CN104967693A - Document similarity calculation method facing cloud storage based on fully homomorphic password technology - Google Patents

Document similarity calculation method facing cloud storage based on fully homomorphic password technology Download PDF

Info

Publication number
CN104967693A
CN104967693A CN201510416852.3A CN201510416852A CN104967693A CN 104967693 A CN104967693 A CN 104967693A CN 201510416852 A CN201510416852 A CN 201510416852A CN 104967693 A CN104967693 A CN 104967693A
Authority
CN
China
Prior art keywords
data
ciphertext
key
signature file
service provider
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510416852.3A
Other languages
Chinese (zh)
Other versions
CN104967693B (en
Inventor
江小平
李成华
张巍
周航
张华�
孙婧
丁浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Shengjinyuan Electronic Technology Co ltd
Original Assignee
South Central University for Nationalities
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South Central University for Nationalities filed Critical South Central University for Nationalities
Priority to CN201510416852.3A priority Critical patent/CN104967693B/en
Publication of CN104967693A publication Critical patent/CN104967693A/en
Application granted granted Critical
Publication of CN104967693B publication Critical patent/CN104967693B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Abstract

The invention discloses a document similarity calculation method facing cloud storage based on a fully homomorphic password technology. The method comprises the following steps that a data owner uploads a document ID, an encrypted document cryptograph and a cryptograph of a document Hash value to a cloud server; a public key certificate is issued to a cloud service provider and a data user; the data user encrypts a simhash value of a document with a similarity to be calculated and uploads to the cloud service provider; the cloud service provider carries out fully homomorphic addition operation of a document simhash cryptograph value to be calculated and a data owner document simhash cryptograph value and returns an operation result to the data owner; the data owner acquires Hamming distances between the documents and returns a document ID with a top distance sorting to the cloud service provider. By using the method, the calculation is performed under a cryptograph state. During a calculation process, any information related to the document is not revealed to the cloud service provider and other attackers so that a data secret of the data owner and a query data secret of the data user are protected.

Description

The Documents Similarity computational methods based on full homomorphism cryptographic technique that facing cloud stores
Technical field
The invention belongs to computer related software field, more specifically, relate to the Documents Similarity computational methods based on full homomorphism cryptographic technique that a kind of facing cloud stores.
Background technology
Along with the development of cloud computing correlation technique, each major company is proposed free cloud dish (also referred to as net dish) stores service one after another, as Baidu's cloud dish, Tengxun's thin cloud, Kingsoft fast disk etc., because its capacity is large and can be accessed at any time by network at any time, and have more large more users.But, its safety problem, especially customer documentation data privacy protection problem, and the promise of service provider could not be obtained.The common methods of head it off is encrypted document by user, and the cipher-text information after encryption is uploaded to cloud service provider.After the enciphered data being uploaded to cloud service provider takes on a certain scale, realizing the Similarity Measure of object data under ciphertext state becomes and will become a kind of new technical need.The similarity that all can relate between object or between object and object set is recommended to judge to calculate information retrieval, document duplicate removal, classification, cluster and user.
For different application scenarioss, be limited to the restriction of data scale, space-time expense etc., the selection of similarity calculating method is distinguished to some extent.At present, the main flow similarity calculation adopted under plaintext space is the model based on Hash.In large-scale the Internet processing demands, the technology based on hash algorithm has certain superiority: it in the acceptable situation of in order to be effective loss, can save memory space, and fast operation.But, if directly the hash value of data object is uploaded to cloud service provider, hash value exists by the risk of malicious exploitation, and namely assailant's (comprising cloud service provider and hacker etc.) easily infers by the mode of Brute Force the semanteme clear data.
Summary of the invention
For above defect or the Improvement requirement of prior art, the invention provides the Documents Similarity computational methods based on full homomorphism cryptographic technique and the system of the storage of a kind of facing cloud, its object is to, realize the Documents Similarity of cloud server terminal under ciphertext state to calculate, and solve the technical problem that assailant that the existing similarity calculation based on Hash exists easily spies upon user data, poor stability.
For achieving the above object, according to one aspect of the present invention, provide the Documents Similarity computational methods based on full homomorphism cryptographic technique that a kind of facing cloud stores, comprise the following steps:
(1) data owner's stochastic generation RSA PKI R_Pub_Key and RSA private key R_Pri_Key, and FHE PKI F_Pub_Key and FHE private key F_Pri_Key;
(2) data owner carries out rsa encryption to its data, with generating ciphertext C_M, simhash computing is carried out to these data, to obtain digital signature file, full homomorphic cryptography is carried out to this digital signature file, and this digital signature file C_H after ciphertext C_M and encryption is uploaded to cloud service provider, wherein cloud service provider set up have data owner ciphertext, calculate ciphertext, corresponding relation between ciphertext ID;
(3) data consumer sends the request of data Similarity Measure to data owner, and data owner judges whether this data consumer is validated user, and if yes then enter step (4), else process terminates;
(4) RSA PKI R_Pub_Key and FHE PKI F_Pub_Key is sent to data consumer in certificate mode by data owner;
(5) data that data consumer has himself carry out simhash computing, to obtain digital signature file H_P, use FHE PKI F_Pub_Key to carry out full homomorphic cryptography to this digital signature file H_P, and will be uploaded to cloud service provider;
(6) cloud service provider uses FHE ciphertext addition algorithm to carry out Similarity Measure to this digital signature file after the encryption obtained in this digital signature file C_P after encryption and step (2), to obtain the signature file after encrypting, and two tuples comprising this signature file and corresponding ciphertext ID thereof are sent to data owner;
(7) data owner utilizes FHE private key F_Pri_Key to be decrypted this signature file, obtain the Hamming distances of the signature file S after deciphering, Hamming distances is come front n corresponding ciphertext ID and is sent to cloud service provider, wherein n be less than or equal to 3 positive integer;
(8) cloud service provider searches corresponding ciphertext according to this ciphertext ID, and this ciphertext is returned to data consumer;
(9) data consumer uses RSA PKI R_Pub_Key to decipher this ciphertext, and process terminates.
Preferably, ciphertext ID comprises uplink time and the ciphertext size of ciphertext.
Preferably, in step (7), the digital signature file be made up of " 0 ", " 1 " and " 2 " three characters obtained after deciphering, the acquisition of Hamming distances be exactly in the signature file S after statistics deciphering character be the number of " 1 ".
Preferably, the data storage procedure of step (2) is:
(2-1) simhash calculating is carried out to the data M of data owner, to generate corresponding digital signature file H_M;
(2-2) adopt PKI F_Pub_Key to carry out full homomorphic cryptography computing to digital signature file H_M, obtain ciphertext C_H;
(2-3) adopt private key R_Pri_Key to carry out rsa encryption to data M, obtain ciphertext C-_M;
(2-4) by document id, ciphertext C_H, ciphertext C_M upload to cloud service provider, be responsible for storing and set up the relation one to one between three by cloud service provider.
According to another aspect of the present invention, provide the Documents Similarity computing system based on full homomorphism cryptographic technique that a kind of facing cloud stores, be be applied in comprise data consumer, data owner and cloud service provider facing cloud storage system in, described Documents Similarity computing system comprises with lower module:
First module, it is arranged in data owner, for stochastic generation RSA PKI R_Pub_Key and RSA private key R_Pri_Key, and FHE PKI F_Pub_Key and FHE private key F_Pri_Key;
Second module, it is arranged in data owner, for carrying out rsa encryption to its data, with generating ciphertext C_M, simhash computing is carried out to these data, to obtain digital signature file, full homomorphic cryptography is carried out to this digital signature file, and this digital signature file C_H after ciphertext C_M and encryption is uploaded to cloud service provider, wherein cloud service provider set up have data owner ciphertext, calculate ciphertext, corresponding relation between ciphertext ID;
3rd module, it is arranged in data consumer, and for sending the request of data Similarity Measure to data owner, and data owner judges whether this data consumer is validated user, and if yes then enter four module, else process terminates;
Four module, it is arranged in data owner, for RSA PKI R_Pub_Key and FHE PKI F_Pub_Key is sent to data consumer in certificate mode;
5th module, it is arranged in data consumer, carries out simhash computing, to obtain digital signature file H_P for the data had himself, use FHE PKI F_Pub_Key to carry out full homomorphic cryptography to this digital signature file H_P, and will cloud service provider be uploaded to;
6th module, it is arranged in cloud service provider, for using FHE ciphertext addition algorithm, Similarity Measure is carried out to this digital signature file after the encryption obtained in this digital signature file C_P after encryption and the second module, to obtain the signature file after encrypting, and two tuples comprising this signature file and corresponding ciphertext ID thereof are sent to data owner;
7th module, it is arranged in data owner, for utilizing FHE private key F_Pri_Key, this signature file is decrypted, obtain the Hamming distances (i.e. data similarity) of signature file S after deciphering, Hamming distances is come front n (n be less than or equal to 3 positive integer) the ciphertext ID of correspondence is sent to cloud service provider;
8th module, it is arranged in cloud service provider, for searching corresponding ciphertext according to this ciphertext ID, and this ciphertext is returned to data consumer.
9th module, it is arranged in data consumer, and for using RSA PKI R_Pub_Key to decipher this ciphertext, process terminates.
In general, the above technical scheme conceived by the present invention compared with prior art, can obtain following beneficial effect:
(1) fail safe is good: under have employed the authentication (HASH signature) of step (3) user and step (6) ciphertext state, use full homomorphism addition algorithm to carry out Similarity Measure to it, therefore can prevent external attack, ensure its fail safe.
(2) privacy is good: make basic ciphertext not participate in similarity computing owing to have employed step (2) rsa encryption, FHE encryption and simhash signature, what participate in similarity computing is the digital signature ciphertext of its correspondence, therefore ensures the privacy of data.
(3) the present invention is with low cost, method is easy: prior art is when completing the Documents Similarity calculating based on simhash value; carry out under plaintext state; assailant can carry out brute force attack and tentative data content information to simhash value; and the simhash value of document is carried out full homomorphic cryptography by data owner in the inventive method; cloud service provider carries out add operation to the ciphertext of simhash value; it can not learn simhash value content itself, thus the privacy of protection user data.
Accompanying drawing explanation
Fig. 1 is the flow chart of the Documents Similarity computational methods based on full homomorphism cryptographic technique that facing cloud of the present invention stores.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.In addition, if below in described each execution mode of the present invention involved technical characteristic do not form conflict each other and just can mutually combine.
Basic ideas of the present invention are, the similarity calculating method based on full homomorphism cryptographic technique that facing cloud provided by the invention stores is in data object Similarity Measure process, the any information relevant to document can not be revealed with other assailants to cloud service provider, the similarity of data object calculates under ciphertext state, protects the data secret of data owner and the data query secret of data consumer; Data owner grasps the use right of data, comprises the information content itself and the calculating right to relevant information.Only have data owner to authorize down, cloud service provider could complete the calculating of expection to encrypt data, data consumer just can learn data content.
For cloud storage environment, method proposes the Documents Similarity computational methods under a kind of ciphertext state, full homomorphic cryptography is carried out to the simhash value of document, in cloud server terminal, full homomorphism add operation is carried out to simhash value ciphertext, and then the Documents Similarity completed based on Hamming distances calculates; Conventional, asymmetrical PKI RSA cryptographic algorithms is adopted to be encrypted to the content of customer documentation itself.
As shown in Figure 1, the facing cloud storage system that this method is applied comprises data owner DO (DataOwner), cloud service provider CS (Cloud Server), data consumer DU (Data Users) three roles.Specifically:
Data owner DO: the service provided comprises Choice encryption algorithm, produces the basic parameters such as key; Digital signature after document after encryption and encryption is sent to CS; To needing the user DU of visit data to verify, and provide key to respectively CS and DU.
Cloud service provider CS: the service provided comprises the encrypt data storing DO and upload, and establishes the corresponding relation between encrypted document, ciphertext digital signature.
Data consumer DU: the service provided comprises the request of ciphertext Similarity Measure; The ciphertext that deciphering CS returns.
As shown in Figure 1, the Documents Similarity computational methods based on full homomorphism cryptographic technique that facing cloud of the present invention stores comprise the following steps:
(1) data owner's stochastic generation asymmetric public key encryption (RSA) PKI R_Pub_Key and RSA private key R_Pri_Key, and full homomorphism (FHE) PKI F_Pub_Key and FHE private key F_Pri_Key;
(2) data owner carries out rsa encryption to its data, with generating ciphertext C_M, simhash computing is carried out to these data, to obtain digital signature file, full homomorphic cryptography is carried out to this digital signature file, and this digital signature file (its be the calculate ciphertext) C_H after ciphertext C_M and encryption is uploaded to cloud service provider, wherein cloud service provider set up have data owner ciphertext, calculate corresponding relation between ciphertext, ciphertext ID; Specifically, ciphertext ID comprises the information such as uplink time, ciphertext size of ciphertext;
(3) data consumer sends the request of data Similarity Measure to data owner, and data owner judges whether this data consumer is validated user, and if yes then enter step (4), else process terminates; Specifically, by authentication (HASH signature), data owner judges whether this user is validated user.
(4) RSA PKI R_Pub_Key and FHE PKI F_Pub_Key is sent to data consumer in certificate mode by data owner;
(5) data that data consumer has himself carry out simhash computing, to obtain digital signature file H_P, use FHE PKI F_Pub_Key to carry out full homomorphic cryptography to this digital signature file H_P, and will be uploaded to cloud service provider;
(6) cloud service provider uses FHE ciphertext addition algorithm to carry out Similarity Measure to this digital signature file after the encryption obtained in this digital signature file C_P after encryption and step (2), to obtain the signature file after encrypting, (it calculates ciphertext, and the length under plaintext state is 64), and two tuples comprising this signature file and corresponding ciphertext ID thereof are sent to data owner;
(7) data owner utilizes FHE private key F_Pri_Key to be decrypted this signature file, obtain the Hamming distances (i.e. data similarity) of signature file S after deciphering, Hamming distances is come front n (n be less than or equal to 3 positive integer) the ciphertext ID of correspondence is sent to cloud service provider;
Specifically, the digital signature file be made up of " 0 ", " 1 " and " 2 " three characters obtained after deciphering, the acquisition of Hamming distances be exactly in the signature file S after statistics deciphering character be that the number of " 1 " is (in this method, Hamming distances D between two documents is by how many decisions of contained " 1 " in digital signature value S), then carry out ascending sort to obtained Hamming distances D, document id value Hamming distances value being come front n issues cloud service provider;
(8) cloud service provider searches corresponding ciphertext according to this ciphertext ID, and this ciphertext is returned to data consumer;
(9) data consumer uses RSA PKI R_Pub_Key to decipher this ciphertext, and process terminates.
The data storage procedure of above-mentioned steps (2) is:
A, simhash calculating is carried out to the data M of data owner, to generate corresponding digital signature file H_M;
B, the PKI F_Pub_Key adopting step 1 to generate carry out full homomorphic cryptography computing to H_M, obtain ciphertext C_H;
C, the private key R_Pri_Key adopting step 1 to generate carry out rsa encryption to M, obtain ciphertext C_M;
D, data owner are by document id value, and C_H, C_M upload to cloud service provider, be responsible for storing and set up the relation one to one between three by cloud service provider.
The Documents Similarity computing system based on full homomorphism cryptographic technique that facing cloud of the present invention stores be applied in comprise data consumer, data owner and cloud service provider facing cloud storage system in, and comprise with lower module:
First module, it is arranged in data owner, for stochastic generation asymmetric public key encryption (RSA) PKI R_Pub_Key and RSA private key R_Pri_Key, and full homomorphism (FHE) PKI F_Pub_Key and FHE private key F_Pri_Key;
Second module, it is arranged in data owner, for carrying out rsa encryption to its data, with generating ciphertext C_M, simhash computing is carried out to these data, to obtain digital signature file, full homomorphic cryptography is carried out to this digital signature file, and this digital signature file (its be the calculate ciphertext) C_H after ciphertext C_M and encryption is uploaded to cloud service provider, wherein cloud service provider set up have data owner ciphertext, calculate corresponding relation between ciphertext, ciphertext ID; Specifically, ciphertext ID comprises the information such as uplink time, ciphertext size of ciphertext;
3rd module, it is arranged in data consumer, and for sending the request of data Similarity Measure to data owner, and data owner judges whether this data consumer is validated user, and if yes then enter four module, else process terminates; Specifically, by authentication (HASH signature), data owner judges whether this user is validated user;
Four module, it is arranged in data owner, for RSA PKI R_Pub_Key and FHE PKI F_Pub_Key is sent to data consumer in certificate mode;
5th module, it is arranged in data consumer, carries out simhash computing, to obtain digital signature file H_P for the data had himself, use FHE PKI F_Pub_Key to carry out full homomorphic cryptography to this digital signature file H_P, and will cloud service provider be uploaded to;
6th module, it is arranged in cloud service provider, for using FHE ciphertext addition algorithm, Similarity Measure is carried out to this digital signature file after the encryption obtained in this digital signature file C_P after encryption and the second module, to obtain the signature file after encrypting, (it calculates ciphertext, and the length under plaintext state is 64), and two tuples comprising this signature file and corresponding ciphertext ID thereof are sent to data owner;
7th module, it is arranged in data owner, for utilizing FHE private key F_Pri_Key, this signature file is decrypted, obtain the Hamming distances (i.e. data similarity) of signature file S after deciphering, Hamming distances is come front n (n be less than or equal to 3 positive integer) the ciphertext ID of correspondence is sent to cloud service provider;
Specifically, the digital signature file be made up of " 0 ", " 1 " and " 2 " three characters obtained after deciphering, the acquisition of Hamming distances be exactly in the signature file S after statistics deciphering character be that the number of " 1 " is (in this method, Hamming distances D between two documents is by how many decisions of contained " 1 " in digital signature value S), then carry out ascending sort to obtained Hamming distances D, document id value Hamming distances value being come front n issues cloud service provider;
8th module, it is arranged in cloud service provider, for searching corresponding ciphertext according to this ciphertext ID, and this ciphertext is returned to data consumer;
9th module, it is arranged in data consumer, and for using RSA PKI R_Pub_Key to decipher this ciphertext, process terminates.
Generally speaking, the present invention has following advantage:
(1) fail safe of the present invention is good: under have employed the authentication (HASH signature) of step (3) user and step (6) ciphertext state, use full homomorphism addition algorithm to carry out Similarity Measure to it, therefore can prevent external attack, ensure its fail safe.
(2) privacy of the present invention is good: make basic ciphertext not participate in similarity computing owing to have employed step (2) rsa encryption, FHE encryption and simhash signature, what participate in similarity computing is the digital signature ciphertext of its correspondence, therefore ensures the privacy of data.
(3) the present invention is with low cost, method is easy: prior art is when completing the Documents Similarity calculating based on simhash value; carry out under plaintext state; assailant can carry out brute force attack and tentative data content information to simhash value; and the simhash value of document is carried out full homomorphic cryptography by data owner in the inventive method; cloud service provider carries out add operation to the ciphertext of simhash value; it can not learn simhash value content itself, thus the privacy of protection user data.
Those skilled in the art will readily understand; the foregoing is only preferred embodiment of the present invention; not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (5)

1. the Documents Similarity computational methods based on full homomorphism cryptographic technique of facing cloud storage, is characterized in that, comprise the following steps:
(1) data owner's stochastic generation RSA PKI R_Pub_Key and RSA private key R_Pri_Key, and FHE PKI F_Pub_Key and FHE private key F_Pri_Key;
(2) data owner carries out rsa encryption to its data, with generating ciphertext C_M, simhash computing is carried out to these data, to obtain digital signature file, full homomorphic cryptography is carried out to this digital signature file, and this digital signature file C_H after ciphertext C_M and encryption is uploaded to cloud service provider, wherein cloud service provider set up have data owner ciphertext, calculate ciphertext, corresponding relation between ciphertext ID;
(3) data consumer sends the request of data Similarity Measure to data owner, and data owner judges whether this data consumer is validated user, and if yes then enter step (4), else process terminates;
(4) RSA PKI R_Pub_Key and FHE PKI F_Pub_Key is sent to data consumer in certificate mode by data owner;
(5) data that data consumer has himself carry out simhash computing, to obtain digital signature file H_P, use FHE PKI F_Pub_Key to carry out full homomorphic cryptography to this digital signature file H_P, and will be uploaded to cloud service provider;
(6) cloud service provider uses FHE ciphertext addition algorithm to carry out Similarity Measure to this digital signature file after the encryption obtained in this digital signature file C_P after encryption and step (2), to obtain the signature file after encrypting, and two tuples comprising this signature file and corresponding ciphertext ID thereof are sent to data owner;
(7) data owner utilizes FHE private key F_Pri_Key to be decrypted this signature file, obtain the Hamming distances of the signature file S after deciphering, Hamming distances is come front n corresponding ciphertext ID and is sent to cloud service provider, wherein n be less than or equal to 3 positive integer;
(8) cloud service provider searches corresponding ciphertext according to this ciphertext ID, and this ciphertext is returned to data consumer;
(9) data consumer uses RSA PKI R_Pub_Key to decipher this ciphertext, and process terminates.
2. Documents Similarity computational methods according to claim 1, is characterized in that, ciphertext ID comprises uplink time and the ciphertext size of ciphertext.
3. Documents Similarity computational methods according to claim 1, it is characterized in that, in step (7), the digital signature file be made up of " 0 ", " 1 " and " 2 " three characters obtained after deciphering, the acquisition of Hamming distances be exactly in the signature file S after statistics deciphering character be the number of " 1 ".
4. Documents Similarity computational methods according to claim 1, is characterized in that, the data storage procedure of step (2) is:
(2-1) simhash calculating is carried out to the data M of data owner, to generate corresponding digital signature file H_M;
(2-2) adopt PKI F_Pub_Key to carry out full homomorphic cryptography computing to digital signature file H_M, obtain ciphertext C_H;
(2-3) adopt private key R_Pri_Key to carry out rsa encryption to data M, obtain ciphertext C-_M;
(2-4) by document id, ciphertext C_H, ciphertext C_M upload to cloud service provider, be responsible for storing and set up the relation one to one between three by cloud service provider.
5. the Documents Similarity computing system based on full homomorphism cryptographic technique of a facing cloud storage, be be applied in comprise data consumer, data owner and cloud service provider facing cloud storage system in, it is characterized in that, described Documents Similarity computing system comprises with lower module:
First module, it is arranged in data owner, for stochastic generation RSA PKI R_Pub_Key and RSA private key R_Pri_Key, and FHE PKI F_Pub_Key and FHE private key F_Pri_Key;
Second module, it is arranged in data owner, for carrying out rsa encryption to its data, with generating ciphertext C_M, simhash computing is carried out to these data, to obtain digital signature file, full homomorphic cryptography is carried out to this digital signature file, and this digital signature file C_H after ciphertext C_M and encryption is uploaded to cloud service provider, wherein cloud service provider set up have data owner ciphertext, calculate ciphertext, corresponding relation between ciphertext ID;
3rd module, it is arranged in data consumer, and for sending the request of data Similarity Measure to data owner, and data owner judges whether this data consumer is validated user, and if yes then enter four module, else process terminates;
Four module, it is arranged in data owner, for RSA PKI R_Pub_Key and FHE PKI F_Pub_Key is sent to data consumer in certificate mode;
5th module, it is arranged in data consumer, carries out simhash computing, to obtain digital signature file H_P for the data had himself, use FHE PKI F_Pub_Key to carry out full homomorphic cryptography to this digital signature file H_P, and will cloud service provider be uploaded to;
6th module, it is arranged in cloud service provider, for using FHE ciphertext addition algorithm, Similarity Measure is carried out to this digital signature file after the encryption obtained in this digital signature file C_P after encryption and the second module, to obtain the signature file after encrypting, and two tuples comprising this signature file and corresponding ciphertext ID thereof are sent to data owner;
7th module, it is arranged in data owner, for utilizing FHE private key F_Pri_Key, this signature file is decrypted, obtain the Hamming distances (i.e. data similarity) of signature file S after deciphering, Hamming distances is come front n (n be less than or equal to 3 positive integer) the ciphertext ID of correspondence is sent to cloud service provider;
8th module, it is arranged in cloud service provider, for searching corresponding ciphertext according to this ciphertext ID, and this ciphertext is returned to data consumer.
9th module, it is arranged in data consumer, and for using RSA PKI R_Pub_Key to decipher this ciphertext, process terminates.
CN201510416852.3A 2015-07-15 2015-07-15 Towards the Documents Similarity computational methods based on full homomorphism cryptographic technique of cloud storage Active CN104967693B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510416852.3A CN104967693B (en) 2015-07-15 2015-07-15 Towards the Documents Similarity computational methods based on full homomorphism cryptographic technique of cloud storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510416852.3A CN104967693B (en) 2015-07-15 2015-07-15 Towards the Documents Similarity computational methods based on full homomorphism cryptographic technique of cloud storage

Publications (2)

Publication Number Publication Date
CN104967693A true CN104967693A (en) 2015-10-07
CN104967693B CN104967693B (en) 2018-05-18

Family

ID=54221630

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510416852.3A Active CN104967693B (en) 2015-07-15 2015-07-15 Towards the Documents Similarity computational methods based on full homomorphism cryptographic technique of cloud storage

Country Status (1)

Country Link
CN (1) CN104967693B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106407447A (en) * 2016-09-30 2017-02-15 福州大学 Simhash-based fuzzy sequencing searching method for encrypted cloud data
CN107086902A (en) * 2017-03-22 2017-08-22 北京理工大学 It is a kind of that tripartite's examination & verification and the cloud storage system of file duplicate removal are supported based on dynamic threshold password
CN107181584A (en) * 2016-03-09 2017-09-19 郑珂威 Asymmetric complete homomorphic cryptography and its replacement of keys and ciphertext complete a business transaction method
CN107196918A (en) * 2017-04-27 2017-09-22 北京小米移动软件有限公司 A kind of method and apparatus of matched data
CN108140334A (en) * 2015-10-09 2018-06-08 三菱电机株式会社 Confidential search system, managing device, concealment search method and concealment search program
CN110011954A (en) * 2018-11-27 2019-07-12 阿里巴巴集团控股有限公司 Biometric discrimination method, device, terminal and service server based on homomorphic cryptography
CN110309674A (en) * 2019-07-04 2019-10-08 浙江理工大学 A kind of sort method based on full homomorphic cryptography
CN113449321A (en) * 2021-07-01 2021-09-28 北京明朝万达科技股份有限公司 Ciphertext retrieval method, device and system
TWI762776B (en) * 2018-06-29 2022-05-01 開曼群島商創新先進技術有限公司 Input acquisition method and device for secure multi-party computation agreement
CN117235381A (en) * 2023-10-10 2023-12-15 南京邮电大学 Friend recommendation method based on homomorphic encryption space-time parity calculation

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100146299A1 (en) * 2008-10-29 2010-06-10 Ashwin Swaminathan System and method for confidentiality-preserving rank-ordered search
CN102831198A (en) * 2012-08-07 2012-12-19 人民搜索网络股份公司 Similar document identifying device and similar document identifying method based on document signature technology

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100146299A1 (en) * 2008-10-29 2010-06-10 Ashwin Swaminathan System and method for confidentiality-preserving rank-ordered search
CN102831198A (en) * 2012-08-07 2012-12-19 人民搜索网络股份公司 Similar document identifying device and similar document identifying method based on document signature technology

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
《计算机工程与科学》 *
宫孟孟: "面向云存储的同态加解密及密文检索算法的研究", 《计算机光盘软件与应用》》 *
张广庆等: "基于Simhash的海量相似文档快速搜索优化方法", 《指挥信息系统与技术》 *
程帅等: "基于同态加密的密文全文检索技术的研究", 《计算机科学》 *
魏占祯等: "RSA乘法同态的数据库密文检索实现", 《哈尔滨工程大学学报》 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108140334B (en) * 2015-10-09 2021-03-23 三菱电机株式会社 Confidential search system, management device, confidential search method, and recording medium
CN108140334A (en) * 2015-10-09 2018-06-08 三菱电机株式会社 Confidential search system, managing device, concealment search method and concealment search program
CN107181584B (en) * 2016-03-09 2020-02-07 郑珂威 Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof
CN107181584A (en) * 2016-03-09 2017-09-19 郑珂威 Asymmetric complete homomorphic cryptography and its replacement of keys and ciphertext complete a business transaction method
CN106407447A (en) * 2016-09-30 2017-02-15 福州大学 Simhash-based fuzzy sequencing searching method for encrypted cloud data
CN107086902A (en) * 2017-03-22 2017-08-22 北京理工大学 It is a kind of that tripartite's examination & verification and the cloud storage system of file duplicate removal are supported based on dynamic threshold password
CN107196918B (en) * 2017-04-27 2020-10-30 北京小米移动软件有限公司 Data matching method and device
CN107196918A (en) * 2017-04-27 2017-09-22 北京小米移动软件有限公司 A kind of method and apparatus of matched data
TWI762776B (en) * 2018-06-29 2022-05-01 開曼群島商創新先進技術有限公司 Input acquisition method and device for secure multi-party computation agreement
US11388149B2 (en) 2018-06-29 2022-07-12 Advanced New Technologies Co., Ltd. Method and apparatus for obtaining input of secure multiparty computation protocol
CN110011954A (en) * 2018-11-27 2019-07-12 阿里巴巴集团控股有限公司 Biometric discrimination method, device, terminal and service server based on homomorphic cryptography
CN110011954B (en) * 2018-11-27 2021-09-14 创新先进技术有限公司 Homomorphic encryption-based biological identification method, device, terminal and business server
CN110309674A (en) * 2019-07-04 2019-10-08 浙江理工大学 A kind of sort method based on full homomorphic cryptography
CN110309674B (en) * 2019-07-04 2021-10-01 浙江理工大学 Ordering method based on fully homomorphic encryption
CN113449321A (en) * 2021-07-01 2021-09-28 北京明朝万达科技股份有限公司 Ciphertext retrieval method, device and system
CN113449321B (en) * 2021-07-01 2024-04-05 北京明朝万达科技股份有限公司 Ciphertext retrieval method, device and system
CN117235381A (en) * 2023-10-10 2023-12-15 南京邮电大学 Friend recommendation method based on homomorphic encryption space-time parity calculation

Also Published As

Publication number Publication date
CN104967693B (en) 2018-05-18

Similar Documents

Publication Publication Date Title
US11381398B2 (en) Method for re-keying an encrypted data file
CN104967693A (en) Document similarity calculation method facing cloud storage based on fully homomorphic password technology
JP6180177B2 (en) Encrypted data inquiry method and system capable of protecting privacy
CN109614818B (en) Authorized identity-based keyword search encryption method
CN107145791B (en) K-means clustering method and system with privacy protection function
CN105610793B (en) A kind of outsourcing data encryption storage and cryptogram search system and its application process
EP2830282A1 (en) Storage method, system and device
CN104158827B (en) Ciphertext data sharing method, device, inquiry server and upload data client
CN109361644B (en) Fuzzy attribute based encryption method supporting rapid search and decryption
CN105320896A (en) Cloud storage encryption and ciphertext retrieval methods and systems
CN103095733A (en) Keyword cipher text retrieval method for cloud storage
CN112543187A (en) Industrial Internet of things safety data sharing method based on edge block chain
CN107359998A (en) A kind of foundation of portable intelligent password management system and operating method
CN107465665A (en) A kind of file encryption-decryption method based on fingerprint identification technology
CN108347404A (en) A kind of identity identifying method and device
CN108400970A (en) Set of metadata of similar data message locking encryption De-weight method, cloud storage system in cloud environment
CN107204997A (en) The method and apparatus for managing cloud storage data
CN109951279A (en) A kind of anonymous data storage method based on block chain and edge device
CN103607278A (en) Safe data cloud storage method
CN103731423A (en) Safe method for repeated data deleting
CN110175169A (en) A kind of encryption data De-weight method, system and relevant apparatus
Liu et al. EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination
WO2021098152A1 (en) Blockchain-based data processing method, device, and computer apparatus
CN114528331A (en) Data query method, device, medium and equipment based on block chain
WO2014030706A1 (en) Encrypted database system, client device and server, method and program for adding encrypted data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221114

Address after: 430056 Leke Workshop Incubator, Building 1, Lianchuang Technology Center, No. 55, Haitang Road, Wuhan Economic and Technological Development Zone, Wuhan, Hubei Province (Ji-LKGC-401-3)

Patentee after: Wuhan Shengjinyuan Electronic Technology Co.,Ltd.

Address before: 430074 National Road 708, Hongshan District, Wuhan, Hubei

Patentee before: SOUTH CENTRAL University FOR NATIONALITIES