The encryption method of searching for of the nominative testing person of identity-based during cloud stores
Technical field
The invention belongs to field of information security technology, be specifically related to the encryption method of searching for of the nominative testing person of identity-based in the storage of a kind of cloud.
Background technology
Cloud computing, as a kind of new computation model, can provide the calculation services of lower, the extendible various advanced person of cost, and in order to save the cost of storage and management data, data can be outsourced to cloud storage server by enterprises and individuals.The data that cloud stores service provides have the advantage such as availability and reliability, but it also has a shortcoming clearly, namely data are not under the management of user and controlling, and so how the confidentiality and integrity of service data just becomes the problem that user urgently pays close attention to.
Although the reliability, availability, fault-tolerance etc. of cloud storage service provider (Cloud Storage Service Provider, CSSP) are believed by enterprise, the data of trustship are not used for other objects by the people CSSP that is uncertain about; Same for personal user, they wish that the data of oneself can only be accessed by oneself or the people specified and can not be accessed by CSSP.This will cause the problem of two aspects: on the one hand, from the angle of user, and they cannot find and allow they complete believable CSSP carry out their data of store and management; On the other hand from the angle of CSSP, a large amount of clients will be lost when not solving the problem.Therefore, the popularization that cloud will be hindered to store of the confidentiality of data and integrality and use.
In view of above practical problem, during cloud stores, data before being transferred to CSSP, must being encrypted by user oneself, and also can only be decrypted by user oneself, will alleviate the danger that user data leaks like this.Do their data of wanting of the acquisition that so user can be very fast also ensure the confidentiality of data to CSSP but this is by problem new for introducing one, as user needs the document comprising certain keyword?
Summary of the invention
The object of this invention is to provide a kind of cloud store in the encryption method of searching for of nominative testing person of identity-based, solve exist in prior art malice cloud storage server performing the problem revealing the data of user search in search procedure.
The technical solution adopted in the present invention is, the encryption method of searching for of the nominative testing person of identity-based during cloud stores, and specifically implements according to following steps:
Step 1, system parameters initialization;
The generation of step 2, privacy key;
The generation of step 3, Data receiver's private key;
Step 4, data owner are encrypted keyword;
The generation of step 5, trapdoor;
Step 6, test.
Feature of the present invention is also,
Step 1 is specifically implemented according to following steps:
Step (1.1), given security parameter k, first PKI maker PKG generates bilinear map e:G
1× G
1→ G
2, wherein G
1be rank be Big prime q>2
kaddition cyclic group, G
2be rank be Big prime q>2
kmultiplication loop group, PKI maker PKG Stochastic choice master key
here
and calculate P
pub=s
-1p ∈ G
1as system PKI, wherein P is G
1generator;
Step (1.2), PKG select 3 hash functions:
H
1:{0,1}
n→G
1,
H
2:G
2→{0,1}
n,
Wherein, n is the length of keyword, and note keyword space is W={0,1}
n, system common parameter PP is { q, G
1, G
2, e, P, P
pub, n, H
1, H
2, H
3, main private key msk=s
-1.
Step 2 is specially:
The identity ID of given server
s∈ { 0,1}
n, PKG utilizes main private key msk=s
-1, the private key sk of calculation server
s=s
-1h
1(ID
s).
Step 3 is specially:
The identity ID of given recipient
r∈ { 0,1}
n, PKG utilizes main private key msk=s
-1, the private key sk of calculated data recipient
r=s
-1h
1(ID
r).
Step 4 is concrete to be implemented according to the following steps:
Step (4.1), given ID
s, ID
r, w ∈ W={0,1}
n, data owner's Stochastic choice r
1∈ Z
p, and calculate ciphertext C=(C
1, C
2, C
3) be respectively:
C
1=r
1P,
C
2=H
2[e(H
1(ID
R),r
1P
pub)]+H
2[e(H
1(ID
S),r
1P
pub)],
Ciphertext C=(C after keyword w encrypts by step (4.2), data owner
1, C
2, C
3) and comprise corresponding keyword encryption after files passe to cloud storage server.
Step 5 is concrete to be implemented according to the following steps:
Step (5.1), given ID
s, sk
rwith keyword w ∈ W={0,1}
n, recipient's Stochastic choice r
2∈ Z
pand calculate:
T
1=r
2P,
T
2=H
3{H
2[e(r
2H
1(ID
S),P
pub)]},
Step (5.2), document receivers are by T
w=T
1send to server, and oneself retains T
2, T
3.
Step 6 is concrete to be implemented according to the following steps:
Himself private key sk of step (6.1), server by utilizing
scalculate H
3(H
2(e (sk
s, T
1))), and this result is sent to Data receiver;
Step (6.2), Data receiver test equation T
2=H
3(H
2(e (sk
s, T
1))) whether set up, if set up, Data receiver is by T
3send to cloud storage server, cloud storage server is for ciphertext C=(C subsequently
1, C
2, C
3), judge whether formula is below set up:
C
3=H
3{H
2[e(sk
S,C
1)]+H
2[e(sk
S,T
1)]+T
3-C
2},
If set up, illustrate that ciphertext is consistent with trapdoor coupling, the encrypt file corresponding to ciphertext C is sent to Data receiver; Otherwise, continue the test of next ciphertext, until terminate all ciphertext tests.
The invention has the beneficial effects as follows, the encryption method of searching for of the nominative testing person of identity-based during cloud stores, the keyword extracted from document can utilize the identity of server and Data receiver to be encrypted by data owner, and be stored on cloud storage server together with respective document, what wherein document adopted is another kind of encryption method, when Data receiver wants to search for the document about certain keyword, this keyword is utilized to generate trapdoor, and the partial information in this trapdoor sent to cloud storage server to confirm whether this server is authorize, and then just can resist the attack of malice cloud storage server.
Embodiment
Below in conjunction with embodiment, the present invention is described in detail.
The encryption method of searching for of the nominative testing person of identity-based during cloud of the present invention stores, specifically implement according to following steps:
Step 1, system parameters initialization:
Specifically implement according to following steps:
Step (1.1), given security parameter k, first PKI maker PKG generates bilinear map e:G
1× G
1→ G
2, wherein G
1be rank be Big prime q>2
kaddition cyclic group, G
2be rank be Big prime q>2
kmultiplication loop group, PKI maker PKG Stochastic choice master key
here
and calculate P
pub=s
-1p ∈ G
1as system PKI, wherein P is G
1generator;
Step (1.2), PKG select 3 hash functions:
H
1:{0,1}
n→G
1,
H
2:G
2→{0,1}
n,
Wherein, n is the length of keyword, and note keyword space is W={0,1}
n, system common parameter PP is { q, G
1, G
2, e, P, P
pub, n, H
1, H
2, H
3, main private key msk=s
-1.
The generation of step 2, privacy key:
The identity ID of given server
s∈ { 0,1}
n, PKG utilizes main private key msk=s
-1, the private key sk of calculation server
s=s
-1h
1(ID
s).
The generation of step 3, Data receiver's private key:
The identity ID of given recipient
r∈ { 0,1}
n, PKG utilizes main private key msk=s
-1, the private key sk of calculated data recipient
r=s
-1h
1(ID
r).
Step 4, data owner are encrypted keyword:
Concrete enforcement according to the following steps:
Step (4.1), given ID
s, ID
r, w ∈ W={0,1}
n, data owner's Stochastic choice r
1∈ Z
p, and calculate ciphertext C=(C
1, C
2, C
3) be respectively:
C
1=r
1P,
C
2=H
2[e(H
1(ID
R),r
1P
pub)]+H
2[e(H
1(ID
S),r
1P
pub)],
Ciphertext C=(C after keyword w encrypts by step (4.2), data owner
1, C
2, C
3) and comprise corresponding keyword encryption after files passe to cloud storage server.
The generation of step 5, trapdoor:
Concrete enforcement according to the following steps:
Step (5.1), given ID
s, sk
rwith keyword w ∈ W={0,1}
n, recipient's Stochastic choice r
2∈ Z
pand calculate:
T
1=r
2P,
T
2=H
3{H
2[e(r
2H
1(ID
S),P
pub)]},
Step (5.2), document receivers are by T
w=T
1send to server, and oneself retains T
2, T
3.
Step 6, test:
Concrete enforcement according to the following steps:
Himself private key sk of step (6.1), server by utilizing
scalculate H
3(H
2(e (sk
s, T
1))), and this result is sent to Data receiver;
Step (6.2), Data receiver test equation T
2=H
3(H
2(e (sk
s, T
1))) whether set up.If set up, Data receiver is by T
3send to cloud storage server, cloud storage server is for ciphertext C=(C subsequently
1, C
2, C
3), judge whether formula is below set up:
C
3=H
3{H
2[e(sk
S,C
1)]+H
2[e(sk
S,T
1)]+T
3-C
2},
If set up, illustrate that ciphertext is consistent with trapdoor coupling, the encrypt file corresponding to ciphertext C is sent to Data receiver, otherwise, continue the test of next ciphertext, until terminate all ciphertext tests.
The fail safe of the encryption method of searching for of the nominative testing person of identity-based during lower surface analysis cloud of the present invention stores:
Prove: utilize the relevant nature that Bilinear map maps:
So there is C
3=H
3(H
2(e (sk
s, C
1))+H
2(e (sk
s, T
1))+T
3-C
2) set up.Illustrate that this ciphertext is consistent with trapdoor coupling.
Summary to content of the present invention:
The encryption method of searching for of the nominative testing person of identity-based during cloud stores, can in the enterprising line search inquiry of the data acquisition system of encryption, concrete grammar is, it is first the set of file set generating indexes, re-using can search for encrypt is encrypted with hiding index content to these indexes, and encryption will meet following character: the 1) token of a given keyword (i.e. index), can obtain the pointer of the All Files comprising this keyword; 2) do not have token, the content of index is hiding; 3) user only with association key could generate token; 4) retrieving is except exposing certain keyword of which file-sharing, can not expose the specifying information of any relevant document and keyword.The central role can searching for encryption is for cloud stores service provides: one is that user oneself controls its data; Two is that the security property of data can be verified by Cryptography Principles, instead of determines fail safe by law, physical equipment.
In cloud stores service, user can use the encipherment scheme that can search for after data encryption, be outsourced to cloud storage server, can search for encipherment scheme makes user can selectively access its encrypt data, the confidentiality of user search data can also be guaranteed simultaneously, the encipherment scheme searched for of the nominative testing person of identity-based has higher confidentiality because of it in the process of search, and has important using value in cloud stores service.The present invention adopts data owner and Data receiver successively the data after encryption to be carried out on the cloud storage server of specifying the mode storing and retrieve, make to only have the trapdoor search encrypted document of authorizing cloud storage server can utilize keyword, cloud storage server does not also know the keyword of user search, guarantee the data message privacy of user, at communication and calculation cost, namely search for trapdoor size, the overall efficiency of the aspect such as speed of keyword encryption and search is improved.