CN105024812A - Searchable encryption method for identity-based designated testers in cloud storage - Google Patents

Searchable encryption method for identity-based designated testers in cloud storage Download PDF

Info

Publication number
CN105024812A
CN105024812A CN201510408086.6A CN201510408086A CN105024812A CN 105024812 A CN105024812 A CN 105024812A CN 201510408086 A CN201510408086 A CN 201510408086A CN 105024812 A CN105024812 A CN 105024812A
Authority
CN
China
Prior art keywords
identity
data
cloud storage
private key
encryption method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510408086.6A
Other languages
Chinese (zh)
Other versions
CN105024812B (en
Inventor
王尚平
赵宝华
张亚玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kds Datacenter Solution Co ltd
Anhui Phetom Intelligent Traffic Technology Co Ltd
Original Assignee
Xian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Technology filed Critical Xian University of Technology
Priority to CN201510408086.6A priority Critical patent/CN105024812B/en
Publication of CN105024812A publication Critical patent/CN105024812A/en
Application granted granted Critical
Publication of CN105024812B publication Critical patent/CN105024812B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Computer And Data Communications (AREA)

Abstract

本发明公开了一种云存储中基于身份的指定测试者的可搜索的加密方法,步骤包括:步骤1、系统参数初始化;步骤2、服务器私钥的生成;步骤3、数据接收者私钥的生成;步骤4、数据拥有者对关键字进行加密;步骤5、陷门的生成;步骤6、测试,本发明使得只有授权的云存储服务器才能执行存储和检索工作,以此来抵抗恶意云存储服务器的攻击,数据拥有者可以将自己的数据和提取的相应关键字加密后,存放到指定的云存储服务器,只有指定的云存储服务器才能检索到需要的密文数据,并将其传给数据接收者,本发明解决了现有技术中存在的恶意云存储服务器在执行搜索过程中会泄露用户搜索的数据的问题。The invention discloses a searchable encryption method for specifying testers based on identity in cloud storage. The steps include: step 1, system parameter initialization; step 2, server private key generation; step 3, data receiver private key Generate; step 4, the data owner encrypts the keyword; step 5, trapdoor generation; step 6, test, the present invention enables only authorized cloud storage servers to perform storage and retrieval work, so as to resist malicious cloud storage Server attack, the data owner can encrypt their own data and the extracted corresponding keywords, and store them in the designated cloud storage server. Only the designated cloud storage server can retrieve the required ciphertext data and pass it to the data Recipients, the present invention solves the problem in the prior art that malicious cloud storage servers may leak data searched by users during the search process.

Description

云存储中基于身份的指定测试者的可搜索的加密方法Searchable encryption method for identity-based designated testers in cloud storage

技术领域technical field

本发明属于信息安全技术领域,具体涉及一种云存储中基于身份的指定测试者的可搜索的加密方法。The invention belongs to the technical field of information security, and in particular relates to a searchable encryption method for an identity-based designated tester in cloud storage.

背景技术Background technique

云计算作为一种新的计算模型,能够提供成本较低、可扩展的各种先进的计算服务,为了节省存储及管理数据的代价,企业和个人可以将数据外包到云存储服务器。云存储服务提供的数据具有可用性和可靠性等优势,但是其也有一个很明显的缺点,即数据不在用户的管理及控制之下,那么如何维护数据的机密性和完整性便成为用户迫切关注的问题。As a new computing model, cloud computing can provide various advanced computing services with low cost and scalability. In order to save the cost of storing and managing data, enterprises and individuals can outsource data to cloud storage servers. The data provided by the cloud storage service has the advantages of availability and reliability, but it also has an obvious disadvantage, that is, the data is not under the management and control of the user, so how to maintain the confidentiality and integrity of the data becomes an urgent concern of the user. question.

虽然企业相信云存储服务提供商(Cloud Storage Service Provider,CSSP)的可靠性、可用性、容错性等,但是人们无法确信CSSP不将托管的数据用于其他目的;同样对于个人用户而言,他们希望自己的数据只能由自己或指定的人访问而不能被CSSP访问。这将导致两方面的问题:一方面,从用户的角度看,他们无法找到让他们完全可信的CSSP来存储和管理他们的数据;另一方面从CSSP的角度看,在没有解决上述问题的情况下将会丢失大量的客户。因此,数据的机密性及完整性将阻碍云存储的推广及使用。Although enterprises believe in the reliability, availability, fault tolerance, etc. of Cloud Storage Service Providers (Cloud Storage Service Providers, CSSPs), people cannot be sure that CSSPs will not use hosted data for other purposes; Your own data can only be accessed by yourself or designated people and cannot be accessed by CSSP. This will lead to two problems: on the one hand, from the user's point of view, they cannot find a fully trusted CSSP to store and manage their data; on the other hand, from the point of view of CSSP, without solving the above problems In this case, a large number of customers will be lost. Therefore, the confidentiality and integrity of data will hinder the promotion and use of cloud storage.

鉴于以上的实际问题,云存储中数据必须在传输到CSSP之前,由用户自己加密,并且也只能由用户自己进行解密,这样将会减轻用户数据泄漏的危险。但这将引入一个新的问题,如用户需要包含某个关键字的文档,那么用户是否能很快的获得他们想要的数据并保证数据对CSSP的机密性?In view of the above practical problems, the data in cloud storage must be encrypted by the user before being transmitted to CSSP, and can only be decrypted by the user himself, which will reduce the risk of user data leakage. But this will introduce a new problem, if the user needs a document containing a certain keyword, can the user quickly obtain the data they want and ensure the confidentiality of the data to CSSP?

发明内容Contents of the invention

本发明的目的是提供一种云存储中基于身份的指定测试者的可搜索的加密方法,解决了现有技术中存在的的恶意云存储服务器在执行搜索过程中会泄露用户搜索的数据的问题。The purpose of the present invention is to provide a searchable encryption method for designated testers based on identity in cloud storage, which solves the problem in the prior art that malicious cloud storage servers will leak the data searched by users during the search process .

本发明所采用的技术方案是,云存储中基于身份的指定测试者的可搜索的加密方法,具体按照以下步骤实施:The technical scheme adopted in the present invention is a searchable encryption method based on the identity of the designated tester in cloud storage, specifically implemented according to the following steps:

步骤1、系统参数初始化;Step 1, system parameter initialization;

步骤2、服务器私钥的生成;Step 2, generation of server private key;

步骤3、数据接收者私钥的生成;Step 3, the generation of the private key of the data recipient;

步骤4、数据拥有者对关键字进行加密;Step 4. The data owner encrypts the keywords;

步骤5、陷门的生成;Step 5, generation of trapdoor;

步骤6、测试。Step 6. Test.

本发明的特点还在于,The present invention is also characterized in that,

步骤1具体按照以下步骤实施:Step 1 is specifically implemented according to the following steps:

步骤(1.1)、给定安全参数k,公钥生成器PKG首先生成双线性映射e:G1×G1→G2,其中G1是阶为大素数q>2k的加法循环群,G2是阶为大素数q>2k的乘法循环群,公钥生成器PKG随机选择主密钥这里并计算Ppub=s-1P∈G1作为系统公钥,其中P是G1的生成元;Step (1.1), given the security parameter k, the public key generator PKG first generates a bilinear map e:G 1 ×G 1 →G 2 , where G 1 is an additive cyclic group whose order is a large prime number q>2 k , G 2 is a multiplicative cyclic group whose order is a large prime number q>2 k , and the public key generator PKG randomly selects the master key here And calculate P pub =s -1 P∈G 1 as the system public key, where P is the generator of G 1 ;

步骤(1.2)、PKG选择3个散列函数:Step (1.2), PKG selects 3 hash functions:

H1:{0,1}n→G1H 1 : {0,1} n →G 1 ,

H2:G2→{0,1}nH 2 :G 2 →{0,1} n ,

Hh 33 :: {{ 0,10,1 }} nno →&Right Arrow; ZZ qq ** ,,

其中,n是关键字的长度,记关键字空间为W={0,1}n,系统公共参数PP为{q,G1,G2,e,P,Ppub,n,H1,H2,H3},主私钥msk=s-1Among them, n is the length of the keyword, remember that the keyword space is W={0,1} n , and the system public parameter PP is {q,G 1 ,G 2 ,e,P,P pub ,n,H 1 ,H 2 ,H 3 }, master private key msk=s -1 .

步骤2具体为:Step 2 is specifically:

给定服务器的身份IDS∈{0,1}n,PKG利用主私钥msk=s-1,计算服务器的私钥skS=s-1H1(IDS)。Given the server's identity ID S ∈{0,1} n , PKG uses the master private key msk=s −1 to calculate the server's private key sk S =s −1 H 1 (ID S ).

步骤3具体为:Step 3 is specifically:

给定接收者的身份IDR∈{0,1}n,PKG利用主私钥msk=s-1,计算数据接收者的私钥skR=s-1H1(IDR)。Given the receiver's identity ID R ∈{0,1} n , PKG uses the master private key msk=s -1 to calculate the data receiver's private key sk R =s -1 H 1 (ID R ).

步骤4具体按以下步骤实施:Step 4 is specifically implemented in the following steps:

步骤(4.1)、给定IDS、IDR、w∈W={0,1}n,数据拥有者随机选择r1∈Zp,并计算密文C=(C1,C2,C3)分别为:Step (4.1), given ID S , ID R , w∈W={0,1} n , the data owner randomly selects r 1 ∈ Z p , and calculates the ciphertext C=(C 1 ,C 2 ,C 3 ) are:

C1=r1P,C 1 =r 1 P,

C2=H2[e(H1(IDR),r1Ppub)]+H2[e(H1(IDS),r1Ppub)],C 2 =H 2 [e(H 1 (ID R ),r 1 P pub )]+H 2 [e(H 1 (ID S ),r 1 P pub )],

CC 33 == Hh 33 {{ ww ⊕⊕ Hh 22 [[ ee (( Hh 11 (( IDID RR )) ,, PP pp uu bb )) ]] -- Hh 22 [[ ee (( Hh 11 (( IDID RR )) ,, rr 11 pp pp uu bb )) ]] }} ,,

步骤(4.2)、数据拥有者将关键字w加密后的密文C=(C1,C2,C3)和包含相应关键字的加密后的文件上传给云存储服务器。Step (4.2), the data owner uploads the ciphertext C=(C 1 , C 2 , C 3 ) encrypted with the keyword w and the encrypted file containing the corresponding keyword to the cloud storage server.

步骤5具体按以下步骤实施:Step 5 is specifically implemented in the following steps:

步骤(5.1)、给定IDS、skR和关键字w∈W={0,1}n,接收者随机选择r2∈Zp并计算:Step (5.1), given ID S , sk R and keyword w∈W={0,1} n , the receiver randomly selects r 2 ∈ Z p and calculates:

T1=r2P,T 1 =r 2 P,

T2=H3{H2[e(r2H1(IDS),Ppub)]},T 2 =H 3 {H 2 [e(r 2 H 1 (ID S ),P pub )]},

TT 33 == ww ⊕⊕ Hh 22 [[ ee (( sksk RR ,, PP )) ]] -- Hh 22 [[ ee (( Hh 11 (( IDID SS )) ,, rr 22 PP pp uu bb )) ]] ;;

步骤(5.2)、文件接收者将Tw=T1发送给服务器,并自己保留T2、T3Step (5.2), the file receiver sends T w =T 1 to the server, and keeps T 2 and T 3 for himself.

步骤6具体按以下步骤实施:Step 6 is specifically implemented in the following steps:

步骤(6.1)、服务器利用其自身的私钥skS计算H3(H2(e(sks,T1))),并将此结果发送给数据接收者;Step (6.1), the server uses its own private key sk S to calculate H 3 (H 2 (e(sk s ,T 1 ))), and sends the result to the data receiver;

步骤(6.2)、数据接收者测试等式T2=H3(H2(e(sks,T1)))是否成立,若成立,数据接收者将T3发送给云存储服务器,随后云存储服务器针对密文C=(C1,C2,C3),判断下面的公式是否成立:Step (6.2), the data receiver tests whether the equation T 2 =H 3 (H 2 (e(sk s ,T 1 ))) is true, if true, the data receiver sends T 3 to the cloud storage server, and then the cloud For the ciphertext C=(C 1 , C 2 , C 3 ), the storage server judges whether the following formula holds true:

C3=H3{H2[e(skS,C1)]+H2[e(skS,T1)]+T3-C2},C 3 =H 3 {H 2 [e(sk S ,C 1 )]+H 2 [e(sk S ,T 1 )]+T 3 -C 2 },

如果成立,说明密文和陷门匹配一致,将密文C所对应的加密文件发送给数据接收者;否则,继续下一条密文的测试,直至对所有密文测试结束。If it is true, it means that the ciphertext matches the trapdoor, and the encrypted file corresponding to ciphertext C is sent to the data receiver; otherwise, continue to test the next ciphertext until all ciphertext tests are completed.

本发明的有益效果是,云存储中基于身份的指定测试者的可搜索的加密方法,数据拥有者可以将从文档中提取的关键字利用服务器和数据接收者的身份进行加密,并和相应文档一起存储在云存储服务器上,其中文档采用的是另一种加密方法,当数据接收者想要搜索关于某个关键字的文档时,利用该关键字生成陷门,并将此陷门中的部分信息发送给云存储服务器以确认该服务器是否是授权的,进而就可以抵抗恶意云存储服务器的攻击。The beneficial effect of the present invention is that in the cloud storage based on the searchable encryption method of the designated tester based on the identity, the data owner can encrypt the keywords extracted from the document using the identity of the server and the data receiver, and Stored together on the cloud storage server, where the document is encrypted using another method, when the data receiver wants to search for a document about a certain keyword, the keyword is used to generate a trapdoor, and the trapdoor Part of the information is sent to the cloud storage server to confirm whether the server is authorized, and then it can resist attacks from malicious cloud storage servers.

具体实施方式Detailed ways

下面结合具体实施方式对本发明进行详细说明。The present invention will be described in detail below in combination with specific embodiments.

本发明云存储中基于身份的指定测试者的可搜索的加密方法,具体按照以下步骤实施:The searchable encryption method of the designated tester based on the identity in the cloud storage of the present invention is specifically implemented according to the following steps:

步骤1、系统参数初始化:Step 1. System parameter initialization:

具体按照以下步骤实施:Specifically follow the steps below:

步骤(1.1)、给定安全参数k,公钥生成器PKG首先生成双线性映射e:G1×G1→G2,其中G1是阶为大素数q>2k的加法循环群,G2是阶为大素数q>2k的乘法循环群,公钥生成器PKG随机选择主密钥这里并计算Ppub=s-1P∈G1作为系统公钥,其中P是G1的生成元;Step (1.1), given the security parameter k, the public key generator PKG first generates a bilinear map e:G 1 ×G 1 →G 2 , where G 1 is an additive cyclic group whose order is a large prime number q>2 k , G 2 is a multiplicative cyclic group whose order is a large prime number q>2 k , and the public key generator PKG randomly selects the master key here And calculate P pub =s -1 P∈G 1 as the system public key, where P is the generator of G 1 ;

步骤(1.2)、PKG选择3个散列函数:Step (1.2), PKG selects 3 hash functions:

H1:{0,1}n→G1H 1 : {0,1} n →G 1 ,

H2:G2→{0,1}nH 2 :G 2 →{0,1} n ,

Hh 33 :: {{ 0,10,1 }} nno →&Right Arrow; ZZ qq ** ,,

其中,n是关键字的长度,记关键字空间为W={0,1}n,系统公共参数PP为{q,G1,G2,e,P,Ppub,n,H1,H2,H3},主私钥msk=s-1Among them, n is the length of the keyword, remember that the keyword space is W={0,1} n , and the system public parameter PP is {q,G 1 ,G 2 ,e,P,P pub ,n,H 1 ,H 2 ,H 3 }, master private key msk=s -1 .

步骤2、服务器私钥的生成:Step 2. Generation of server private key:

给定服务器的身份IDS∈{0,1}n,PKG利用主私钥msk=s-1,计算服务器的私钥skS=s-1H1(IDS)。Given the server's identity ID S ∈{0,1} n , PKG uses the master private key msk=s −1 to calculate the server's private key sk S =s −1 H 1 (ID S ).

步骤3、数据接收者私钥的生成:Step 3. Generation of the private key of the data receiver:

给定接收者的身份IDR∈{0,1}n,PKG利用主私钥msk=s-1,计算数据接收者的私钥skR=s-1H1(IDR)。Given the receiver's identity ID R ∈{0,1} n , PKG uses the master private key msk=s -1 to calculate the data receiver's private key sk R =s -1 H 1 (ID R ).

步骤4、数据拥有者对关键字进行加密:Step 4. The data owner encrypts the keywords:

具体按以下步骤实施:Specifically follow the steps below:

步骤(4.1)、给定IDS、IDR、w∈W={0,1}n,数据拥有者随机选择r1∈Zp,并计算密文C=(C1,C2,C3)分别为:Step (4.1), given ID S , ID R , w∈W={0,1} n , the data owner randomly selects r 1 ∈ Z p , and calculates the ciphertext C=(C 1 ,C 2 ,C 3 ) are:

C1=r1P,C 1 =r 1 P,

C2=H2[e(H1(IDR),r1Ppub)]+H2[e(H1(IDS),r1Ppub)],C 2 =H 2 [e(H 1 (ID R ),r 1 P pub )]+H 2 [e(H 1 (ID S ),r 1 P pub )],

CC 33 == Hh 33 {{ ww ⊕⊕ Hh 22 [[ ee (( Hh 11 (( IDID RR )) ,, PP pp uu bb )) ]] -- Hh 22 [[ ee (( Hh 11 (( IDID RR )) ,, rr 11 pp pp uu bb )) ]] }} ,,

步骤(4.2)、数据拥有者将关键字w加密后的密文C=(C1,C2,C3)和包含相应关键字的加密后的文件上传给云存储服务器。Step (4.2), the data owner uploads the ciphertext C=(C 1 , C 2 , C 3 ) encrypted with the keyword w and the encrypted file containing the corresponding keyword to the cloud storage server.

步骤5、陷门的生成:Step 5, trapdoor generation:

具体按以下步骤实施:Specifically follow the steps below:

步骤(5.1)、给定IDS、skR和关键字w∈W={0,1}n,接收者随机选择r2∈Zp并计算:Step (5.1), given ID S , sk R and keyword w∈W={0,1} n , the receiver randomly selects r 2 ∈ Z p and calculates:

T1=r2P,T 1 =r 2 P,

T2=H3{H2[e(r2H1(IDS),Ppub)]},T 2 =H 3 {H 2 [e(r 2 H 1 (ID S ),P pub )]},

TT 33 == ww ⊕⊕ Hh 22 [[ ee (( sksk RR ,, PP )) ]] -- Hh 22 [[ ee (( Hh 11 (( IDID SS )) ,, rr 22 PP pubpub )) ]] ;;

步骤(5.2)、文件接收者将Tw=T1发送给服务器,并自己保留T2、T3Step (5.2), the file receiver sends T w =T 1 to the server, and keeps T 2 and T 3 for himself.

步骤6、测试:Step 6. Test:

具体按以下步骤实施:Specifically follow the steps below:

步骤(6.1)、服务器利用其自身的私钥skS计算H3(H2(e(sks,T1))),并将此结果发送给数据接收者;Step (6.1), the server uses its own private key sk S to calculate H 3 (H 2 (e(sk s ,T 1 ))), and sends the result to the data receiver;

步骤(6.2)、数据接收者测试等式T2=H3(H2(e(sks,T1)))是否成立。若成立,数据接收者将T3发送给云存储服务器,随后云存储服务器针对密文C=(C1,C2,C3),判断下面的公式是否成立:Step (6.2), the data receiver tests whether the equation T 2 =H 3 (H 2 (e(sk s ,T 1 ))) holds true. If it is true, the data receiver will send T 3 to the cloud storage server, and then the cloud storage server will judge whether the following formula is true for the ciphertext C=(C 1 ,C 2 ,C 3 ):

C3=H3{H2[e(skS,C1)]+H2[e(skS,T1)]+T3-C2},C 3 =H 3 {H 2 [e(sk S ,C 1 )]+H 2 [e(sk S ,T 1 )]+T 3 -C 2 },

如果成立,说明密文和陷门匹配一致,将密文C所对应的加密文件发送给数据接收者,否则,继续下一条密文的测试,直至对所有密文测试结束。If it is established, it means that the ciphertext matches the trapdoor, and the encrypted file corresponding to ciphertext C is sent to the data receiver; otherwise, continue to test the next ciphertext until all ciphertext tests are completed.

下面分析本发明云存储中基于身份的指定测试者的可搜索的加密方法的安全性:Analyze the security of the searchable encryption method based on the specified tester of identity in the cloud storage of the present invention below:

证明:利用双线性对映射的相关性质:Proof: Using the relevant properties of bilinear pairs of maps:

Hh 22 (( ee (( sksk SS ,, CC 11 )) )) ++ Hh 22 (( ee (( sksk SS ,, TT 11 )) )) ++ TT 33 -- CC 22 == Hh 22 (( ee (( sthe s -- 11 Hh 11 (( IDID SS )) ,, rr 11 PP )) )) ++ Hh 22 (( ee (( sthe s -- 11 Hh 11 (( IDID SS )) ,, rr 22 PP )) )) ++ ww ⊕⊕ Hh 22 (( ee (( sksk RR ,, PP )) )) -- Hh 22 (( ee (( Hh 11 (( IDID SS )) ,, rr 22 PP pp uu bb )) )) -- Hh 22 (( ee (( Hh 11 (( IDID RR )) ,, rr 11 PP pp uu bb )) )) -- Hh 22 (( ee (( Hh 11 (( IDID SS )) ,, rr 11 PP pp uu bb )) )) == ww ⊕⊕ Hh 22 (( ee (( sksk RR ,, PP )) )) -- Hh 22 (( ee (( Hh 11 (( IDID RR )) ,, rr 11 PP pp uu bb )) )) == ww ⊕⊕ Hh 22 (( ee (( Hh 11 (( IDID RR )) ,, PP pp uu bb )) )) -- Hh 22 (( ee (( Hh 11 (( IDID RR )) ,, rr 11 PP pp uu bb )) )) ;;

所以有C3=H3(H2(e(skS,C1))+H2(e(skS,T1))+T3-C2)成立。说明该密文和陷门匹配一致。So C 3 =H 3 (H 2 (e(sk S ,C 1 ))+H 2 (e(sk S ,T 1 ))+T 3 −C 2 ) holds. It shows that the ciphertext matches the trapdoor.

对本发明内容的总结:Summary to content of the present invention:

云存储中基于身份的指定测试者的可搜索的加密方法,能够在加密的数据集合上进行搜索查询,具体方法是,先为文件集合生成索引集合,再使用可搜索加密对这些索引进行加密以隐藏索引内容,并且加密要满足如下性质:1)给定一个关键字(即索引)的令牌,可以获得包含该关键字的所有文件的指针;2)没有令牌,索引的内容是隐藏的;3)只有具有相关密钥的用户才能生成令牌;4)检索过程除了暴露了哪些文件共享某个关键字外,不会暴露任何有关文件和关键字的具体信息。可搜索加密的核心作用是为云存储服务提供:一是用户自己控制其数据;二是数据的安全性质可以通过密码学原理验证,而不是通过法律、物理设备来确定安全性。The searchable encryption method based on the identity of the designated tester in cloud storage can search and query on the encrypted data collection. The specific method is to first generate an index collection for the file collection, and then use searchable encryption to encrypt these indexes. The content of the index is hidden, and the encryption must meet the following properties: 1) Given a token of a keyword (ie index), pointers to all files containing the keyword can be obtained; 2) Without tokens, the content of the index is hidden ; 3) Only users with relevant keys can generate tokens; 4) The retrieval process does not reveal any specific information about files and keywords except which files share a certain keyword. The core role of searchable encryption is to provide cloud storage services: first, users themselves control their data; second, the security nature of data can be verified through cryptography principles, rather than legal and physical devices to determine security.

在云存储服务中,用户可以使用可搜索的加密方案对数据加密后,外包到云存储服务器,可搜索加密方案使得用户能够有选择的访问其密文数据,同时还能确保用户搜索数据的机密性,基于身份的指定测试者的可搜索加密方案因其在搜索的过程中具有更高的机密性,而在云存储服务中有着重要的应用价值。本发明采用数据拥有者和数据接收者先后将加密后的数据在指定的云存储服务器上进行存储和检索的方式,使得只有授权云存储服务器才能够利用关键词的陷门搜索加密文档,云存储服务器并不知道用户检索的关键词,确保用户的数据信息隐私性,在通信和计算代价,即搜索陷门大小、关键词加密和搜索的速度等方面的综合效率得到提高。In cloud storage services, users can use searchable encryption schemes to encrypt data and then outsource it to cloud storage servers. Searchable encryption schemes enable users to selectively access their ciphertext data, while ensuring the confidentiality of user search data The identity-based searchable encryption scheme of designated testers has important application value in cloud storage services because of its higher confidentiality in the search process. The present invention adopts the method that the data owner and the data receiver successively store and retrieve the encrypted data on the designated cloud storage server, so that only the authorized cloud storage server can use the key word trapdoor to search for encrypted documents, cloud storage The server does not know the keyword retrieved by the user, ensuring the privacy of the user's data information, and improving the overall efficiency in terms of communication and computing costs, that is, the size of the search trapdoor, keyword encryption, and search speed.

Claims (7)

1. cloud store in the encryption method of searching for of nominative testing person of identity-based, it is characterized in that, specifically implement according to following steps:
Step 1, system parameters initialization;
The generation of step 2, privacy key;
The generation of step 3, Data receiver's private key;
Step 4, data owner are encrypted keyword;
The generation of step 5, trapdoor;
Step 6, test.
2. cloud according to claim 1 store in the encryption method of searching for of nominative testing person of identity-based, it is characterized in that, described step 1 is specifically implemented according to following steps:
Step (1.1), given security parameter k, first PKI maker PKG generates bilinear map e:G 1× G 1→ G 2, wherein G 1and G 2be rank be respectively Big prime q>2 kaddition cyclic group and multiplication loop group, PKI maker PKG Stochastic choice master key here and calculate P pub=s -1p ∈ G 1as system PKI, wherein P is G 1generator;
Step (1.2), PKG select 3 hash functions:
H 1:{0,1} n→G 1
H 2:G 2→{0,1} n
H 3 : { 0 , 1 } n → Z q * ,
Wherein, n is the length of keyword, and note keyword space is W={0,1} n, system common parameter PP is { q, G 1, G 2, e, P, P pub, n, H 1, H 2, H 3, main private key msk=s -1.
3. cloud according to claim 1 store in the encryption method of searching for of nominative testing person of identity-based, it is characterized in that, described step 2 is specially:
The identity ID of given server s∈ { 0,1} n, PKG utilizes main private key msk=s -1, the private key sk of calculation server s=s -1h 1(ID s).
4. cloud according to claim 1 store in the encryption method of searching for of nominative testing person of identity-based, it is characterized in that, described step 3 is specially:
The identity ID of given recipient r∈ { 0,1} n, PKG utilizes main private key msk=s -1, the private key sk of calculated data recipient r=s -1h 1(ID r).
5. cloud according to claim 1 store in the encryption method of searching for of nominative testing person of identity-based, it is characterized in that, described step 4 is concrete to be implemented according to the following steps:
Step (4.1), given ID s, ID r, w ∈ W={0,1} n, data owner's Stochastic choice r 1∈ Z p, and calculate ciphertext C=(C 1, C 2, C 3) be respectively:
C 1=r 1P,
C 2=H 2[e(H 1(ID R),r 1P pub)]+H 2[e(H 1(ID S),r 1P pub)],
C 3 = H 3 { w ⊕ H 2 [ e ( H 1 ( ID R ) , P p u b ) ] - H 2 [ e ( H 1 ( ID R ) , r 1 P p u b ) ] } ,
Ciphertext C=(C after keyword w encrypts by step (4.2), data owner 1, C 2, C 3) and comprise corresponding keyword encryption after files passe to cloud storage server.
6. cloud according to claim 1 store in the encryption method of searching for of nominative testing person of identity-based, it is characterized in that, described step 5 is concrete to be implemented according to the following steps:
Step (5.1), given ID s, sk rwith keyword w ∈ W={0,1} n, recipient's Stochastic choice r 2∈ Z pand calculate:
T 1=r 2P,
T 2=H 3{H 2[e(r 2H 1(ID S),P pub)]},
T 3 = w ⊕ H 2 [ e ( sk R , P ) ] - H 2 [ e ( H 1 ( ID S ) , r 2 P p u b ) ] ;
Step (5.2), document receivers are by T w=T 1send to server, and oneself retains T 2, T 3.
7. cloud according to claim 1 store in the encryption method of searching for of nominative testing person of identity-based, it is characterized in that, described step 6 is concrete to be implemented according to the following steps:
Himself private key sk of step (6.1), server by utilizing scalculate H 3(H 2(e (sk s, T 1))), and this result is sent to Data receiver;
Step (6.2), Data receiver test equation T 2=H 3(H 2(e (sk s, T 1))) whether set up.If set up, then Data receiver is by T 3send to cloud storage server, cloud storage server is for ciphertext C=(C subsequently 1, C 2, C 3), judge whether formula is below set up:
C 3=H 3{H 2[e(sk S,C 1)]+H 2[e(sk S,T 1)]+T 3-C 2},
If set up, illustrate that ciphertext is consistent with trapdoor coupling, the encrypt file corresponding to ciphertext C is sent to Data receiver, otherwise, continue the test of next ciphertext, until terminate all ciphertext tests.
CN201510408086.6A 2015-07-13 2015-07-13 The encryption method that can search for of the nominative testing person of identity-based in cloud storage Active CN105024812B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510408086.6A CN105024812B (en) 2015-07-13 2015-07-13 The encryption method that can search for of the nominative testing person of identity-based in cloud storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510408086.6A CN105024812B (en) 2015-07-13 2015-07-13 The encryption method that can search for of the nominative testing person of identity-based in cloud storage

Publications (2)

Publication Number Publication Date
CN105024812A true CN105024812A (en) 2015-11-04
CN105024812B CN105024812B (en) 2018-07-06

Family

ID=54414549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510408086.6A Active CN105024812B (en) 2015-07-13 2015-07-13 The encryption method that can search for of the nominative testing person of identity-based in cloud storage

Country Status (1)

Country Link
CN (1) CN105024812B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106407822A (en) * 2016-09-14 2017-02-15 华南理工大学 Keyword or multi-keyword based searchable encryption method and system
CN107086917A (en) * 2017-06-06 2017-08-22 华中科技大学 A Parallelized and Structured Public Key Searchable Encryption Method
CN107181596A (en) * 2017-06-05 2017-09-19 福建师范大学 It is a kind of that encryption method can search for based on Bilinear map
CN108243000A (en) * 2018-01-12 2018-07-03 哈尔滨工业大学深圳研究生院 Ciphertext Search Method in Cloud Storage System
CN109614818A (en) * 2018-11-30 2019-04-12 西南石油大学 Authorized Identity-Based Keyword Search Encryption Method
CN111930688A (en) * 2020-09-23 2020-11-13 西南石油大学 Method and device for searchable secret state data for multi-keyword query in cloud server
CN114338025A (en) * 2021-06-23 2022-04-12 河南科技大学 Ciphertext equivalence testing method in cloud environment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102938767A (en) * 2012-11-13 2013-02-20 西安电子科技大学 Efficient verified fuzzy key word searching method based on cloud data subcontract system
CN104021157A (en) * 2014-05-22 2014-09-03 西安理工大学 Method for keyword searchable encryption based on bilinear pairs in cloud storage
CN104468121A (en) * 2014-11-27 2015-03-25 重庆邮电大学 Public-key searchable encryption method supporting multi-secret-key encryption based on designated server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102938767A (en) * 2012-11-13 2013-02-20 西安电子科技大学 Efficient verified fuzzy key word searching method based on cloud data subcontract system
CN104021157A (en) * 2014-05-22 2014-09-03 西安理工大学 Method for keyword searchable encryption based on bilinear pairs in cloud storage
CN104468121A (en) * 2014-11-27 2015-03-25 重庆邮电大学 Public-key searchable encryption method supporting multi-secret-key encryption based on designated server

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ZHANG YALING ETC.: "A Multi-User Searchable Symmetric Encryption Scheme for Cloud Storage System", 《IEEE》 *
王少辉等: "指定测试者的基于身份可搜索加密方案", 《通信学报》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106407822A (en) * 2016-09-14 2017-02-15 华南理工大学 Keyword or multi-keyword based searchable encryption method and system
CN106407822B (en) * 2016-09-14 2019-06-18 华南理工大学 A keyword, multi-keyword searchable encryption method and system
CN107181596A (en) * 2017-06-05 2017-09-19 福建师范大学 It is a kind of that encryption method can search for based on Bilinear map
CN107181596B (en) * 2017-06-05 2020-08-04 福建师范大学 A Searchable Encryption Method Based on Bilinear Pairs
CN107086917A (en) * 2017-06-06 2017-08-22 华中科技大学 A Parallelized and Structured Public Key Searchable Encryption Method
CN108243000A (en) * 2018-01-12 2018-07-03 哈尔滨工业大学深圳研究生院 Ciphertext Search Method in Cloud Storage System
CN108243000B (en) * 2018-01-12 2021-07-09 哈尔滨工业大学深圳研究生院 Ciphertext search method in cloud storage system
CN109614818A (en) * 2018-11-30 2019-04-12 西南石油大学 Authorized Identity-Based Keyword Search Encryption Method
CN111930688A (en) * 2020-09-23 2020-11-13 西南石油大学 Method and device for searchable secret state data for multi-keyword query in cloud server
CN114338025A (en) * 2021-06-23 2022-04-12 河南科技大学 Ciphertext equivalence testing method in cloud environment

Also Published As

Publication number Publication date
CN105024812B (en) 2018-07-06

Similar Documents

Publication Publication Date Title
CN105024812B (en) The encryption method that can search for of the nominative testing person of identity-based in cloud storage
US20220368545A1 (en) Searchable encrypted data sharing method and system based on blockchain and homomorphic encryption
Armknecht et al. Transparent data deduplication in the cloud
CN109614818B (en) Authorized identity-based keyword search encryption method
CN104021157B (en) Keyword in cloud storage based on Bilinear map can search for encryption method
Wang et al. Secure ranked keyword search over encrypted cloud data
Yang et al. Provable data possession of resource-constrained mobile devices in cloud computing
CN105049196B (en) The encryption method that multiple keywords of designated position can search in cloud storage
CN105024802B (en) Multi-user's multi-key word based on Bilinear map can search for encryption method in cloud storage
CN106407822B (en) A keyword, multi-keyword searchable encryption method and system
CN104023051A (en) Multi-user multi-keyword searchable encryption method in cloud storage
CN109086615A (en) A kind of support multiple key search public key encryption method of anti-keyword guessing attack
CN108737374A (en) The method for secret protection that data store in a kind of block chain
Liu et al. EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination
CN104022866A (en) Searchable encryption method for multi-user cipher text keyword in cloud storage
CN103095733A (en) Keyword cipher text retrieval method for cloud storage
CN105610910A (en) Cloud storage oriented ciphertext full-text search method and system based on full homomorphic ciphers
CN104052740A (en) Verifiable dictionary-based searchable encryption method in cloud storage
CN111930688B (en) Method and device for searchable secret state data for multi-keyword query in cloud server
CN106599719A (en) Ciphertext retrieval method supporting efficient key management
CN110602099A (en) Privacy protection method based on verifiable symmetric searchable encryption
EP3511845B1 (en) Encrypted message search method, message transmission/reception system, server, terminal and programme
CN105282167A (en) Searchable certificateless public key encryption method
CN110413652A (en) A Big Data Privacy Retrieval Method Based on Edge Computing
CN108390760B (en) An end-to-end public key keyword searchable encryption method in cloud data transmission

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190506

Address after: Room 1431, 14th floor, Shining Building, 35 College Road, Haidian District, Beijing, 100089

Patentee after: BEIJING KDS DATACENTER SOLUTION CO.,LTD.

Address before: 234000 Suzhou City, Anhui Province, Suma Modern Industrial Park Building 2

Patentee before: ANHUI PHETOM INTELLIGENT TRAFFIC TECHNOLOGY Co.,Ltd.

Effective date of registration: 20190506

Address after: 234000 Suzhou City, Anhui Province, Suma Modern Industrial Park Building 2

Patentee after: ANHUI PHETOM INTELLIGENT TRAFFIC TECHNOLOGY Co.,Ltd.

Address before: 710048 No. 5 Jinhua South Road, Shaanxi, Xi'an

Patentee before: Xi'an University of Technology

TR01 Transfer of patent right