the lightweight searchable encryption is realized, meanwhile, by correlating the ciphertext with an access control structure and the attribute of a key and a data user, only the data user with the attribute satisfying the access control structure can carry out ciphertext retrieval, the fine-grained access control is realized, and the authorization management of the data user is greatly facilitated, has wide application prospect in actual scenes.
Drawings
FIG. 1 is a schematic diagram of the system of the present invention.
Detailed Description
The invention is further described with reference to the following figures and detailed description.
As shown in fig. 1, the present invention provides a fine-grained searchable encryption method for fog computing, comprising the steps of:
step one, system initialization: and the key generation center KGC generates a public parameter pm and a master key msk according to the security parameter k, wherein:
common parameter
Figure BDA0001506381500000081
Master key msk ═ (x, y, { t)i}i∈[1,n]);
Wherein G is a p-order addition cycle group, G0,g1Are two different generators of G, GTIs a cyclic group of p factorial method, e is a bilinear map G → GT,H1Indicates that the set {0,1} is to be aggregated*Mapping to p-order integer Ring ZpX represents a first random number: x is formed as ZpAnd y represents a second random number: y is equal to Zp,tiRepresents a third random number: t is ti∈Zp,i∈[1,n]The value range of i is represented, and the system attribute set U is { att }1,…,attn},attnRepresenting the nth system attribute.
Step two, generating a key: as shown in FIG. 1, the key generation center KGC generates a fog node public key PK for the fog nodeFNMist node database correlation public key
Figure BDA0001506381500000082
And an authorized terminal user list UL, when a new terminal user joins the terminal user list UL, the key generation center KGC generates a key according to the identity information ID of the terminal userEUAnd end user attribute set
Figure BDA0001506381500000083
Generating an end-user public key PKEUPublic key associated with end user database
Figure BDA0001506381500000091
And dividing the terminal user and the fog node into the generation of the terminal user private key SKEUAnd mist node private key SKFNAnd private key SK of terminal userEUSending to the terminal user, and sending the private key SK of the fog node to the terminal userFNSending the data to the fog node, and specifically comprising the following steps:
firstly, a secret key generation center KGC generates a fog node public key PK for a fog nodeFNMist node database correlation public key
Figure BDA0001506381500000092
And an authorized end user list UL, wherein the fog node public key PKFN=e(g0,g0)yrMist node database correlation public key
Figure BDA0001506381500000093
r represents a fourth random number, r ∈ ZpS represents a random number common to the system, s ∈ Zp
Secondly, when a new terminal user joins the terminal user list UL, the key generation center KGC generates a key according to the identity information ID of the terminal userEUAnd end user attribute set
Figure BDA0001506381500000094
Generating an end-user public key PKEUPublic key associated with end user database
Figure BDA0001506381500000095
Wherein the end-user public key PKEU=e(g0,g0)yuEnd user database related public key
Figure BDA0001506381500000096
u represents the numberFive random numbers: u is as large as Zp
Figure BDA0001506381500000097
J-th attribute representing data user, j ∈ [1, m ∈ >]Representing the value range of j;
thirdly, a secret key generation center KGC generates a terminal user private key SK for the terminal userEUGenerating a mist node private key SK for the mist nodeFNWherein the end-user private key SKEU=(K0,{Kj,1}j∈[1,m]U), mist node private key SKFN=(K1,K2,K3,{Kj,2,Kj,3}j∈[1,m],r),K0Representing the first private key component:
Figure RE-GDA0001602929170000098
K1representing the second private key component:
Figure RE-GDA0001602929170000099
K2represents the third private key component:
Figure RE-GDA00016029291700000910
K3represents the fourth private key component:
Figure RE-GDA00016029291700000911
ajrepresents a sixth random number, aj∈Zp,Kj,1Represents the fifth private key component:
Figure RE-GDA00016029291700000912
mapping rho1Representing the mapping of attributes in the data user' S attribute set S to attributes of the corresponding system attribute set U, i.e.
Figure RE-GDA00016029291700000913
Kj,2Represents the sixth private key component:
Figure RE-GDA00016029291700000914
Kj,3denotes the seventhPrivate key component:
Figure RE-GDA00016029291700000915
bjdenotes a seventh random number, bj∈ZpV represents an eighth random number, v ∈ Zp
Fourthly, the secret key generation center KGC uses the secret key SK of the terminal userEUSending to the terminal user, and sending the private key SK of the fog node to the terminal userFNAnd sending the data to the fog node.
Step three, an encryption stage: as shown in FIG. 1, the data owner utilizes a symmetric key set sτThe plaintext document set F is changed to F1,…,FτEncrypting into a ciphertext document set C ═ C1,…,CτAnd fourthly, the data owner establishes an access control structure P and sends the access control structure P to the fog node, and the fog node interacts with the terminal user to obtain the symmetric key set { s }τCarry out encryption to generate a cipher key set
Figure BDA0001506381500000101
The data owner generates an index set { I } using an access control structure P and a key set WτAnd cipher text key set
Figure BDA0001506381500000102
Index set { IτC and ciphertext document set C ═ C1,…,CτSending the data to a cloud server through a fog node, specifically comprising the following steps:
first, the data owner utilizes a symmetric key set sτThe plaintext document set F is changed to F1,…,FτEncrypting into a ciphertext document set C ═ C1,…,CτA data owner establishes an access control structure P and sends the access control structure P to a selected fog node;
in the second step, the access control structure P is a tree structure, each node in the tree includes a polynomial and a threshold, and the fog node selects a polynomial q for the root node rr(v) And a threshold value kr(v) Where v is an argument, when the argument v is 0,qr(0) θ represents a ninth random number, θ ∈ ZpThreshold value kr(v) In the range of 1. ltoreq. kr(v)≤numr,numrRepresenting the number of child nodes of the root node r;
thirdly, selecting a polynomial q for a non-leaf node xx(v) And a threshold value kx(v) Polynomial qx(v) The following conditions are satisfied:
dx(v)=kx(v)-1,
qx(0)=qparent(x)(index(x));
wherein d isx(v) Denotes qx(v) And q when the argument v is 0x(0)=qparent(x)(index (x)), parent (x) indicates the parent node of node x, index (x) indicates the order of parent (x) child nodes, and a threshold value kx(v) In the range of 1. ltoreq. kx(v)≤numx,numxRepresenting the number of the child nodes of the node x;
the fourth step, selecting a polynomial q for the leaf node ll(v) And a threshold value kl(v) Wherein the polynomial ql(v) Threshold value k ═ Sl(v)=1;
Fifthly, the fog node encrypts a symmetric key sτObtain a temporary ciphertext key CTτAnd the temporary cipher text key CT is usedτSent to the data owner with the temporary cipher text key CTτ=(CT1,CT2,{CTl}l∈L),CT1Representing the first temporary ciphertext key:
Figure BDA0001506381500000111
CT2representing the second temporary ciphertext key:
Figure BDA0001506381500000112
CTlrepresenting the third temporary ciphertext key:
Figure BDA0001506381500000113
l represents a set of leaf child nodes;
sixth, data possessionPerson encrypts temporary cipher text key CTτObtaining a ciphertext key
Figure BDA0001506381500000114
Wherein
Figure BDA0001506381500000115
CT'1Representing the first ciphertext key:
Figure BDA0001506381500000116
CT'2represents the second ciphertext key:
Figure BDA0001506381500000117
CT3representing the third ciphertext key:
Figure BDA0001506381500000118
CCτrepresenting the fourth ciphertext key: CC (challenge collapsar)τ=sτ·e(g0,g0)yhH represents a tenth random number, h ∈ Zp
Seventh step, plaintext document FτThe data owner is a plaintext document FτEstablishing a ciphertext index Iτ,Iτ=(I0,I1,{Il,1,Il,2}l∈L) In which I0Denotes a first index component, I0=e(g0,g0)ys,I1A second index component is represented that is,
Figure BDA0001506381500000119
Il,1a third index component is represented that is,
Figure BDA00015063815000001110
Il,2denotes the fourth index component, Il,2=(s-dl)/H1(W), dlDenotes an eleventh random number, dl∈Zp
Eighth step, the data owner combines the cipher key set
Figure BDA00015063815000001111
Index set { IτC and ciphertext document set C ═ C1,…,CτAnd sending the data to the cloud server through the selected fog node.
Step four, generating a trap door: as shown in fig. 1 c, when the end user wants to query the keyword W', the fog node verifies whether the end user is in the authorized user list UL, and if not, the operation is terminated, otherwise, the fog node and the end user generate the trapdoor T through interactionW'And will trap the door TW'And sending the terminal user attribute set S to a cloud server, and specifically comprising the following steps:
step one, when a terminal user wants to inquire a keyword W', a fog node verifies whether the terminal user is in an authorized user list UL, if not, the operation is terminated, otherwise, the operation is switched to the step two;
second, the fog node generates a first-stage trapdoor TW',1And the first stage trapdoor T is connectedW',1Sent to the end user, wherein the first stage trapdoor TW',1=(T1,{Tj,1}j∈[1,m]),T1Representing a first component of the first stage trapdoor,
Figure BDA00015063815000001112
Tj,1representing a second component of the first stage trapdoor,
Figure BDA00015063815000001113
eta represents a twelfth random number, eta belongs to Zp
Third, the end user receives the first stage trapdoor TW',1Post-generation second stage trapdoor TW',2And the second stage is trapped in the door TW',2Sent to the fog node, wherein the second stage trapdoor TW',2=(T0,T'1,{T'j,1,Tj,2}j∈[1,m]),T0Representing a first component, T, of the second-stage trapdoor0=u+λ,T'1Representing a second component of the second stage trapdoor,
Figure BDA0001506381500000121
T'j,1a third component representing a second stage trapdoor,
Figure BDA0001506381500000122
Tj,2a fourth component representing the second stage trapdoor,
Figure BDA0001506381500000123
λ represents a thirteenth random number, λ ∈ Zp
Fourthly, the fog node receives the trapdoor T of the second stageW',2Post-forming trapdoor TW'And will trap the door TW'And sending the terminal user attribute set S to a cloud server, wherein
Figure BDA0001506381500000124
T'0Representing a first component, T ', of the trapdoor'0=T0η+r,
Figure BDA0001506381500000125
A second component of the trapdoor is represented,
Figure BDA0001506381500000126
a third component of the trapdoor is represented,
Figure BDA0001506381500000127
step five, ciphertext search: as shown in the ((r) of fig. 1), the cloud server first verifies whether the end user attribute set S satisfies the access control structure P, and if not, terminates the operation; otherwise, the cloud server will trap the door Tw'And index set { IτMatching is carried out, and the ciphertext set C' successfully matched is set as { C }π} and corresponding ciphertext key sets
Figure BDA0001506381500000128
Sending the data to the fog node, specifically comprising the following steps:
firstly, the cloud server verifies whether the terminal user attribute set S meets the access control structure P, if not, the operation is terminated, and the operation is finished; if yes, turning to the second step;
second, the cloud server is the end user's per attribute
Figure BDA0001506381500000129
Calculating a first intermediate variable
Figure BDA00015063815000001210
And a second intermediate variable
Figure BDA00015063815000001211
Wherein
Figure BDA00015063815000001212
Figure BDA00015063815000001213
In particular, when the equation
Figure BDA00015063815000001214
And H1(W')=H1When the (W) is established, the (W),
wherein
Figure BDA00015063815000001215
Figure BDA00015063815000001216
Thirdly, the cloud server matches the trapdoor T according to the following equationw'And index set { IτThe successfully matched ciphertext set C' and the corresponding ciphertext key set
Figure BDA00015063815000001217
Sending the data to a fog node;
Figure BDA00015063815000001218
step six, ciphertext decryption: as indicated by the fifth in figure 1And the fog node and the terminal user decrypt the returned cipher key set through interaction
Figure BDA0001506381500000131
Obtaining a symmetric key set s of plaintextπAccording to a symmetric key set sπThe returned cipher text set C ═ C is decryptedπGet the plaintext F ═ F } ═ FπThe method specifically comprises the following steps:
the first step is as follows: the fog node calculates the intermediate quantity D of the root node according to a recursion algorithmr
If att (l) ε S, the leaf node intermediate quantities are calculated: dl=e(Katt(l),3,Cl)=e(g0,g0)xvql(0)Wherein q isl(0) A leaf node polynomial q when the argument v is 0l(v) A value of (d);
calculating intermediate quantity of root nodes:
Figure BDA0001506381500000132
if the access structure P has only two layers, the intermediate quantity D of the child node is obtainedxEqual to the leaf node intermediate quantity DlThen D can be solvedr=e(g0,g0)xvqr(0)Terminating the recursion; otherwise to DxCall push-through
Figure BDA0001506381500000133
The solution is continued until recursion reaches the father node of the leaf node, and D can be solvedr=e(g0,g0)xvqr(0)=e(g0,g0)xvθTerminating the recursion; wherein the operator
Figure BDA0001506381500000134
i table index (x), psixSet of random children representing x nodes, | ψx|=kx(v),|ψxThe | representation set ψxJ is the set ψxThe elements of (1); operator
Figure BDA0001506381500000135
x' is a sub-node of node x, psix'Set of random children nodes representing x' nodes, | ψx'|=kx'(v),|ψx'The | representation set ψx'The size of (d);
the second step is that: the fog node calculates a key correlation quantity M and sets a secret text C ═ Cπ} and corresponding ciphertext key sets
Figure BDA0001506381500000136
Sending the data to a terminal user;
Figure BDA0001506381500000137
the third step: the end user can obtain a symmetric key set s of a plaintext according to the following formulaπAnd thus, the dense text set C ═ C is decryptedπGet the plaintext F' ═ Fπ};
Figure BDA0001506381500000138
The above description is only one specific example of the present invention and should not be construed as limiting the invention in any way. It will be apparent to those skilled in the art that, after understanding the present disclosure and principles, algorithmic modifications and improvements may be made without departing from the principles and structures of the invention, and such modifications and improvements based on the inventive algorithms are intended to be within the scope of the claims.

Claims (7)

1. A fine-grained searchable encryption method for fog computing, comprising the steps of:
step one, system initialization: the key generation center KGC generates a public parameter pm and a master key msk according to the security parameter k;
step two, generating a key: secret key generation center KGC generates fog node public key PK for fog nodeFNMist node database correlation public key
Figure FDA0002646657110000011
And an authorized terminal user list UL, when a new terminal user joins the terminal user list UL, the key generation center KGC generates a key according to the identity information ID of the terminal userEUAnd end user attribute set
Figure FDA0002646657110000012
Generating an end-user public key PKEUPublic key associated with end user database
Figure FDA0002646657110000013
And dividing the terminal user and the fog node into the generation of the terminal user private key SKEUAnd mist node private key SKFNAnd private key SK of terminal userEUSending to the terminal user, and sending the private key SK of the fog node to the terminal userFNSending the data to a fog node;
step three, an encryption stage: data owner utilizing symmetric key set sτThe plaintext document set F is changed to F1,…,FτEncrypting into a ciphertext document set C ═ C1,…,CτAnd fourthly, the data owner establishes an access control structure P and sends the access control structure P to the fog node, and the fog node interacts with the terminal user to obtain the symmetric key set { s }τCarry out encryption to generate a cipher key set
Figure FDA0002646657110000014
The data owner generates an index set { I } using an access control structure P and a key set WτAnd cipher text key set
Figure FDA0002646657110000015
Index set { IτC and ciphertext document set C ═ C1,…,CτSending the data to a cloud server through a fog node;
step four, generating a trap door: when the terminal user wants to inquire the keyword W', the fog node verifies whether the terminal user is in the authorized user list UL, if not, the operation is terminated, otherwise, the fog node and the terminal user interact with each otherGenerating trapdoors TW′And will trap the door TW′Sending the attribute set S of the terminal user to a cloud server;
step five, ciphertext search: the cloud server firstly verifies whether the terminal user attribute set S meets the access control structure P, and if not, the operation is terminated; otherwise, the cloud server will trap the door Tw′And index set { IτMatching is carried out, and the ciphertext set C' successfully matched is set as { C }π} and corresponding ciphertext key sets
Figure FDA0002646657110000016
Sending the data to a fog node;
step six, ciphertext decryption: ciphertext key set returned by mist node and terminal user through interactive decryption
Figure FDA0002646657110000017
Obtaining a symmetric key set s of plaintextπAccording to a symmetric key set sπThe returned cipher text set C ═ C is decryptedπGet the plaintext F' ═ Fπ}。
2. The fine-grained searchable encryption method for fog calculation as recited in claim 1, wherein in step one, common parameters
Figure FDA0002646657110000018
Master key msk ═ (x, y, { t)i}i∈[1,n]);
Wherein G is a p-order addition cycle group, G0,g1Are two different generators of G, GTIs a cyclic group of p factorial method, e is a bilinear map GXG → GT,H1Indicates that the set {0,1} is to be aggregated*Mapping to p-order integer Ring ZpX represents a first random number: x is formed as ZpAnd y represents a second random number: y is equal to Zp,tiRepresents a third random number: t is ti∈Zp,i∈[1,n]The value range of i is represented, and the system attribute set U is equal to{att1,…,attn},attnRepresenting the nth system attribute.
3. The fine-grained searchable encryption method for fog calculation according to claim 2, wherein said second step specifically comprises the steps of:
firstly, a secret key generation center KGC generates a fog node public key PK for a fog nodeFNMist node database correlation public key
Figure FDA0002646657110000021
And an authorized end user list UL, wherein the fog node public key PKFN=e(g0,g0)yrMist node database correlation public key
Figure FDA0002646657110000022
Figure FDA0002646657110000023
r represents a fourth random number, r ∈ ZpS represents a random number common to the system, s ∈ Zp
Secondly, when a new terminal user joins the terminal user list UL, the key generation center KGC generates a key according to the identity information ID of the terminal userEUAnd end user attribute set
Figure FDA0002646657110000024
Generating an end-user public key PKEUPublic key associated with end user database
Figure FDA0002646657110000025
Wherein the end-user public key PKEU=e(g0,g0)yuEnd user database related public key
Figure FDA0002646657110000026
Figure FDA0002646657110000027
u represents a fifth random number: u is as large as Zp
Figure FDA0002646657110000028
J-th attribute representing data user, j ∈ [1, m ∈ >]Representing the value range of j;
thirdly, a secret key generation center KGC generates a terminal user private key SK for the terminal userEUGenerating a mist node private key SK for the mist nodeFNWherein the end-user private key SKEU=(K0,{Kj,1}j∈[1,m]U), mist node private key SKFN=(K1,K2,K3,{Kj,2,Kj,3}j∈[1,m],r),K0Representing the first private key component:
Figure FDA0002646657110000029
K1representing the second private key component:
Figure FDA00026466571100000210
Figure FDA00026466571100000211
K2represents the third private key component:
Figure FDA00026466571100000212
K3represents the fourth private key component:
Figure FDA00026466571100000213
ajrepresents a sixth random number, aj∈Zp,Kj,1Represents the fifth private key component:
Figure FDA00026466571100000214
mapping rho1Indicating the mapping of attributes in the data user' S attribute set S to attributes of the corresponding system attribute set U, i.e.
Figure FDA00026466571100000215
Kj,2Represents the sixth private key component:
Figure FDA00026466571100000216
Kj,3represents the seventh private key component:
Figure FDA00026466571100000217
bjdenotes a seventh random number, bj∈ZpV represents an eighth random number, v ∈ Zp
Fourthly, the secret key generation center KGC uses the secret key SK of the terminal userEUSending to the terminal user, and sending the private key SK of the fog node to the terminal userFNAnd sending the data to the fog node.
4. The fine-grained searchable encryption method for fog calculation according to claim 3, wherein said step three specifically comprises the steps of:
first, the data owner utilizes a symmetric key set sτThe plaintext document set F is changed to F1,…,FτEncrypting into a ciphertext document set C ═ C1,…,CτA data owner establishes an access control structure P and sends the access control structure P to a selected fog node;
secondly, the access control structure P is a tree structure, each node in the tree comprises a polynomial and a threshold value, and the fog node selects a polynomial q for the root node rr(v) And a threshold value kr(v) Where v is an argument, q is the argument when v is 0r(0) θ represents a ninth random number, θ ∈ ZpThreshold value kr(v) In the range of 1. ltoreq. kr(v)≤numr,numrRepresenting the number of r child nodes of the root node;
thirdly, selecting a polynomial q for a non-leaf node xx(v) And a threshold value kx(v) Polynomial qx(v) The following conditions are satisfied:
dx(v)=kx(v)-1,
Figure FDA0002646657110000032
wherein d isx(v) Denotes qx(v) And when the argument v is 0,
Figure FDA0002646657110000033
parent (x) indicates the parent of node x, index (x) indicates the order of parent (x) children, and threshold kx(v) In the range of 1. ltoreq. kx(v)≤numx,numxRepresenting the number of the child nodes of the node x;
the fourth step, selecting a polynomial q for the leaf node ll(v) And a threshold value kl(v) Wherein the polynomial ql(v) Threshold value k ═ Sl(v)=1;
Fifthly, the fog node encrypts a symmetric key sτObtain a temporary ciphertext key CTτAnd the temporary cipher text key CT is usedτSent to the data owner, where the temporary cipher text key CTτ=(CT1,CT2,{CTl}l∈L),CT1Representing the first temporary ciphertext key:
Figure FDA0002646657110000031
CT2representing the second temporary ciphertext key:
Figure FDA0002646657110000041
CTlrepresenting the third temporary ciphertext key:
Figure FDA0002646657110000042
l represents a set of leaf nodes;
sixthly, the data owner encrypts the temporary ciphertext key CTτObtaining a ciphertext key
Figure FDA0002646657110000043
Wherein
Figure FDA0002646657110000044
Figure FDA00026466571100000411
CT′1Representing the first ciphertext key:
Figure FDA0002646657110000045
CT′2representing the second ciphertext key:
Figure FDA00026466571100000412
CT3representing the third ciphertext key:
Figure FDA00026466571100000413
CCτrepresenting the fourth ciphertext key: CC (challenge collapsar)τ=sτ·e(g0,g0)yhH represents a tenth random number, h ∈ Zp
Seventh step, plaintext document FτThe data owner is a plaintext document FτEstablishing a ciphertext index Iτ,Iτ=(I0,I1,{Il,1,Il,2}l∈L) In which I0Denotes a first index component, I0=e(g0,g0)ys,I1A second index component is represented that is,
Figure FDA0002646657110000046
Il,1a third index component is represented that is,
Figure FDA0002646657110000047
Il,2denotes the fourth index component, Il,2=(s-dl)/H1(W),dlDenotes an eleventh random number, dl∈Zp
Eighth step, the data owner combines the cipher key set
Figure FDA0002646657110000048
Index set { IτC and ciphertext document set C ═ C1,…,CτAnd sending the data to the cloud server through the selected fog node.
5. The fine-grained searchable encryption method for fog calculation according to claim 4, wherein said step four specifically comprises the steps of:
step one, when a terminal user wants to inquire a keyword W', a fog node verifies whether the terminal user is in an authorized user list UL, if not, the operation is terminated, otherwise, the operation is switched to the step two;
second, the fog node generates a first-stage trapdoor TW′,1And the first stage trapdoor T is connectedW′,1Sent to the end user, wherein the first stage trapdoor TW′,1=(T1,{Tj,1}j∈[1,m]),T1Representing a first component of the first stage trapdoor,
Figure FDA0002646657110000049
Tj,1representing a second component of the first stage trapdoor,
Figure FDA00026466571100000410
eta represents a twelfth random number, eta belongs to Zp
Third, the end user receives the first stage trapdoor TW′,1Post-generation second stage trapdoor TW′,2And the second stage is trapped in the door TW′,2Sent to the fog node, wherein the second stage trapdoor TW′,2=(T0,T′1,{T′j,1,Tj,2}j∈[1,m]),T0Representing a first component, T, of the second-stage trapdoor0=u+λ,T′1Representing a second component of the second stage trapdoor,
Figure FDA0002646657110000051
T′j,1a third component representing a second stage trapdoor,
Figure FDA0002646657110000052
Tj,2a fourth component representing the second stage trapdoor,
Figure FDA00026466571100000512
λ represents a thirteenth random number, λ ∈ Zp
Fourthly, the fog node receives the trapdoor T of the second stageW′,2Post-forming trapdoor TW′And will trap the door TW′And sending the terminal user attribute set S to the cloud server, wherein
Figure FDA00026466571100000513
T′0Representing a first component, T ', of the trapdoor'0=T0η+r,
Figure FDA0002646657110000053
A second component of the trapdoor is represented,
Figure FDA00026466571100000514
T′j,2a third component of the trapdoor is represented,
Figure FDA0002646657110000054
6. the fine-grained searchable encryption method for fog calculation according to claim 5, wherein said step five specifically comprises the steps of:
firstly, the cloud server verifies whether the terminal user attribute set S meets the access control structure P, if not, the operation is terminated, and the operation is finished; if yes, turning to the second step;
second, the cloud server is the end user's per attribute
Figure FDA0002646657110000055
Calculating a first intermediate variable
Figure FDA0002646657110000056
And a second intermediate variable
Figure FDA0002646657110000057
Wherein
Figure FDA0002646657110000058
In particular, when the equation
Figure FDA00026466571100000515
And H1(W′)=H1When the (W) is established, the (W),
wherein
Figure FDA0002646657110000059
Thirdly, the cloud server matches the trapdoor T according to the following equationw′And index set { IτThe successfully matched ciphertext set C' and the corresponding ciphertext key set
Figure FDA00026466571100000510
Sending the data to a fog node;
Figure FDA00026466571100000511
7. the fine-grained searchable encryption method for fog calculation according to claim 4, wherein said step six specifically comprises the steps of:
the first step is as follows: the fog node calculates the intermediate quantity D of the root node according to a recursion algorithmr
If att (l) ε S, the leaf node intermediate quantities are calculated:
Figure FDA00026466571100000516
wherein q isl(0) A leaf node polynomial q when the argument v is 0l(v) A value of (d); calculating intermediate quantity of root nodes:
Figure FDA00026466571100000517
if the access structure P has only two layers, the intermediate quantity D of the child node is obtainedxEqual to the leaf node intermediate quantity DlCan solve out
Figure FDA0002646657110000066
Figure FDA0002646657110000067
Terminating the recursion; otherwise to DxCall push-through
Figure FDA0002646657110000068
The solution is continued until the parent node of the leaf node is recurred, and the solution can be obtained
Figure FDA0002646657110000069
Terminating the recursion; wherein the operator
Figure FDA0002646657110000061
i table index (x), psixSet of random children representing x nodes, | ψx|=kx(v),|ψxThe | representation set ψxJ is the set ψxThe elements of (1); operator
Figure FDA0002646657110000062
x' is a sub-node of node x, psix′Set of random children nodes representing x' nodes, | ψx′|=kx′(v),|ψx′The | representation set ψx′The size of (d);
the second step is that: the fog node calculates a key correlation quantity M and sets a secret text C ═ CπAnd the phasesCorresponding cipher text key set
Figure FDA0002646657110000063
Sending the data to a terminal user;
Figure FDA0002646657110000064
the third step: the end user can obtain a symmetric key set s of a plaintext according to the following formulaπAnd thus, the dense text set C ═ C is decryptedπGet the plaintext F' ═ Fπ};
Figure FDA0002646657110000065
CN201711329739.7A 2017-12-13 2017-12-13 Fine-grained searchable encryption method for fog calculation Active CN108156138B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711329739.7A CN108156138B (en) 2017-12-13 2017-12-13 Fine-grained searchable encryption method for fog calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711329739.7A CN108156138B (en) 2017-12-13 2017-12-13 Fine-grained searchable encryption method for fog calculation

Publications (2)

Publication Number Publication Date
CN108156138A CN108156138A (en) 2018-06-12
CN108156138B true CN108156138B (en) 2020-10-27

Family

ID=62466711

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711329739.7A Active CN108156138B (en) 2017-12-13 2017-12-13 Fine-grained searchable encryption method for fog calculation

Country Status (1)

Country Link
CN (1) CN108156138B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639425B (en) * 2018-11-07 2020-05-19 华中科技大学 Lightweight searchable public key encryption method and storage medium in side computing environment
CN110138538B (en) * 2019-05-09 2022-06-21 南京邮电大学 Smart grid security and privacy protection data aggregation method based on fog calculation
CN110300104B (en) * 2019-06-21 2021-10-22 山东超越数控电子股份有限公司 User authority control and transfer method and system under edge cloud scene
CN110602086B (en) * 2019-09-10 2021-10-26 北京工业大学 Repealable and outsourced multi-authorization center attribute-based encryption method in fog computing
CN110933026B (en) * 2019-10-22 2021-06-04 东北大学 Lightweight privacy protection equivalent query method
CN111190925B (en) * 2019-10-30 2023-07-21 重庆邮电大学 Multi-dimensional query method, system and storage medium for edge computing
CN111447192B (en) * 2020-03-23 2022-05-10 齐鲁工业大学 Lightweight attribute base signcryption method for cloud and mist assisted Internet of things
CN111431898B (en) * 2020-03-23 2022-06-07 齐鲁工业大学 Multi-attribute mechanism attribute-based encryption method with search function for cloud-assisted Internet of things
CN111930688B (en) * 2020-09-23 2021-01-08 西南石油大学 Method and device for searching secret data of multi-keyword query in cloud server
CN112311781B (en) * 2020-10-23 2021-11-12 西安电子科技大学 Encryption method with safe forward and backward direction and recoverable keyword shielding
CN114826703B (en) * 2022-04-11 2024-04-05 江苏大学 Block chain-based data search fine granularity access control method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357395A (en) * 2016-09-13 2017-01-25 深圳大学 Outsourcing access control method and system aiming at fog computing
CN106850652A (en) * 2017-02-21 2017-06-13 重庆邮电大学 One kind arbitration can search for encryption method
CN107395568A (en) * 2017-06-21 2017-11-24 西安电子科技大学 A kind of cipher text retrieval method of more data owner's certifications

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100146299A1 (en) * 2008-10-29 2010-06-10 Ashwin Swaminathan System and method for confidentiality-preserving rank-ordered search

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357395A (en) * 2016-09-13 2017-01-25 深圳大学 Outsourcing access control method and system aiming at fog computing
CN106850652A (en) * 2017-02-21 2017-06-13 重庆邮电大学 One kind arbitration can search for encryption method
CN107395568A (en) * 2017-06-21 2017-11-24 西安电子科技大学 A kind of cipher text retrieval method of more data owner's certifications

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Fogging the cloud—Implementing and evaluating searchable encryption schemes in practice;Koschuch M et al;《IEEE》;20150702;第1365-1368页 *
支持多关键字的可搜索公钥加密方案;李昊星 等;《西安电子科技大学学报(自然科学版)》;20151106;第20-25页 *

Also Published As

Publication number Publication date
CN108156138A (en) 2018-06-12

Similar Documents

Publication Publication Date Title
CN108156138B (en) Fine-grained searchable encryption method for fog calculation
CN108156140B (en) Multi-keyword searchable encryption method supporting numerical value attribute comparison
Luo et al. Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks
CN108599937B (en) Multi-keyword searchable public key encryption method
CN106375346B (en) Data guard method based on condition broadcast agent re-encryption under a kind of cloud environment
CN111143471B (en) Ciphertext retrieval method based on blockchain
CN105323061B (en) It is a kind of can keyword search outsourcing key generate and decryption attribute based system and decryption method
CN103944711B (en) Cloud storage ciphertext retrieval method and system
CN107276766B (en) Multi-authorization attribute encryption and decryption method
CN109361644B (en) Fuzzy attribute based encryption method supporting rapid search and decryption
CN110022309B (en) Safe and efficient data sharing method in mobile cloud computing system
CN111431898B (en) Multi-attribute mechanism attribute-based encryption method with search function for cloud-assisted Internet of things
CN114826703A (en) Block chain-based data search fine-grained access control method and system
CN106506474A (en) A kind of efficient traceable data sharing method based on mobile cloud environment
Kaushik et al. Multi-user attribute based searchable encryption
CN113794561A (en) Public key searchable encryption method and system
Liu et al. Secure and efficient multi-authority attribute-based encryption scheme from lattices
CN113489591A (en) Traceable comparison attribute encryption method based on multiple authorization centers
CN109740383B (en) Privacy protection control method for fog computing-oriented medical system
CN106301776A (en) Many authorization center outsourcing attribute base encryption method of a kind of keyword search and system
CN113468440A (en) Anonymous query method for protecting location privacy based on SF-blind filtering protocol
CN109412809B (en) SDN information access control method based on authenticatable hierarchical attribute encryption
CN112804052A (en) User identity encryption method based on composite order group
CN104144057A (en) CP-ABE method for generating security decryption secret key
CN108632257B (en) Method and system for acquiring encrypted health record supporting hierarchical search

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant