CN104038349A - Effective and verifiable public key searching encryption method based on KP-ABE - Google Patents

Effective and verifiable public key searching encryption method based on KP-ABE Download PDF

Info

Publication number
CN104038349A
CN104038349A CN201410316818.4A CN201410316818A CN104038349A CN 104038349 A CN104038349 A CN 104038349A CN 201410316818 A CN201410316818 A CN 201410316818A CN 104038349 A CN104038349 A CN 104038349A
Authority
CN
China
Prior art keywords
search
data
cloud server
keyword
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410316818.4A
Other languages
Chinese (zh)
Other versions
CN104038349B (en
Inventor
马华
刘鹏亮
王剑锋
聂海新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201410316818.4A priority Critical patent/CN104038349B/en
Publication of CN104038349A publication Critical patent/CN104038349A/en
Application granted granted Critical
Publication of CN104038349B publication Critical patent/CN104038349B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses an effective and verifiable public key searching encryption method based on the KP-ABE. According to the method, a creditable authority center, a data owner, a cloud server and a data user are included. The creditable authority center generates a certificate for all cloud users; the data owner outsources a data file and a keyword to the cloud server; the cloud server executes searching operation after providing a storage service and receiving a searching request sent by a user; the data user generates a searching password and sends the password to the cloud sever to search for a target file. According to an effective and verifiable public key searching encryption method based on the KP-ABE, a public and private key pair is generated for the data owner and the cloud server, when the ciphertext keyword and the searching command are sent, the public key pair of the cloud sever is used for encrypting the ciphertext keyword and the searching command firstly, the off-line conjecture aggressive behavior of an external attacker is effectively prevented, and the safety of information and data is improved. In addition, complexity is lowered, the calculation amount of the user is largely reduced, and the efficiency is largely improved.

