CN107580003A - Safe no certificate can search for public key cryptography scheme under industrial environment of internet of things - Google Patents

Safe no certificate can search for public key cryptography scheme under industrial environment of internet of things Download PDF

Info

Publication number
CN107580003A
CN107580003A CN201711042726.1A CN201711042726A CN107580003A CN 107580003 A CN107580003 A CN 107580003A CN 201711042726 A CN201711042726 A CN 201711042726A CN 107580003 A CN107580003 A CN 107580003A
Authority
CN
China
Prior art keywords
server
user
public key
key
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711042726.1A
Other languages
Chinese (zh)
Inventor
陈建铭
吴祖扬
孟超
王景行
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Graduate School Harbin Institute of Technology
Original Assignee
Shenzhen Graduate School Harbin Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Graduate School Harbin Institute of Technology filed Critical Shenzhen Graduate School Harbin Institute of Technology
Priority to CN201711042726.1A priority Critical patent/CN107580003A/en
Publication of CN107580003A publication Critical patent/CN107580003A/en
Pending legal-status Critical Current

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

Public key cryptography scheme is can search for without certificate the invention discloses a kind of provable security under industrial environment of internet of things, it comprises the following steps:A, registration phase:Data consumer generates respective public key and private key with Cloud Server under the assistance of key generation centre;B, data encryption stage:Ciphertext is simultaneously uploaded to Cloud Server by data owner's encryption keyword.C, retrieval phase:Data consumer generates the trapdoor for retrieval and is sent to Cloud Server, and Cloud Server is received after the trapdoor of user, it will ciphertext is retrieved, and the result of retrieval is returned into user.The present invention is directed to the keyword guessing attack that malicious server and external attacker be present in industrial Internet of Things cloud storage and proposes new solution, and the provable offline keyword guessing attack that can keep out external attacker and malicious server, there is higher safe class in similar security protocol.

Description

Safe no certificate can search for public key cryptography scheme under industrial environment of internet of things
Technical field
What the present invention proposed a kind of provable security under industrial environment of internet of things can search for public key encryption side without certificate Case.
Background technology
With industrial Internet of Things(IIoT)Fast development, industrial Internet of Things(IIoT)Cloud storage technology is by more and more Enterprise and personal user favor.Typical industrial Internet of Things(IIoT)Cloud storage network environment is as shown in Figure 1:In the environment In, the data in industrial production and operation are collected by enterprise, while sensor collection external information, these data can be by networks Cloud server is reached, and is interacted with calculation server and storage server.However, high in the clouds data are not in enterprise and individual In the supervision of user, therefore in order to prevent leakage of private information, data need to be encrypted before high in the clouds is uploaded to.This is just produced Given birth to one it is new the problem of:Because Cloud Server does not have the key of ciphertext data, so when data consumer wants retrieval high in the clouds number According to when Cloud Server can not give a response.
For this problem, many scholars propose substantial amounts of solution.But in current many researchs, Hen Duofang Case is all proved to have the problem of security, and many without safety issue use traditional public key cryptography scheme, and this The problem of management and key that certificate can be brought are exchangeed problem, and are poorly suitable for industrial Internet of Things(IIoT)In environment.Have recently The multiple key without escape way that people proposes can search for encrypting(SCF-MCLPEKS)Scheme uses to encrypt without CertPubKey System, solves the problems, such as certificate management and key escrow, but can not keep out offline keyword guessing attack.Therefore when chance When having monitored the situation of overt channel to malicious server or external attacker, the private information in data consumer's inquiry request It will reveal, and then the encryption data for being stored in high in the clouds can also be revealed.
The content of the invention
The technical problem to be solved in the present invention is to overcome existing scheme can not keep out external attacker or malicious server The defects of carrying out offline keyword attack, there is provided a kind of that can search for without certificate for trapdoor safety is ensured under industrial environment of internet of things Public key cryptography scheme.
In order to solve the above-mentioned technical problem, the framework of the invention based on Fig. 2 carries out expansion research:First, data owner Keyword is encrypted using the public key of server and the public key of data consumer and is uploaded to high in the clouds.Then, data use Person carries out computing using the public key of server to keyword, generates the trapdoor for retrieval and is sent to cloud clothes by overt channel Business device, after Cloud Server receives trapdoor, can be retrieved to ciphertext and return result to user.In the present invention, due to In retrieval phase, when data consumer generates the trapdoor of retrieval, used the public key of server, therefore, because attacker without Method obtains the private key of given server, also can not just implement offline keyword guessing attack, so as to ensure that the hidden of user data It is private.
According to principles above, the invention provides following technical scheme:
What the present invention provided a kind of approved safe under industrial environment of internet of things can search for public key cryptography scheme without certificate, including with Lower step:
A, registration phase:Data consumerServer(Cloud server)In key generation centre (KGC)Assistance under generate respective public key and private key;
A1:System is set:The function is by key generation centre(KGC)Perform, for generating some systematic parameters.
1)Input:One security parameterk, select a bilinear mape: G1×G1→G2
2)Random selectionsZ q *WithPG 1, and calculateP pub =sP
3)Master key is setmsk=s, and export open parameterparam
param ={k, G1, G2, e, q, P,P pub , H 1, H 2, whereinH 1, H 2It is 2 different hash functions.H 1: {0,1}*→G1, H 2: {0,1}*→G1.
A2:Generating portion private key:The function is by key generation centre(KGC)Perform, for generating the part of server or user Private key.
1)Calculate:Q S =H 1(ID S ), Q R =H 1(ID R )。
2)CalculateD S =s∙Q S , D R =s∙Q R
3)Send respectivelyD S , D R To server and user.
A3:Generate secret value:The function is performed by server or user, for generating another portion of server or user Divide private key.
1)Server randomly chooses a numberx S
2)User randomly chooses a numberx R
A4:Set private key:The function is performed by server or user, for generating the private key of server or user.
1)Server sets the private key of oneself to be:SK S ={SK S,1,SK S,2 }={x S , D S }。
2)User sets the private key of oneself to be:SK R ={SK R,1,SK R,2 }={x R , D R }。
A5:Set public key:The function is performed by server or user, for generating the public key of server or user.
1)Server sets the public key of oneself to be:PK S =x S P
2)User sets the public key of oneself to be:PK R =x R P
B, data encryption stage:
Encryption keyword(SCF-MCLPEKS+):The function is performed by data owner, for encryption keyword.If data are gathered around The person of having wants to send his data to data consumer, then he can be in the following method to set of keywordsWIt is encrypted:
1)To each keywordw i W, select a random numberr i ,
2)CalculateQ R =H 1(ID R )。
3)CalculateU i ,V i , K i It is as follows:
U i =e(r i H 2(w i ), PK R )∙e(r i Q R , P pub ),
V i =r i PK S ,
K i =r i P.
4)Set ciphertext be:C={C i , whereinC i ={U i , V i , K i }。
C, retrieval phase:
C1:Generate trapdoor:The function is performed by data consumer, for generating the trapdoor of retrieval.If the user of data Want retrieval and carry keywordwSome ciphertext, then he can generate the trapdoor of retrieval according to the methods below:
1)Calculate one random number of selectionr
2)Trapdoor is setT w For:T w ={T 1,T 2, wherein,T 1,T 2It is as follows:
T 1= D R + x R H 2(w)+rP,
T 2=rPK S .
(8) test:The function is performed by server, for testing ciphertextCAnd trapdoorT w Whether match.
1) to each ciphertextC i C, calculateU=(U i ) xS
2) verify:e(T 1,V i )=Ue(K i , T 2).If set up, 1 is returned, otherwise, returns to 0.
Ifw=w i , then we can obtain:
e(T 1,V i )
= e(D R + x R H 2(w)+rP,r i PK S )
= e(x R H 2(w),r i PK S )∙ e(D R ,r i PK S )∙ e(rP,r i PK S )
= e(r i H 2(w),x R PK S )∙ e(sQ R ,r i PK S )∙ e(r i P,rPK S ).
= [e(r i H 2(w),x R P)∙ e(r i Q R ,sP)] xS e(K i , T 2)
= (U i ) xS e(K i , T 2).
The beneficial effect that is reached of the present invention is:
For industrial Internet of Things(IIoT)The protection problem of encryption data private information proposes one kind and can demonstrate,proved in cloud storage environment Safety can search for public key cryptography scheme without certificate.It can prove that this programme can keep out offline keyword guessing attack, can Protection encryption data well, has higher safe class in similar no CertPubKey can search for encipherment scheme.And This programme is also higher in efficiency, has very strong practicality, therefore be applicable to industrial Internet of Things(IIoT)Cloud storage ring In border.
Brief description of the drawings
Accompanying drawing is used for providing a further understanding of the present invention, and a part for constitution instruction, the reality with the present invention Apply example to be used to explain the present invention together, be not construed as limiting the invention.In the accompanying drawings:
Fig. 1 illustrates typical industrial Internet of Things(IIoT)Cloud storage network environment.
Fig. 2 illustrates basic procedure of the present invention.
Embodiment
The preferred embodiments of the present invention are illustrated below in conjunction with accompanying drawing 2, it will be appreciated that described herein preferred real Apply example to be merely to illustrate and explain the present invention, be not intended to limit the present invention.
A kind of approved safe under industrial environment of internet of things can search for public key cryptography scheme without certificate, and it includes following step Suddenly:
A, registration phase:Data consumerServer(Cloud server)Under KGC assistance Generate respective public key and private key;
A1:System is set:The function is by key generation centre(KGC)Perform, for generating some systematic parameters.
1)Input:One security parameterk, select a bilinear mape: G1×G1→G2
2)Random selectionsZ q *WithPG 1, and calculateP pub =sP
3)Master key is setmsk=s, and export open parameterparam
param ={k, G1, G2, e, q, P,P pub , H 1, H 2, whereinH 1, H 2It is 2 different hash functions.H 1: {0,1}*→G1, H 2: {0,1}*→G1.
A2:Generating portion private key:The function is by key generation centre(KGC)Perform, for generating the part of server or user Private key.
1)Calculate:Q S =H 1(ID S ), Q R =H 1(ID R )。
2)CalculateD S =s∙Q S , D R =s∙Q R
3)Send respectivelyD S , D R To server and user.
A3:Generate secret value:The function is performed by server or user, for generating another portion of server or user Divide private key.
1)Server randomly chooses a numberx S
2)User randomly chooses a numberx R
A4:Set private key:The function is performed by server or user, for generating the private key of server or user.
1)Server sets the private key of oneself to be:SK S ={SK S,1,SK S,2 }={x S , D S }。
2)User sets the private key of oneself to be:SK R ={SK R,1,SK R,2 }={x R , D R }。
A5:Set public key:The function is performed by server or user, for generating the public key of server or user.
1)Server sets the public key of oneself to be:PK S =x S P
2)User sets the public key of oneself to be:PK R =x R P
B, data encryption stage:
Encryption keyword(SCF-MCLPEKS+):The function is performed by data owner, for encryption keyword.If data are gathered around The person of having wants to send his data to data consumer, then he can be in the following method to set of keywordsWIt is encrypted:
1)To each keywordw i W, select a random numberr i ,
2)CalculateQ R =H 1(ID R )。
3)CalculateU i ,V i , K i It is as follows:
U i =e(r i H 2(w i ), PK R )∙e(r i Q R , P pub ),
V i =r i PK S ,
K i =r i P.
4)Set ciphertext be:C={C i , whereinC i ={U i , V i , K i }。
C, retrieval phase:
C1:Generate trapdoor:The function is performed by data consumer, for generating the trapdoor of retrieval.If the user of data Want retrieval and carry keywordwSome ciphertext, then he can generate the trapdoor of retrieval according to the methods below:
1)Calculate one random number of selectionr
2)Trapdoor is setT w For:T w ={T 1,T 2, wherein,T 1,T 2It is as follows:
T 1= D R + x R H 2(w)+rP,
T 2=rPK S .
(8) test:The function is performed by server, for testing ciphertextCAnd trapdoorT w Whether match.
1) to each ciphertextC i C, calculateU=(U i ) xS
2) verify:e(T 1,V i )=Ue(K i , T 2).If set up, 1 is returned, otherwise, returns to 0.
Ifw=w i , then we can obtain:
e(T 1,V i )
= e(D R + x R H 2(w)+rP,r i PK S )
= e(x R H 2(w),r i PK S )∙ e(D R ,r i PK S )∙ e(rP,r i PK S )
= e(r i H 2(w),x R PK S )∙ e(sQ R ,r i PK S )∙ e(r i P,rPK S ).
= [e(r i H 2(w),x R P)∙ e(r i Q R ,sP)] xS e(K i , T 2)
= (U i ) xS e(K i , T 2)。
Finally it should be noted that:The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, Although the present invention is described in detail with reference to the foregoing embodiments, for those skilled in the art, it still may be used To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic. Within the spirit and principles of the invention, any modification, equivalent substitution and improvements made etc., it should be included in the present invention's Within protection domain.

Claims (2)

1. a kind of no certificate safe under industrial environment of internet of things can search for public key cryptography scheme, it is characterised in that including with Lower step:
First, data owner is encrypted and is uploaded to keyword using the public key of server and the public key of data consumer High in the clouds;
Then, data consumer carries out computing using the public key of server to keyword, generates the trapdoor for retrieval and passes through Overt channel is sent to Cloud Server, after Cloud Server receives trapdoor, ciphertext can be retrieved and return result to use Family.
2. a kind of no certificate safe under industrial environment of internet of things according to claim 1 can search for public key encryption side Case, it is characterised in that the program specifically includes following steps:
A, registration phase:Data consumer is with Cloud Server in key generation centre)Assistance under generate respective public key with it is private Key;
A1:Set:The function is performed by key generation centre, for generating some systematic parameters;
1)Input:One security parameterk, select a bilinear mape: G1×G1→G2
2)Random selectionsZ q *WithPG 1, and calculateP pub =sP
3)Master key is setmsk=s, and export open parameterparam
param ={k, G1, G2, e, q, P,P pub , H 1, H 2, whereinH 1, H 2It is 2 different hash functions;H 1: {0,1}*→G1, H 2: {0,1}*→G1
A2:Generating portion private key:The function is performed by key generation centre, for generating the part private key of server or user;
1)Calculate:Q S =H 1(ID S ), Q R =H 1(ID R );
2)CalculateD S =s∙Q S , D R =s∙Q R
3)Send respectivelyD S , D R To server and user;
A3:Generate secret value:The function is performed by server or user, for generating the private of another part of server or user Key;
1)Server randomly chooses a numberx S
2)User randomly chooses a numberx R
A4:Set private key:The function is performed by server or user, for generating the private key of server or user;
1)Server sets the private key of oneself to be:SK S ={SK S,1,SK S,2 }={x S , D S };
2)User sets the private key of oneself to be:SK R ={SK R,1,SK R,2 }={x R , D R };
A5:Set public key:The function is performed by server or user, for generating the public key of server or user;
1)Server sets the public key of oneself to be:PK S =x S P;
2)User sets the public key of oneself to be:PK R =x R P
B, data encryption stage:
Encryption keyword(SCF-MCLPEKS+):The function is performed by data owner, for encryption keyword;If data are gathered around The person of having wants to send his data to data consumer, then he can be in the following method to set of keywordsWIt is encrypted:
1)To each keywordw i W, select a random numberr i ,
2)CalculateQ R =H 1(ID R );
3)CalculateU i ,V i , K i It is as follows:
U i =e(r i H 2(w i ), PK R )∙e(r i Q R , P pub ),
V i =r i PK S ,
K i =r i P
4)Set ciphertext be:C={C i , whereinC i ={U i , V i , K i };
C, retrieval phase:
C1:Generate trapdoor:The function is performed by data consumer, for generating the trapdoor of retrieval;If the user of data Want retrieval and carry keywordwSome ciphertext, then he can generate the trapdoor of retrieval according to the methods below:
1)Calculate one random number of selectionr
2)Trapdoor is setT w For:T w ={T 1,T 2, wherein,T 1,T 2It is as follows:
T 1= D R + x R H 2(w)+rP,
T 2=rPK S
(8) test:The function is performed by server, for testing ciphertextCAnd trapdoorT w Whether match;
1) to each ciphertextC i C, calculateU=(U i ) xS
2) verify:e(T 1,V i )=Ue(K i , T 2);If set up, 1 is returned, otherwise, returns to 0;
Ifw=w i , then we can obtain:
e(T 1,V i )
= e(D R + x R H 2(w)+rP,r i PK S )
= e(x R H 2(w),r i PK S )∙ e(D R ,r i PK S )∙ e(rP,r i PK S )
= e(r i H 2(w),x R PK S )∙ e(sQ R ,r i PK S )∙ e(r i P,rPK S ).
= [e(r i H 2(w),x R P)∙ e(r i Q R ,sP)] xS e(K i , T 2)
= (U i ) xS e(K i , T 2)。
CN201711042726.1A 2017-10-31 2017-10-31 Safe no certificate can search for public key cryptography scheme under industrial environment of internet of things Pending CN107580003A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711042726.1A CN107580003A (en) 2017-10-31 2017-10-31 Safe no certificate can search for public key cryptography scheme under industrial environment of internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711042726.1A CN107580003A (en) 2017-10-31 2017-10-31 Safe no certificate can search for public key cryptography scheme under industrial environment of internet of things

Publications (1)

Publication Number Publication Date
CN107580003A true CN107580003A (en) 2018-01-12

Family

ID=61041443

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711042726.1A Pending CN107580003A (en) 2017-10-31 2017-10-31 Safe no certificate can search for public key cryptography scheme under industrial environment of internet of things

Country Status (1)

Country Link
CN (1) CN107580003A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924103A (en) * 2018-06-22 2018-11-30 广东石油化工学院 The on-line/off-line of identity-based towards cloud storage can search for encryption method
CN112564923A (en) * 2021-03-01 2021-03-26 南京信息工程大学 Certificateless-based secure network connection handshake method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101540669A (en) * 2008-03-20 2009-09-23 深圳市奥联科技有限公司 Method for distributing keys and protecting information for wireless mobile communication network
CN105282167A (en) * 2015-11-06 2016-01-27 福建工程学院 Searchable certificateless public key encryption method
US20160028538A1 (en) * 2014-07-23 2016-01-28 Samsung Sds Co., Ltd. Apparatus and method for generating key

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101540669A (en) * 2008-03-20 2009-09-23 深圳市奥联科技有限公司 Method for distributing keys and protecting information for wireless mobile communication network
US20160028538A1 (en) * 2014-07-23 2016-01-28 Samsung Sds Co., Ltd. Apparatus and method for generating key
CN105282167A (en) * 2015-11-06 2016-01-27 福建工程学院 Searchable certificateless public key encryption method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
马米米,何德彪等: "《大数据环境下支持多关键字的可搜索公钥加密方案》", 《南京信息工程大学学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924103A (en) * 2018-06-22 2018-11-30 广东石油化工学院 The on-line/off-line of identity-based towards cloud storage can search for encryption method
CN108924103B (en) * 2018-06-22 2021-04-16 广东石油化工学院 Identity-based online/offline searchable encryption method for cloud storage
CN112564923A (en) * 2021-03-01 2021-03-26 南京信息工程大学 Certificateless-based secure network connection handshake method
CN112564923B (en) * 2021-03-01 2021-05-11 南京信息工程大学 Certificateless-based secure network connection handshake method

Similar Documents

Publication Publication Date Title
Li et al. Full verifiability for outsourced decryption in attribute based encryption
CN104486307B (en) A kind of fraction key management method based on homomorphic cryptography
CN103427998B (en) The authentication of a kind of Internet data distribution and data ciphering method
CN106161428B (en) A kind of ciphertext can comparison of equalization encryption attribute method
CN106549753B (en) A kind of encryption method that the support ciphertext of identity-based compares
CN103944711B (en) Cloud storage ciphertext retrieval method and system
CN107196926A (en) A kind of cloud outsourcing privacy set comparative approach and device
CN108111295B (en) Homomorphic encryption method based on analog-to-analog operation
CN104038349A (en) Effective and verifiable public key searching encryption method based on KP-ABE
CN105024812B (en) The encryption method that can search for of the nominative testing person of identity-based in cloud storage
CN108494760A (en) A kind of intelligent perception true value discovery method of protection privacy
CN104618332B (en) Secure two party computation method and system based on symbol boundary values Binary Decision Diagrams
CN110933033A (en) Cross-domain access control method for multiple Internet of things domains in smart city environment
CN108924103A (en) The on-line/off-line of identity-based towards cloud storage can search for encryption method
CN111274594A (en) Block chain-based secure big data privacy protection sharing method
CN104993929B (en) A kind of attribute-based encryption system that system property is supported to extend and method
CN106657002A (en) Novel crash-proof base correlation time multi-password identity authentication method
Xiong et al. A secure document self-destruction scheme with identity based encryption
CN106161437B (en) It is a kind of that public key cryptography scheme efficiently can search for based on ElGamal
CN107580003A (en) Safe no certificate can search for public key cryptography scheme under industrial environment of internet of things
CN105007258B (en) A kind of quick keyword can search for public key encryption method
CN107070900B (en) It can search for re-encryption method based on what is obscured
Kumar et al. Distributed attribute based access control of aggregated data in sensor clouds
Arumugam et al. Secure data sharing for mobile cloud computing using RSA
CN109359475A (en) A kind of ciphertext policy ABE base encryption method for supporting multi-valued attribute

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180112