Description

A kind of PKI that effectively can verify based on KP-ABE can be searched for encryption method
Technical field
The invention belongs to field of data encryption, relate in particular to a kind of PKI that effectively can verify based on KP-ABE and can search for encryption method.
Background technology
PKI can be searched for and encrypt is a very attractive cryptography primitive, and it has realized the information retrieval based on ciphertext, is specially adapted to cloud computing environment.PKI can be searched for encipherment scheme (PEKS) and make user rely on keyword in the situation that not revealing any information, to search for enciphered data.The concept of PEKS is by propositions such as Boneh, and the people such as Baek have proposed a kind of PEKS that removes escape way, make scheme more practical.After this, the people such as the people such as Hu and Zhao has proposed to resist new departure of external attacker off-line keyword conjecture.In brief, the concept of PEKS is to provide that a kind of user relies on keyword removal search enciphered data and not to comprising that its other party of server reveals the mechanism of any information.Along with the fast development of cloud computing, make user to use a large amount of storages of Cloud Server and the ability of calculating with cheap price.This makes PEKS become more popular.Although at present existing PEKS can complete search operation safely and effectively, however the Search Results that most variations is not returned server verify, search subscriber is not limited simultaneously yet.Under the model of one and half honest but believable servers, server may an operating part search operation or returning part Search Results only.For this problem, the people such as Zheng have proposed a new cryptography primitive---the keyword search scheme of verifying based on encryption attribute for this problem first.This scheme allows data owner to remove to control search operation.The validated user of access control policy time-consuming search operation can be contracted out to Cloud Server and effectively authentication server whether carried out truly search operation.This means, the user who possesses the condition of the access strategy that meets data owner just can search for the enciphered data on Cloud Server.In addition the Search Results that, user can also return server carries out the checking of correctness and integrality.This scheme is used module exponent, encryption attribute, and Bloom filter, digital signature and the structure of the keyword search based on encryption attribute form.Yet the operation that this scheme is done in verification of correctness is identical with the way of Cloud Server, yet for user oneself, this needs very large amount of calculation.In addition, this scheme has been neglected off-line guessing attack.Because keyword ciphertext, search password and algorithm are easy to be obtained by opponent, opponent just can carry out search operation like this, thereby breaks the indistinguishability of keyword ciphertext.
Summary of the invention
The object of the present invention is to provide a kind of PKI that effectively can verify based on KP-ABE can search for encryption method, be intended to greatly reduce user's operand aspect verification of correctness, utilize the PKI of server to encrypt again keyword ciphertext, prevent the off-line guessing attack of external attacker, improve the fail safe of scheme.
Symbol description:
F={F 1|| { F 2|| ... || { F n}: the set of encrypt file;
ID{F i}: file { F iaddress;
ID w: the address of the file that comprises keyword w;
W e: the ciphertext of W;
BF: the Bloom filter that comprises all keywords;
SYM enc(): symmetric encipherment algorithm;
ABE (): the encryption attribute algorithm based on key strategy.
The present invention realizes like this, the PKI that effectively can verify based on KP-ABE can be searched for an encryption method, and the described PKI that effectively can verify based on KP-ABE can be searched for encryption method and comprise trusted authority center, data owner, Cloud Server, data user; Trusted authority center choose bilinearity to and hash function, be that system generates public ginseng pm and master key mk; By operation RSA Algorithm, be data owner and Cloud Server generation public private key pair; By Share (T, the ac) algorithm in access structure, for user generates private key sk; Data owner extracts keyword w from the data file F of outsourcing; Outsourcing F, and generate keyword w ciphertext cph and send to Cloud Server; The data that Cloud Server sends data owner provide stores service and after receiving the search password tk that user sends, carry out search, and Search Results and search evidence are returned to user; Data user generates search password tk and sends to Cloud Server with private key sk; After receiving the Search Results that Cloud Server returns, the correctness of result and integrality are verified;
The described PKI that effectively can verify based on KP-ABE can be searched for encryption method and comprise six algorithms, and l is security parameter, and trusted authority center operation RSA Algorithm is that Cloud Server and data owner generate public private key pair: { (n 1, e 1), d 1and { (n 2, e 2), d 2; Data owner guarantees the integrality of data file by digital signature, ciphertext keyword is encrypted to prevent again the off-line guessing attack of external attacker, as data owner SYM with the PKI of Cloud Server enc() cryptographic algorithm is contracted out to Cloud Server after to data file encryption, and server returns to the address of encrypt file, is designated as ID{F i, the data file that comprises like this keyword w can be expressed as ID w=ID{F 1|| ID{F 2... || ID{F i.
Further, described PKI can be searched for encryption method and specifically comprises:
Trusted authority center choose bilinearity to and hash function, for searching for encryption system: trusted authorization centre management data owner, user and Cloud Server;
Data owner is sent to Cloud Server by data file;
Cloud Server provides storage and retrieval service;
User searches for data file stored thereon by Cloud Server;
Trusted authority center generates public ginseng pm and master key mk; By moving following RSA Algorithm:
Press following 3 steps:
I) select different large prime number p and q, calculate n=p*q;
Ii) select e with coprime, (n, e) is as PKI;
Iii) pass through calculate d, (n, d) is as private key;
Here number n, e, d is respectively modulus, encryption exponent and decryption exponent;
According to this algorithm, choose different large prime number p 1and q 1, p 2and q 2, be data owner and server generation public private key pair { (n 1, e 1), d 1and { (n 2, e 2), d 2;
By Share (T, the ac) algorithm in access structure, as follows:
Each leaf node of access tree T associated the part of secret ac share q v(0),, to each leaf node v ∈ lvs (T), choose t ← Z p, calculate and B v=g t, note sk=(T, A v, B v) | v ∈ lvs (T)) be user's private key.
Further, the described PKI that effectively can verify based on KP-ABE can be searched for encryption method and comprise six algorithms, and l is security parameter, and trusted authority center operation RSA Algorithm is that Cloud Server and data owner generate public private key pair: { (n 1, e 1), d 1and { (n 2, e 2), d 2.Data owner guarantees the integrality of data file by digital signature, ciphertext keyword is encrypted to prevent again the off-line guessing attack of external attacker, as data owner SYM with the PKI of Cloud Server enc() cryptographic algorithm is contracted out to Cloud Server after to data file encryption, and server returns to the address of encrypt file, is designated as ID{F i, the data file that comprises like this keyword w can be expressed as ID w=ID{F 1|| ID{F 2... || ID{F i.
Further, the described PKI that effectively can verify based on KP-ABE can be searched for the concrete scheme of encryption method and is:
Step 1, initialization (1 l): bilinearity pair: e:G * G → G is selected at trusted authority center t, G and G tbe that rank are the cyclic group of p, p is the primitive element of l bit long, selects the hash function H under random oracle 1: { 0,1} *→ G; H 2: { 0,1} *→ Z pbe one-way Hash function, select a, b, c ← Z p, g ← G, pm=(H 1, H 2, e, g, p, g a, g b, g c, G, G t), mk=(a, b, c)
Then choose k independently hash function H 1' ..., H' k, be used for the Bloom filter BF of structure m bit of m bit to send to data owner, be that data owner and Cloud Server generate public private key pair { (n 1, e 1), d 1and { (n 2, e 2), d 2;
Step 2, key generate (mk, T): Share (T, ac) algorithm is carried out at trusted authority center, and each leaf node of access tree T can obtain the part of relevant secret ac and share q v(0),, to each leaf node v ∈ lvs (T), choose t ← Z p, calculate and B v=g t, note private key sk=(T, A v, B v) | v ∈ lvs (T));
Step 3, the encryption to keyword and file address: the hash function that (w, atts, ID (w)) data owner sends by trusted authority center generates Bloom filter, BF ← BFGen ({ H 1' ..., H' k, { w 1..., w l), to containing keyword w data file address ID wand Bloom filter, SYM enc() cryptographic algorithm is encrypted, and symmetric key is sk 1:
BF Enc=SYM(BF),(ID w) Enc=SYM(ID w);
User data owner is to ABF enc(ID w) encsign: A = BF Enc | | sig ( BF Enc ) = BF Enc | | ( BF Enc ) d 1 , B = ( ID w ) Enc | | sig ( ID w ) Enc = ( ID w ) Enc | | ( ( ID w ) Enc ) d 1 To sk 1by ABE () cryptographic algorithm, be encrypted: C=ABE (sk 1);
After search finishes, the validated user that attribute meets access strategy just can be deciphered C and obtain sk 1, and then file destination is obtained in deciphering;
Select r 1, r 2← Z p, calculate W ′ = g cr 1 , W = g a ( r 1 + r 2 ) g b H 2 ( w ) r 1 ; F=(f 1, f 2) wherein f 1 = g a ( r 1 + r 2 ) , f 2 = g br 1 , W 0 = g r 2 , To each at j∈ Atts, calculates W j = H 1 ( at j ) r 2 , With the PKI of server, W is encrypted and obtained W E = W e 2 = ( g a ( r 1 + r 2 ) g bH 2 ( w ) r 1 ) e 2 , Can remember that like this ciphertext keyword is: cph=(Atts, W', W e, W 0, W j, F, A, B, C);
Step 4, generation search password (sk, w): select s ← Z p, each leaf node v ∈ lvs (T) is calculated A v ′ = A v s , B v ′ = B v s , Search password is tok 1 = ( g a g bH 2 ( w ) ) s , Tok 2=g cs, use the PKI of server to tok 2be encrypted: note tk=(tok 1, (tok 2) enc, T, (A' v, B' v) | v ∈ lvs (T));
Step 5, search (tk, cph): server is chosen the access tree that property set S meets appointment in search password from cph, if such S set does not exist, returns to 0; Otherwise, to each at j∈ S, calculates E v = e ( A v ′ , W 0 ) / e ( B v ′ , W j ) = e ( g , g ) sr 2 q v ( 0 ) att ( v ) = at j , v ∈ lvs ( T ) , In conjunction with (T, E v| att (v) ∈ S), calculate e ( g , g ) sr 2 q v ( 0 ) = e ( g , g ) sr 2 q root ( 0 ) , And then E root = e ( g , g ) acsr 2 The private key deciphering W of oneself for server e, (tok 2) encobtain W and tok 2if, e (W', tok 1) E root=e (W, tok 2), return W, F, A, B, C} is to user; Otherwise, only return to A;
Step 6, checking W, and F, A, B, C} data user receives after the Search Results that Cloud Server returns, and carries out verification operation.
Further, the concrete grammar of described verification operation is:
The existence of step 1, searched key word: when data user only receives the A that Cloud Server returns, if first verify with data owner's PKI A by checking; C is decrypted to operation and obtains symmetric key sk 1, deciphering A obtains Bloom filter BF, if BF (w)=0 means the keyword that does not exist user to search on Cloud Server, otherwise rejection returns results;
The correctness of step 2, searched key word: data user receive W, F, A, B, during C}, calculates W/f 1with if illustrate correctly, otherwise explanation is error result;
Step 3, the integrality of data file address that comprises keyword w: when data user has verified after the correctness of keyword, then B is verified, if by deciphering C, obtain sk 1, and then obtain target data file.
Further, the described PKI that effectively can verify based on KP-ABE can be searched for being analyzed as follows of correctness of encryption method:
Step 1, search coupling correctness:
Cloud Server, after receiving data user's searching request, is carried out search operation, first with the private key of oneself, ciphertext keyword and search password is decrypted, and with RSA Algorithm, then, carries out following matching operation:
e ( W ′ , tok 1 ) E root = e ( g cr 1 , ( g a g bH 2 ( w ) ) ) s = e ( g , g ) acs ( r 1 + r 2 ) e ( g , g ) bcsH 2 ( w ) r 1 ;
e ( W , tok 2 ) = e ( g a ( r 1 + r 2 ) g bH 2 ( w 1 ) r 1 , g cs ) ) s = e ( g , g ) acs ( r 1 + r 2 ) e ( g , g ) bcsH 2 ( w 1 ) r 1 .
If w and w 1same keyword, e (W', tok so 1) E rootand e (W, tok 2) be exactly what equate, illustrate and search for successfully;
Step 2, proving correctness:
When data user receive the Search Results that Cloud Server returns W, F, A, B, during C}, first will verify the correctness of keyword, finds f in F 1, f 2, do to calculate as follows:
W / f 1 = g a ( r 1 + r 2 ) g b H 2 ( w ) r 1 / g a ( r 1 + r 2 ) = g bH 2 ( w ) r 1
The cryptographic Hash H of the keyword that user searches for oneself 2(w 1) be calculated as follows:
f 2 H 2 ( w 1 ) = g bH 2 ( w 1 ) r 1
If w and w 1while being same keyword, equate, illustrate, Search Results is correct, after this, carrys out correctness and the integrality of verification msg file address by signature.
effect gathers
The PKI that effectively can verify based on KP-ABE of the present invention can be searched for encryption method, first generated public private key pair for data owner and Cloud Server, when sending ciphertext keyword and search password, first use the PKI of Cloud Server to encrypt again it, so effectively prevented the off-line guessing attack behavior of external attacker, the fail safe that has improved scheme, and, reduced complexity, has greatly reduced user's operand, and efficiency has obtained large increase.
Accompanying drawing explanation
Fig. 1 is that the PKI that effectively can verify based on KP-ABE that the embodiment of the present invention provides can be searched for the model schematic diagram of encryption method;
Fig. 2 is that the present invention and the contrast scheme that the embodiment of the present invention provides carried out the comparison diagram of the running time of verification of correctness.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The present invention is achieved in that as shown in Figure 1, and a kind of PKI that effectively can verify based on KP-ABE can be searched for encryption method and comprise trusted authority center, data owner, Cloud Server, data user; Trusted authority center is that all cloud users Generate Certificate; Data owner's outsourcing data file and keyword are to Cloud Server; Cloud Server is to provide stores service and carries out search operation after receiving the searching request that user sends; Data user generates search password and sends to Cloud Server to find file destination.
Further, described PKI can be searched for encryption method and specifically comprises:
Trusted authority center choose bilinearity to and hash function, for searching for encryption system: trusted authorization centre management data owner, user and Cloud Server;
Data owner is sent to Cloud Server by data file;
Cloud Server provides storage and retrieval service;
User searches for data file stored thereon by Cloud Server;
Trusted authority center generates public ginseng pm and master key mk; By moving following RSA Algorithm:
Press following 3 steps:
I) select different large prime number p and q, calculate n=p*q;
Ii) select e with coprime, (n, e) is as PKI;
Iii) pass through calculate d, (n, d) is as private key;
Here number n, e, d is respectively modulus, encryption exponent and decryption exponent;
According to this algorithm, choose different large prime number p 1and q 1, p 2and q 2, be data owner and server generation public private key pair { (n 1, e 1), d 1and { (n 2, e 2), d 2;
By Share (T, the ac) algorithm in access structure, as follows:
Each leaf node of access tree T associated the part of secret ac share q v(0),, to each leaf node v ∈ lvs (T), choose t ← Z p, calculate and B v=g t, note sk=(T, A v, B v) | v ∈ lvs (T)) be user's private key.
Further, the described PKI that effectively can verify based on KP-ABE can be searched for encryption method and comprise six algorithms, and l is security parameter, and trusted authority center operation RSA Algorithm is that Cloud Server and data owner generate public private key pair: { (n 1, e 1), d 1and { (n 2, e 2), d 2, data owner guarantees the integrality of data file by digital signature, ciphertext keyword is encrypted to prevent again the off-line guessing attack of external attacker, as data owner SYM with the PKI of Cloud Server enc() cryptographic algorithm is contracted out to Cloud Server after to data file encryption, and server returns to the address of encrypt file, is designated as ID{F i, the data file that comprises like this keyword w can be expressed as ID w=ID{F 1|| ID{F 2... || ID{F i.
Further, the described PKI that effectively can verify based on KP-ABE can be searched for the concrete scheme of encryption method and is:
Step 1, initialization (1 l): bilinearity pair: e:G * G → G is selected at trusted authority center t, G and G tbe that rank are the cyclic group of p, p is the primitive element of l bit long, selects the hash function H under random oracle 1: { 0,1} *→ G; H 2: { 0,1} *→ Z pbe one-way Hash function, select a, b, c ← Z p, g ← G, pm=(H 1, H 2, e, g, p, g a, g b, g c, G, G t), mk=(a, b, c)
Then choose k independently hash function H 1' ..., H' k, be used for the Bloom filter BF of structure m bit of m bit to send to data owner, be that data owner and Cloud Server generate public private key pair { (n 1, e 1), d 1and { (n 2, e 2), d 2;
Step 2, key generate (mk, T): Share (T, ac) algorithm is carried out at trusted authority center, and each leaf node of access tree T can obtain the part of relevant secret ac and share q v(0),, to each leaf node v ∈ lvs (T), choose t ← Z p, calculate and B v=g t, note private key sk=(T, A v, B v) | v ∈ lvs (T));
Step 3, the encryption to keyword and file address: the hash function that (w, atts, ID (w)) data owner sends by trusted authority center generates Bloom filter, BF ← BFGen ({ H 1' ..., H' k, { w 1..., w l), to containing keyword w data file address ID wand Bloom filter, SYM enc() cryptographic algorithm is encrypted, and symmetric key is sk 1:
BF Enc=SYM(BF),(ID w) Enc=SYM(ID w);
User data owner is to ABF enc(ID w) encsign: A = BF Enc | | sig ( BF Enc ) = BF Enc | | ( BF Enc ) d 1 , B = ( ID w ) Enc | | sig ( ID w ) Enc = ( ID w ) Enc | | ( ( ID w ) Enc ) d 1 To sk 1by ABE () cryptographic algorithm, be encrypted: C=ABE (sk 1);
After search finishes, the validated user that attribute meets access strategy just can be deciphered C and obtain sk 1, and then file destination is obtained in deciphering;
Select r 1, r 2← Z p, calculate W ′ = g cr 1 , W = g a ( r 1 + r 2 ) g b H 2 ( w ) r 1 ; F=(f 1, f 2) wherein f 1 = g a ( r 1 + r 2 ) , f 2 = g br 1 , W 0 = g r 2 , To each at j∈ Atts, calculates W j = H 1 ( at j ) r 2 , With the PKI of server, W is encrypted and obtained W E = W e 2 = ( g a ( r 1 + r 2 ) g bH 2 ( w ) r 1 ) e 2 , Can remember that like this ciphertext keyword is: cph=(Atts, W', W e, W 0, W j, F, A, B, C);
Step 4, generation search password (sk, w): select s ← Z p, each leaf node v ∈ lvs (T) is calculated A v ′ = A v s , B v ′ = B v s , Search password is tok 1 = ( g a g bH 2 ( w ) ) s , Tok 2=g cs, use the PKI of server to tok 2be encrypted: note tk=(tok 1, (tok 2) enc, T, (A' v, B' v) | v ∈ lvs (T));
Step 5, search (tk, cph): server is chosen the access tree that property set S meets appointment in search password from cph, if such S set does not exist, returns to 0; Otherwise, to each at j∈ S, calculates E v = e ( A v ′ , W 0 ) / e ( B v ′ , W j ) = e ( g , g ) sr 2 q v ( 0 ) att ( v ) = at j , v ∈ lvs ( T ) , In conjunction with (T, E v| att (v) ∈ S), calculate e ( g , g ) sr 2 q v ( 0 ) = e ( g , g ) sr 2 q root ( 0 ) , And then E root = e ( g , g ) acsr 2 The private key deciphering W of oneself for server e, (tok 2) encobtain W and tok 2if, e (W', tok 1) E root=e (W, tok 2), return W, F, A, B, C} is to user; Otherwise, only return to A;
Step 6, checking W, and F, A, B, C} data user receives after the Search Results that Cloud Server returns, and carries out verification operation.
Further, the concrete grammar of described verification operation is:
The existence of step 1, searched key word: when data user only receives the A that Cloud Server returns, if first verify with data owner's PKI A by checking; C is decrypted to operation and obtains symmetric key sk 1, deciphering A obtains Bloom filter BF, if BF (w)=0 means the keyword that does not exist user to search on Cloud Server, otherwise rejection returns results;
The correctness of step 2, searched key word: data user receive W, F, A, B, during C}, calculates W/f 1with if illustrate correctly, otherwise explanation is error result;
Step 3, the integrality of data file address that comprises keyword w: when data user has verified after the correctness of keyword, then B is verified, if by deciphering C, obtain sk 1, and then obtain target data file.
Further, the described PKI that effectively can verify based on KP-ABE can be searched for being analyzed as follows of correctness of encryption method:
Step 1, search coupling correctness:
Cloud Server, after receiving data user's searching request, is carried out search operation, first with the private key of oneself, ciphertext keyword and search password is decrypted, and with RSA Algorithm, then, carries out following matching operation:
e ( W ′ , tok 1 ) E root = e ( g cr 1 , ( g a g bH 2 ( w ) ) ) s = e ( g , g ) acs ( r 1 + r 2 ) e ( g , g ) bcsH 2 ( w ) r 1 ;
e ( W , tok 2 ) = e ( g a ( r 1 + r 2 ) g bH 2 ( w 1 ) r 1 , g cs ) ) s = e ( g , g ) acs ( r 1 + r 2 ) e ( g , g ) bcsH 2 ( w 1 ) r 1 .
If w and w 1same keyword, e (W', tok so 1) E rootand e (W, tok 2) be exactly what equate, illustrate and search for successfully;
Step 2, proving correctness:
When data user receive the Search Results that Cloud Server returns W, F, A, B, during C}, first will verify the correctness of keyword, finds f in F 1, f 2, do to calculate as follows:
W / f 1 = g a ( r 1 + r 2 ) g b H 2 ( w ) r 1 / g a ( r 1 + r 2 ) = g bH 2 ( w ) r 1
The cryptographic Hash H of the keyword that user searches for oneself 2(w 1) be calculated as follows:
f 2 H 2 ( w 1 ) = g bH 2 ( w 1 ) r 1
If w and w 1while being same keyword, W/f 1with equate, illustrate, Search Results is correct, after this, carrys out correctness and the integrality of verification msg file address by signature.
By the present invention and document " Verifiable attribute-based keyword search over outsourced encrypted data " (Q.Zheng, Xu, S.Ateniese, G.:Vabks, IACR Cryptology ePrint Archive2013 (2013)) scheme in contrasts, in the solution of the present invention, first generated public private key pair for data owner and Cloud Server, when sending ciphertext keyword and search password, first use the PKI of Cloud Server to encrypt again it, so effectively prevented the off-line guessing attack behavior of external attacker.This does not relate in contrast.In addition, with the contrast of contrast scheme, operation and Cloud Server that contrast scheme is carried out when proving correctness are identical, and method therefor of the present invention has obvious advantage, as shown in table 1:
Table 1
BF represents Bloom filter; What complexity was considered here is asymptotic complexity, is mainly Pair and E t.Pair represents that bilinearity is to computing; E trepresent group G tin exponent arithmetic; The quantity of the attribute of S representative of consumer.The same with contrast scheme, because multiplying and Hash operation be compared with computing and exponent arithmetic are got up, complexity is lower.So when complexity is discussed, ignored multiplying and Hash operation.
The correctness of the Search Results that user returns server is verified:
C Programming with Pascal Language, adopts Ubuntu Linux12.04 system.Computer is configured to: Intel (R) Core (TM) i3-3240Cpu, 2GBRAM.Based on to the cryptographic algorithm of computing (PBC) laboratory 0.514 version.All experimental results are got is the empirical average value of 50 times.Chosen respectively the mould length of 512 bit long and 1024 bit long, 10 to 50 of number of attributes scopes.Finally, as shown in Figure 2, experimental result demonstration, verification method efficiency of the present invention is high, has stronger practicality.
Fig. 2 shows the running time of the solution of the present invention and contrast scheme execution verification of correctness.Compare than scheme, can not change along with the increase of number of attributes the present invention program's running time, further illustrates practicality of the present invention.Oblique stroke in figure is representing interruption in the vertical direction, and the ORIGIN8.0 of being software used herein carries out data analysis mapping.
Although above-mentioned, by reference to the accompanying drawings the specific embodiment of the present invention is described; but be not limiting the scope of the invention; one of ordinary skill in the art should be understood that; on the basis of technical scheme of the present invention, those skilled in the art do not need to pay various modifications that performing creative labour can make or distortion still within protection scope of the present invention.

Claims (6)

1. the PKI that effectively can verify based on KP-ABE can be searched for an encryption method, it is characterized in that, the described PKI that effectively can verify based on KP-ABE can be searched for encryption method and comprise the following steps:
Data owner extracts keyword w from the data file F of outsourcing; Outsourcing F, and generate keyword w ciphertext cph and send to Cloud Server;
The data that Cloud Server sends data owner provide stores service and after receiving the search password tk that user sends, carry out search, and Search Results and search evidence are returned to user;
Data user generates search password tk and sends to Cloud Server with private key sk; After receiving the Search Results that Cloud Server returns, the correctness of result and integrality are verified.
2. the PKI that effectively can verify based on KP-ABE as claimed in claim 1 can be searched for encryption method, it is characterized in that, described PKI can be searched for encryption method and specifically comprise:
Can search for encryption system: trusted authorization centre management data owner, user and Cloud Server;
Data owner is sent to Cloud Server by data file;
Cloud Server provides storage and retrieval service;
User searches for data file stored thereon by Cloud Server;
Trusted authority center choose bilinearity to and hash function, and generate public ginseng pm and master key mk; By moving following RSA Algorithm:
Press following 3 steps:
I) select different large prime number p and q, calculate n=p*q;
Ii) select e with coprime, (n, e) is as PKI;
Iii) pass through calculate d, (n, d) is as private key;
Here number n, e, d is respectively modulus, encryption exponent and decryption exponent;
According to this algorithm, choose different large prime number p 1and q 1, p 2and q 2, be data owner and server generation public private key pair { (n 1, e 1), d 1and { (n 2, e 2), d 2;
By Share (T, the ac) algorithm in access structure, as follows:
Each leaf node of access tree T associated the part of secret ac share q v(0),, to each leaf node v ∈ lvs (T), choose t ← Z p, calculate and B v=g t, note sk=(T, A v, B v) | v ∈ lvs (T)) be user's private key.
3. the PKI that effectively can verify based on KP-ABE as claimed in claim 1 can be searched for encryption method, it is characterized in that, the described PKI that effectively can verify based on KP-ABE can be searched for encryption method and comprise: initialization, key generate, the encryption of keyword and file address, generation are searched for to password, search, checking; The method is mainly used in the search to a large amount of enciphered datas in cloud computing.
4. the PKI that effectively can verify based on KP-ABE as claimed in claim 1 can be searched for encryption method, it is characterized in that, the concrete scheme that the described PKI that effectively can verify based on KP-ABE can be searched for encryption method is:
Trusted authority center operation RSA Algorithm is that Cloud Server and data owner generate public private key pair: { (n 1, e 1), d 1and { (n 2, e 2), d 2; Data owner guarantees the integrality of data file by digital signature; With the PKI of Cloud Server, ciphertext keyword is encrypted to prevent again the off-line guessing attack of external attacker, as data owner SYM enc() cryptographic algorithm is contracted out to Cloud Server after to data file encryption, and server returns to the address of encrypt file, is designated as ID{F i, the data file that comprises like this keyword w can be expressed as ID w=ID{F 1|| ID{F 2... || ID{F i; Specifically comprise:
Step 1, initialization (1 l): bilinearity pair: e:G * G → G is selected at trusted authority center t, G and G tbe that rank are the cyclic group of p, p is the primitive element of l bit long, selects the hash function H under random oracle 1: { 0,1} *→ G; H 2: { 0,1} *→ Z pbe one-way Hash function, select a, b, c ← Z p, g ← G,
pm=(H 1,H 2,e,g,p,g a,g b,g c,G,G T),
mk=(a,b,c)
Then choose k independently hash function H 1' ..., H' k, be used for the Bloom filter BF of structure m bit of m bit to send to data owner, be that data owner and Cloud Server generate public private key pair { (n 1, e 1), d 1and { (n 2, e 2), d 2;
Step 2, key generate (mk, T): Share (T, ac) algorithm is carried out at trusted authority center, and each leaf node of access tree T can obtain the part of relevant secret ac and share q v(0),, to each leaf node v ∈ lvs (T), choose t ← Z p, calculate and B v=g t, note private key sk=(T, A v, B v) | v ∈ lvs (T));
Step 3, the encryption to keyword and file address: the hash function that (w, atts, ID (w)) data owner sends by trusted authority center generates Bloom filter, BF ← BFGen ({ H 1' ..., H' k, { w 1..., w l), to containing keyword w data file address ID wand Bloom filter, SYM enc() cryptographic algorithm is encrypted, and symmetric key is sk 1:
BF Enc=SYM(BF),(ID w) Enc=SYM(ID w);
User data owner is to BF enc(ID w) encsign: A = BF Enc | | sig ( BF Enc ) = BF Enc | | ( BF Enc ) d 1 , B = ( ID w ) Enc | | sig ( ID w ) Enc = ( ID w ) Enc | | ( ( ID w ) Enc ) d 1 To sk 1by ABE () cryptographic algorithm, be encrypted: C=ABE (sk 1);
After search finishes, the validated user that attribute meets access strategy just can be deciphered C and obtain sk 1, and then file destination is obtained in deciphering;
Select r 1, r 2← Z p, calculate W ′ = g cr 1 , W = g a ( r 1 + r 2 ) g b H 2 ( w ) r 1 ; F=(f 1, f 2) wherein f 1 = g a ( r 1 + r 2 ) , f 2 = g br 1 , W 0 = g r 2 , To each at j∈ Atts, calculates W j = H 1 ( at j ) r 2 , With the PKI of server, W is encrypted and obtained W E = W e 2 = ( g a ( r 1 + r 2 ) g bH 2 ( w ) r 1 ) e 2 , Can remember that like this ciphertext keyword is:
cph=(Atts,W',W E,W 0,W j,F,A,B,C);
Step 4, generation search password (sk, w): select s ← Z p, each leaf node v ∈ lvs (T) is calculated A v ′ = A v s , B v ′ = B v s , Search password is tok 1 = ( g a g bH 2 ( w ) ) s , Tok 2=g cs, use the PKI of server to tok 2be encrypted: note tk=(tok 1, (tok 2) enc, T, (A' v, B' v) | v ∈ lvs (T));
Step 5, search (tk, cph): server is chosen the access tree that property set S meets appointment in search password from cph, if such S set does not exist, returns to 0; Otherwise, to each at j∈ S, calculates E v = e ( A v ′ , W 0 ) / e ( B v ′ , W j ) = e ( g , g ) sr 2 q v ( 0 ) att ( v ) = at j , v ∈ lvs ( T ) , In conjunction with (T, E v| att (v) ∈ S), calculate e ( g , g ) sr 2 q v ( 0 ) = e ( g , g ) sr 2 q root ( 0 ) , And then E root = e ( g , g ) acsr 2 The private key deciphering W of oneself for server e, (tok 2) encobtain W and tok 2if, e (W', tok 1) E root=e (W, tok 2), return W, F, A, B, C} is to user; Otherwise, only return to A;
Step 6, checking { W, F, A, B, C}: data user receives after the Search Results that Cloud Server returns, and carries out verification operation.
5. the PKI that effectively can verify based on KP-ABE as claimed in claim 1 can be searched for encryption method, it is characterized in that, the concrete grammar of described verification operation is:
The existence of step 1, searched key word: when data user only receives the A that Cloud Server returns, first with data owner's PKI, A is verified; If by checking; C is decrypted to operation and obtains symmetric key sk 1, deciphering A obtains Bloom filter BF, if BFverify (w)=0 means the keyword that does not exist user to search on Cloud Server, otherwise rejection returns results;
The correctness of step 2, searched key word: data user receive W, F, A, B, during C}, calculates W/f 1with if illustrate correctly, otherwise explanation is error result;
Step 3, the integrality of data file address that comprises keyword w: when data user has verified after the correctness of keyword, then B is verified, if by deciphering C, obtain sk 1, and then obtain target data file.
6. the PKI that effectively can verify based on KP-ABE as claimed in claim 1 can be searched for encryption method, it is characterized in that, the described PKI that effectively can verify based on KP-ABE can be searched for being analyzed as follows of correctness of encryption method:
Step 1, search coupling correctness:
Cloud Server, after receiving data user's searching request, is carried out search operation.First by with RSA Algorithm, with the private key of oneself, ciphertext keyword and search password are decrypted, then, carry out following matching operation:
e ( W ′ , tok 1 ) E root = e ( g cr 1 , ( g a g bH 2 ( w ) ) ) s = e ( g , g ) acs ( r 1 + r 2 ) e ( g , g ) bcsH 2 ( w ) r 1 ;
e ( W , tok 2 ) = e ( g a ( r 1 + r 2 ) g bH 2 ( w 1 ) r 1 , g cs ) ) s = e ( g , g ) acs ( r 1 + r 2 ) e ( g , g ) bcsH 2 ( w 1 ) r 1 .
If w and w 1same keyword, e (W', tok so 1) E rootand e (W, tok 2) be exactly what equate, illustrate and search for successfully;
Step 2, proving correctness:
When data user receive the Search Results that Cloud Server returns W, F, A, B, during C}, first will verify the correctness of keyword, finds f in F 1, f 2, do to calculate as follows:
W / f 1 = g a ( r 1 + r 2 ) g b H 2 ( w ) r 1 / g a ( r 1 + r 2 ) = g bH 2 ( w ) r 1
The cryptographic Hash H of the keyword that user searches for oneself 2(w 1) be calculated as follows:
f 2 H 2 ( w 1 ) = g bH 2 ( w 1 ) r 1
If w and w 1while being same keyword, W/f 1with equate, illustrate, Search Results is correct, after this, carrys out correctness and the integrality of verification msg file address by signature.
CN201410316818.4A 2014-07-03 2014-07-03 Effective and verifiable public key searching encryption method based on KP-ABE Active CN104038349B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410316818.4A CN104038349B (en) 2014-07-03 2014-07-03 Effective and verifiable public key searching encryption method based on KP-ABE

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410316818.4A CN104038349B (en) 2014-07-03 2014-07-03 Effective and verifiable public key searching encryption method based on KP-ABE

Publications (2)

Publication Number Publication Date
CN104038349A true CN104038349A (en) 2014-09-10
CN104038349B CN104038349B (en) 2017-05-03

Family

ID=51468946

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410316818.4A Active CN104038349B (en) 2014-07-03 2014-07-03 Effective and verifiable public key searching encryption method based on KP-ABE

Country Status (1)

Country Link
CN (1) CN104038349B (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104394155A (en) * 2014-11-27 2015-03-04 暨南大学 Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness
CN105024802A (en) * 2015-07-13 2015-11-04 西安理工大学 Bilinear pairing-based multi-user multi-keyword searchable encryption method in cloud storage
CN105282167A (en) * 2015-11-06 2016-01-27 福建工程学院 Searchable certificateless public key encryption method
CN105468986A (en) * 2015-12-02 2016-04-06 深圳大学 Confidential information retrieval method and system
CN105721146A (en) * 2016-03-03 2016-06-29 江苏大学 Big data sharing method for cloud storage based on SMC
CN105812141A (en) * 2016-03-07 2016-07-27 东北大学 Outsourcing encrypted data-orientated verifiable intersection operation method and system
CN105933281A (en) * 2016-03-29 2016-09-07 深圳大学 Quantum homomorphism symmetry searchable encryption method and system
CN106131029A (en) * 2016-07-19 2016-11-16 南京邮电大学 A kind of efficient cipher text searching method resisting attribute key abuse
CN106650205A (en) * 2016-09-28 2017-05-10 西安电子科技大学 Cloud medical data monitoring system and monitoring method with efficient privacy protection function
CN106874516A (en) * 2017-03-15 2017-06-20 电子科技大学 Efficient cipher text retrieval method based on KCB trees and Bloom filter in a kind of cloud storage
CN106941482A (en) * 2016-12-20 2017-07-11 中国科学技术大学 A kind of data storage and access control method based on key derivation
CN107256248A (en) * 2017-06-07 2017-10-17 福州大学 Encryption method can search for based on asterisk wildcard in cloud storage safety
CN107920121A (en) * 2017-11-22 2018-04-17 湖南城市学院 A kind of PE testing method based on internet
CN108039943A (en) * 2017-12-06 2018-05-15 清华大学深圳研究生院 A kind of encryption searching method that can verify that
CN108418796A (en) * 2018-01-30 2018-08-17 西安电子科技大学 Method, the cloud storage system of the more copy integrity verifications of cloud data and associated deletion
CN108512840A (en) * 2018-03-21 2018-09-07 杭州弗兰科信息安全科技有限公司 One kind is based on letting out the encrypted cipher text retrieval method of sequence
CN109086615A (en) * 2018-08-03 2018-12-25 上海海事大学 A kind of support multiple key search public key encryption method of anti-keyword guessing attack
CN109299804A (en) * 2018-11-19 2019-02-01 安徽师范大学 Medical appointment registration system with doctor's function of search
CN109347833A (en) * 2018-10-24 2019-02-15 中国科学院信息工程研究所 The access control method and system being used under machine learning environment based on encryption attribute
CN109492410A (en) * 2018-10-09 2019-03-19 华南农业大学 Data can search for encryption and keyword search methodology, system and terminal, equipment
CN109543439A (en) * 2018-12-04 2019-03-29 北京锐安科技有限公司 A kind of service request method and device of car networking
CN110266687A (en) * 2019-06-21 2019-09-20 杭州云象网络技术有限公司 A kind of Internet of Things TSM Security Agent data sharing modularity using block chain technology
CN110392038A (en) * 2019-06-03 2019-10-29 西安电子科技大学 The multi-key cipher that can verify that under a kind of multi-user scene can search for encryption method
CN110602099A (en) * 2019-09-16 2019-12-20 广西师范大学 Privacy protection method based on verifiable symmetric searchable encryption
CN112311781A (en) * 2020-10-23 2021-02-02 西安电子科技大学 Encryption method with safe forward and backward direction and recoverable keyword shielding
CN113158174A (en) * 2021-04-06 2021-07-23 上海交通大学 Automatic search system of grouping cipher actual key information based on graph theory
CN114268482A (en) * 2021-12-15 2022-04-01 北京工业大学 Rapid strategy retrieval method based on attribute bloom filter
WO2022099891A1 (en) * 2020-11-10 2022-05-19 杭州趣链科技有限公司 Data query method, apparatus and system, and data set processing method

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107342900A (en) * 2017-07-11 2017-11-10 陈焕英 A kind of allocation of computer device of signal communication bag
CN110138561B (en) * 2019-03-22 2021-09-17 西安电子科技大学 Efficient ciphertext retrieval method based on CP-ABE automatic correction and cloud computing service system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120069387A (en) * 2010-12-20 2012-06-28 고려대학교 산학협력단 A method for searching keyword based on public key
CN103179114A (en) * 2013-03-15 2013-06-26 华中科技大学 Fine-grained access control method for data in cloud storage
CN103281377A (en) * 2013-05-31 2013-09-04 北京鹏宇成软件技术有限公司 Cryptograph data storage and searching method for cloud
CN103401839A (en) * 2013-07-02 2013-11-20 河海大学 Attribute protection based multiple authorization center encryption method
CN103731432A (en) * 2014-01-11 2014-04-16 西安电子科技大学昆山创新研究院 Multi-user supported searchable encryption system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120069387A (en) * 2010-12-20 2012-06-28 고려대학교 산학협력단 A method for searching keyword based on public key
CN103179114A (en) * 2013-03-15 2013-06-26 华中科技大学 Fine-grained access control method for data in cloud storage
CN103281377A (en) * 2013-05-31 2013-09-04 北京鹏宇成软件技术有限公司 Cryptograph data storage and searching method for cloud
CN103401839A (en) * 2013-07-02 2013-11-20 河海大学 Attribute protection based multiple authorization center encryption method
CN103731432A (en) * 2014-01-11 2014-04-16 西安电子科技大学昆山创新研究院 Multi-user supported searchable encryption system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
QINGJI ZHENG,SHOUHUAI XU, GIUSEPPE ATENIESE: "VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data", 《IEEE INFOCOM 2014 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS》 *

Cited By (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104394155B (en) * 2014-11-27 2017-12-12 暨南大学 It can verify that multi-user's cloud encryption keyword searching method of integrality and completeness
CN104394155A (en) * 2014-11-27 2015-03-04 暨南大学 Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness
CN105024802A (en) * 2015-07-13 2015-11-04 西安理工大学 Bilinear pairing-based multi-user multi-keyword searchable encryption method in cloud storage
CN105024802B (en) * 2015-07-13 2018-05-29 西安理工大学 Multi-user's multi-key word based on Bilinear map can search for encryption method in cloud storage
CN105282167A (en) * 2015-11-06 2016-01-27 福建工程学院 Searchable certificateless public key encryption method
CN105468986A (en) * 2015-12-02 2016-04-06 深圳大学 Confidential information retrieval method and system
CN105721146A (en) * 2016-03-03 2016-06-29 江苏大学 Big data sharing method for cloud storage based on SMC
CN105721146B (en) * 2016-03-03 2018-12-21 江苏大学 A kind of big data sharing method towards cloud storage based on SMC
CN105812141B (en) * 2016-03-07 2018-11-27 东北大学 It is a kind of to can verify that intersection operation method and system towards outsourcing encryption data
CN105812141A (en) * 2016-03-07 2016-07-27 东北大学 Outsourcing encrypted data-orientated verifiable intersection operation method and system
CN105933281B (en) * 2016-03-29 2019-05-07 深圳大学 A kind of quantum homomorphism symmetrically can search for the method and system of encryption
CN105933281A (en) * 2016-03-29 2016-09-07 深圳大学 Quantum homomorphism symmetry searchable encryption method and system
CN106131029A (en) * 2016-07-19 2016-11-16 南京邮电大学 A kind of efficient cipher text searching method resisting attribute key abuse
CN106131029B (en) * 2016-07-19 2019-03-29 南京邮电大学 A kind of efficient cipher text searching method for resisting attribute key abuse
CN106650205A (en) * 2016-09-28 2017-05-10 西安电子科技大学 Cloud medical data monitoring system and monitoring method with efficient privacy protection function
CN106650205B (en) * 2016-09-28 2019-03-19 西安电子科技大学 A kind of cloud medical data monitoring method of efficient secret protection
CN106941482A (en) * 2016-12-20 2017-07-11 中国科学技术大学 A kind of data storage and access control method based on key derivation
CN106941482B (en) * 2016-12-20 2020-01-03 中国科学技术大学 Data storage and access control method based on key derivation
CN106874516A (en) * 2017-03-15 2017-06-20 电子科技大学 Efficient cipher text retrieval method based on KCB trees and Bloom filter in a kind of cloud storage
CN107256248B (en) * 2017-06-07 2020-05-08 福州大学 Wildcard-based searchable encryption method in cloud storage security
CN107256248A (en) * 2017-06-07 2017-10-17 福州大学 Encryption method can search for based on asterisk wildcard in cloud storage safety
CN107920121A (en) * 2017-11-22 2018-04-17 湖南城市学院 A kind of PE testing method based on internet
CN108039943A (en) * 2017-12-06 2018-05-15 清华大学深圳研究生院 A kind of encryption searching method that can verify that
CN108418796A (en) * 2018-01-30 2018-08-17 西安电子科技大学 Method, the cloud storage system of the more copy integrity verifications of cloud data and associated deletion
CN108512840A (en) * 2018-03-21 2018-09-07 杭州弗兰科信息安全科技有限公司 One kind is based on letting out the encrypted cipher text retrieval method of sequence
CN109086615A (en) * 2018-08-03 2018-12-25 上海海事大学 A kind of support multiple key search public key encryption method of anti-keyword guessing attack
CN109492410A (en) * 2018-10-09 2019-03-19 华南农业大学 Data can search for encryption and keyword search methodology, system and terminal, equipment
CN109492410B (en) * 2018-10-09 2020-09-01 华南农业大学 Data searchable encryption and keyword search method, system, terminal and equipment
CN109347833A (en) * 2018-10-24 2019-02-15 中国科学院信息工程研究所 The access control method and system being used under machine learning environment based on encryption attribute
CN109299804A (en) * 2018-11-19 2019-02-01 安徽师范大学 Medical appointment registration system with doctor's function of search
CN109543439A (en) * 2018-12-04 2019-03-29 北京锐安科技有限公司 A kind of service request method and device of car networking
CN109543439B (en) * 2018-12-04 2021-07-13 北京锐安科技有限公司 Service request method and device for Internet of vehicles
CN110392038A (en) * 2019-06-03 2019-10-29 西安电子科技大学 The multi-key cipher that can verify that under a kind of multi-user scene can search for encryption method
CN110392038B (en) * 2019-06-03 2021-07-13 西安电子科技大学 Multi-key searchable encryption method capable of being verified in multi-user scene
CN110266687B (en) * 2019-06-21 2021-08-17 杭州云象网络技术有限公司 Method for designing Internet of things security agent data sharing module by adopting block chain technology
CN110266687A (en) * 2019-06-21 2019-09-20 杭州云象网络技术有限公司 A kind of Internet of Things TSM Security Agent data sharing modularity using block chain technology
CN110602099A (en) * 2019-09-16 2019-12-20 广西师范大学 Privacy protection method based on verifiable symmetric searchable encryption
CN110602099B (en) * 2019-09-16 2021-04-06 广西师范大学 Privacy protection method based on verifiable symmetric searchable encryption
CN112311781A (en) * 2020-10-23 2021-02-02 西安电子科技大学 Encryption method with safe forward and backward direction and recoverable keyword shielding
CN112311781B (en) * 2020-10-23 2021-11-12 西安电子科技大学 Encryption method with safe forward and backward direction and recoverable keyword shielding
WO2022099891A1 (en) * 2020-11-10 2022-05-19 杭州趣链科技有限公司 Data query method, apparatus and system, and data set processing method
CN113158174A (en) * 2021-04-06 2021-07-23 上海交通大学 Automatic search system of grouping cipher actual key information based on graph theory
CN114268482A (en) * 2021-12-15 2022-04-01 北京工业大学 Rapid strategy retrieval method based on attribute bloom filter

Also Published As

Publication number Publication date
CN104038349B (en) 2017-05-03

Similar Documents

Publication Publication Date Title
CN104038349A (en) Effective and verifiable public key searching encryption method based on KP-ABE
Li et al. Full verifiability for outsourced decryption in attribute based encryption
Li et al. Secure attribute-based data sharing for resource-limited users in cloud computing
US20210203497A1 (en) Method for re-keying an encrypted data file
Liu et al. Efficient verifiable public key encryption with keyword search based on KP-ABE
CN110637441B (en) Encryption key generation for data deduplication
Zheng et al. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
Yang et al. Provable data possession of resource-constrained mobile devices in cloud computing
CN111245597B (en) Key management method, system and equipment
CN104967693B (en) Towards the Documents Similarity computational methods based on full homomorphism cryptographic technique of cloud storage
CN103563288B (en) Single-round password-based key exchange protocols
CN105721158A (en) Cloud safety privacy and integrity protection method and cloud safety privacy and integrity protection system
EP3395031B1 (en) Method for providing a proof of retrievability
CN103780393A (en) Virtual-desktop security certification system and method facing multiple security levels
Liu et al. Offline/online attribute‐based encryption with verifiable outsourced decryption
CN106487786A (en) A kind of cloud data integrity verification method based on biological characteristic and system
CN108985102A (en) Data integrity verification method, device, system and storage medium
CN104092686A (en) Privacy protection and data safety access method based on SVW classifier
Zhang et al. IPad: ID-based public auditing for the outsourced data in the standard model
CN108156139A (en) No certificate can verify that multiple key cryptogram search system and method
Zhao et al. Verifiable outsourced ciphertext-policy attribute-based encryption for mobile cloud computing
Suveetha et al. Ensuring confidentiality of cloud data using homomorphic encryption
Abo-Alian et al. Auditing-as-a-service for cloud storage
Moghaddam et al. A client-based user authentication and encryption algorithm for secure accessing to cloud servers based on modified Diffie-Hellman and RSA small-e
Li et al. A forward-secure certificate-based signature scheme

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant