CN107580003A - Safe no certificate can search for public key cryptography scheme under industrial environment of internet of things - Google Patents
Safe no certificate can search for public key cryptography scheme under industrial environment of internet of things Download PDFInfo
- Publication number
- CN107580003A CN107580003A CN201711042726.1A CN201711042726A CN107580003A CN 107580003 A CN107580003 A CN 107580003A CN 201711042726 A CN201711042726 A CN 201711042726A CN 107580003 A CN107580003 A CN 107580003A
- Authority
- CN
- China
- Prior art keywords
- server
- user
- public key
- key
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Computer And Data Communications (AREA)
Abstract
Public key cryptography scheme is can search for without certificate the invention discloses a kind of provable security under industrial environment of internet of things, it comprises the following steps:A, registration phase:Data consumer generates respective public key and private key with Cloud Server under the assistance of key generation centre;B, data encryption stage:Ciphertext is simultaneously uploaded to Cloud Server by data owner's encryption keyword.C, retrieval phase:Data consumer generates the trapdoor for retrieval and is sent to Cloud Server, and Cloud Server is received after the trapdoor of user, it will ciphertext is retrieved, and the result of retrieval is returned into user.The present invention is directed to the keyword guessing attack that malicious server and external attacker be present in industrial Internet of Things cloud storage and proposes new solution, and the provable offline keyword guessing attack that can keep out external attacker and malicious server, there is higher safe class in similar security protocol.
Description
Technical field
What the present invention proposed a kind of provable security under industrial environment of internet of things can search for public key encryption side without certificate
Case.
Background technology
With industrial Internet of Things(IIoT)Fast development, industrial Internet of Things(IIoT)Cloud storage technology is by more and more
Enterprise and personal user favor.Typical industrial Internet of Things(IIoT)Cloud storage network environment is as shown in Figure 1:In the environment
In, the data in industrial production and operation are collected by enterprise, while sensor collection external information, these data can be by networks
Cloud server is reached, and is interacted with calculation server and storage server.However, high in the clouds data are not in enterprise and individual
In the supervision of user, therefore in order to prevent leakage of private information, data need to be encrypted before high in the clouds is uploaded to.This is just produced
Given birth to one it is new the problem of:Because Cloud Server does not have the key of ciphertext data, so when data consumer wants retrieval high in the clouds number
According to when Cloud Server can not give a response.
For this problem, many scholars propose substantial amounts of solution.But in current many researchs, Hen Duofang
Case is all proved to have the problem of security, and many without safety issue use traditional public key cryptography scheme, and this
The problem of management and key that certificate can be brought are exchangeed problem, and are poorly suitable for industrial Internet of Things(IIoT)In environment.Have recently
The multiple key without escape way that people proposes can search for encrypting(SCF-MCLPEKS)Scheme uses to encrypt without CertPubKey
System, solves the problems, such as certificate management and key escrow, but can not keep out offline keyword guessing attack.Therefore when chance
When having monitored the situation of overt channel to malicious server or external attacker, the private information in data consumer's inquiry request
It will reveal, and then the encryption data for being stored in high in the clouds can also be revealed.
The content of the invention
The technical problem to be solved in the present invention is to overcome existing scheme can not keep out external attacker or malicious server
The defects of carrying out offline keyword attack, there is provided a kind of that can search for without certificate for trapdoor safety is ensured under industrial environment of internet of things
Public key cryptography scheme.
In order to solve the above-mentioned technical problem, the framework of the invention based on Fig. 2 carries out expansion research:First, data owner
Keyword is encrypted using the public key of server and the public key of data consumer and is uploaded to high in the clouds.Then, data use
Person carries out computing using the public key of server to keyword, generates the trapdoor for retrieval and is sent to cloud clothes by overt channel
Business device, after Cloud Server receives trapdoor, can be retrieved to ciphertext and return result to user.In the present invention, due to
In retrieval phase, when data consumer generates the trapdoor of retrieval, used the public key of server, therefore, because attacker without
Method obtains the private key of given server, also can not just implement offline keyword guessing attack, so as to ensure that the hidden of user data
It is private.
According to principles above, the invention provides following technical scheme:
What the present invention provided a kind of approved safe under industrial environment of internet of things can search for public key cryptography scheme without certificate, including with
Lower step:
A, registration phase:Data consumerServer(Cloud server)In key generation centre
(KGC)Assistance under generate respective public key and private key;
A1:System is set:The function is by key generation centre(KGC)Perform, for generating some systematic parameters.
1)Input:One security parameterk, select a bilinear mape: G1×G1→G2。
2)Random selections∈Z q *WithP∈G 1, and calculateP pub =sP。
3)Master key is setmsk=s, and export open parameterparam:
param ={k, G1, G2, e, q, P,P pub , H 1, H 2, whereinH 1, H 2It is 2 different hash functions.H 1:
{0,1}*→G1, H 2: {0,1}*→G1.
A2:Generating portion private key:The function is by key generation centre(KGC)Perform, for generating the part of server or user
Private key.
1)Calculate:Q S =H 1(ID S ), Q R =H 1(ID R )。
2)CalculateD S =s∙Q S , D R =s∙Q R 。
3)Send respectivelyD S , D R To server and user.
A3:Generate secret value:The function is performed by server or user, for generating another portion of server or user
Divide private key.
1)Server randomly chooses a numberx S 。
2)User randomly chooses a numberx R 。
A4:Set private key:The function is performed by server or user, for generating the private key of server or user.
1)Server sets the private key of oneself to be:SK S ={SK S,1,SK S,2 }={x S , D S }。
2)User sets the private key of oneself to be:SK R ={SK R,1,SK R,2 }={x R , D R }。
A5:Set public key:The function is performed by server or user, for generating the public key of server or user.
1)Server sets the public key of oneself to be:PK S =x S ∙P
2)User sets the public key of oneself to be:PK R =x R ∙P。
B, data encryption stage:
Encryption keyword(SCF-MCLPEKS+):The function is performed by data owner, for encryption keyword.If data are gathered around
The person of having wants to send his data to data consumer, then he can be in the following method to set of keywordsWIt is encrypted:
1)To each keywordw i ∈W, select a random numberr i ,
2)CalculateQ R =H 1(ID R )。
3)CalculateU i ,V i , K i It is as follows:
U i =e(r i H 2(w i ), PK R )∙e(r i Q R , P pub ),
V i =r i PK S ,
K i =r i P.
4)Set ciphertext be:C={C i , whereinC i ={U i , V i , K i }。
C, retrieval phase:
C1:Generate trapdoor:The function is performed by data consumer, for generating the trapdoor of retrieval.If the user of data
Want retrieval and carry keywordwSome ciphertext, then he can generate the trapdoor of retrieval according to the methods below:
1)Calculate one random number of selectionr。
2)Trapdoor is setT w For:T w ={T 1,T 2, wherein,T 1,T 2It is as follows:
T 1= D R + x R ∙H 2(w)+rP,
T 2=rPK S .
(8) test:The function is performed by server, for testing ciphertextCAnd trapdoorT w Whether match.
1) to each ciphertextC i ∈C, calculateU=(U i ) xS 。
2) verify:e(T 1,V i )=U∙e(K i , T 2).If set up, 1 is returned, otherwise, returns to 0.
Ifw=w i , then we can obtain:
e(T 1,V i )
= e(D R + x R ∙H 2(w)+rP,r i PK S )
= e(x R ∙H 2(w),r i PK S )∙ e(D R ,r i PK S )∙ e(rP,r i PK S )
= e(r i ∙H 2(w),x R PK S )∙ e(sQ R ,r i PK S )∙ e(r i P,rPK S ).
= [e(r i ∙H 2(w),x R P)∙ e(r i Q R ,sP)] xS ∙ e(K i , T 2)
= (U i ) xS ∙e(K i , T 2).
The beneficial effect that is reached of the present invention is:
For industrial Internet of Things(IIoT)The protection problem of encryption data private information proposes one kind and can demonstrate,proved in cloud storage environment
Safety can search for public key cryptography scheme without certificate.It can prove that this programme can keep out offline keyword guessing attack, can
Protection encryption data well, has higher safe class in similar no CertPubKey can search for encipherment scheme.And
This programme is also higher in efficiency, has very strong practicality, therefore be applicable to industrial Internet of Things(IIoT)Cloud storage ring
In border.
Brief description of the drawings
Accompanying drawing is used for providing a further understanding of the present invention, and a part for constitution instruction, the reality with the present invention
Apply example to be used to explain the present invention together, be not construed as limiting the invention.In the accompanying drawings:
Fig. 1 illustrates typical industrial Internet of Things(IIoT)Cloud storage network environment.
Fig. 2 illustrates basic procedure of the present invention.
Embodiment
The preferred embodiments of the present invention are illustrated below in conjunction with accompanying drawing 2, it will be appreciated that described herein preferred real
Apply example to be merely to illustrate and explain the present invention, be not intended to limit the present invention.
A kind of approved safe under industrial environment of internet of things can search for public key cryptography scheme without certificate, and it includes following step
Suddenly:
A, registration phase:Data consumerServer(Cloud server)Under KGC assistance
Generate respective public key and private key;
A1:System is set:The function is by key generation centre(KGC)Perform, for generating some systematic parameters.
1)Input:One security parameterk, select a bilinear mape: G1×G1→G2。
2)Random selections∈Z q *WithP∈G 1, and calculateP pub =sP。
3)Master key is setmsk=s, and export open parameterparam:
param ={k, G1, G2, e, q, P,P pub , H 1, H 2, whereinH 1, H 2It is 2 different hash functions.H 1:
{0,1}*→G1, H 2: {0,1}*→G1.
A2:Generating portion private key:The function is by key generation centre(KGC)Perform, for generating the part of server or user
Private key.
1)Calculate:Q S =H 1(ID S ), Q R =H 1(ID R )。
2)CalculateD S =s∙Q S , D R =s∙Q R 。
3)Send respectivelyD S , D R To server and user.
A3:Generate secret value:The function is performed by server or user, for generating another portion of server or user
Divide private key.
1)Server randomly chooses a numberx S 。
2)User randomly chooses a numberx R 。
A4:Set private key:The function is performed by server or user, for generating the private key of server or user.
1)Server sets the private key of oneself to be:SK S ={SK S,1,SK S,2 }={x S , D S }。
2)User sets the private key of oneself to be:SK R ={SK R,1,SK R,2 }={x R , D R }。
A5:Set public key:The function is performed by server or user, for generating the public key of server or user.
1)Server sets the public key of oneself to be:PK S =x S ∙P
2)User sets the public key of oneself to be:PK R =x R ∙P。
B, data encryption stage:
Encryption keyword(SCF-MCLPEKS+):The function is performed by data owner, for encryption keyword.If data are gathered around
The person of having wants to send his data to data consumer, then he can be in the following method to set of keywordsWIt is encrypted:
1)To each keywordw i ∈W, select a random numberr i ,
2)CalculateQ R =H 1(ID R )。
3)CalculateU i ,V i , K i It is as follows:
U i =e(r i H 2(w i ), PK R )∙e(r i Q R , P pub ),
V i =r i PK S ,
K i =r i P.
4)Set ciphertext be:C={C i , whereinC i ={U i , V i , K i }。
C, retrieval phase:
C1:Generate trapdoor:The function is performed by data consumer, for generating the trapdoor of retrieval.If the user of data
Want retrieval and carry keywordwSome ciphertext, then he can generate the trapdoor of retrieval according to the methods below:
1)Calculate one random number of selectionr。
2)Trapdoor is setT w For:T w ={T 1,T 2, wherein,T 1,T 2It is as follows:
T 1= D R + x R ∙H 2(w)+rP,
T 2=rPK S .
(8) test:The function is performed by server, for testing ciphertextCAnd trapdoorT w Whether match.
1) to each ciphertextC i ∈C, calculateU=(U i ) xS 。
2) verify:e(T 1,V i )=U∙e(K i , T 2).If set up, 1 is returned, otherwise, returns to 0.
Ifw=w i , then we can obtain:
e(T 1,V i )
= e(D R + x R ∙H 2(w)+rP,r i PK S )
= e(x R ∙H 2(w),r i PK S )∙ e(D R ,r i PK S )∙ e(rP,r i PK S )
= e(r i ∙H 2(w),x R PK S )∙ e(sQ R ,r i PK S )∙ e(r i P,rPK S ).
= [e(r i ∙H 2(w),x R P)∙ e(r i Q R ,sP)] xS ∙ e(K i , T 2)
= (U i ) xS ∙e(K i , T 2)。
Finally it should be noted that:The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention,
Although the present invention is described in detail with reference to the foregoing embodiments, for those skilled in the art, it still may be used
To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic.
Within the spirit and principles of the invention, any modification, equivalent substitution and improvements made etc., it should be included in the present invention's
Within protection domain.
Claims (2)
1. a kind of no certificate safe under industrial environment of internet of things can search for public key cryptography scheme, it is characterised in that including with
Lower step:
First, data owner is encrypted and is uploaded to keyword using the public key of server and the public key of data consumer
High in the clouds;
Then, data consumer carries out computing using the public key of server to keyword, generates the trapdoor for retrieval and passes through
Overt channel is sent to Cloud Server, after Cloud Server receives trapdoor, ciphertext can be retrieved and return result to use
Family.
2. a kind of no certificate safe under industrial environment of internet of things according to claim 1 can search for public key encryption side
Case, it is characterised in that the program specifically includes following steps:
A, registration phase:Data consumer is with Cloud Server in key generation centre)Assistance under generate respective public key with it is private
Key;
A1:Set:The function is performed by key generation centre, for generating some systematic parameters;
1)Input:One security parameterk, select a bilinear mape: G1×G1→G2;
2)Random selections∈Z q *WithP∈G 1, and calculateP pub =sP;
3)Master key is setmsk=s, and export open parameterparam:
param ={k, G1, G2, e, q, P,P pub , H 1, H 2, whereinH 1, H 2It is 2 different hash functions;H 1:
{0,1}*→G1, H 2: {0,1}*→G1;
A2:Generating portion private key:The function is performed by key generation centre, for generating the part private key of server or user;
1)Calculate:Q S =H 1(ID S ), Q R =H 1(ID R );
2)CalculateD S =s∙Q S , D R =s∙Q R ;
3)Send respectivelyD S , D R To server and user;
A3:Generate secret value:The function is performed by server or user, for generating the private of another part of server or user
Key;
1)Server randomly chooses a numberx S ;
2)User randomly chooses a numberx R ;
A4:Set private key:The function is performed by server or user, for generating the private key of server or user;
1)Server sets the private key of oneself to be:SK S ={SK S,1,SK S,2 }={x S , D S };
2)User sets the private key of oneself to be:SK R ={SK R,1,SK R,2 }={x R , D R };
A5:Set public key:The function is performed by server or user, for generating the public key of server or user;
1)Server sets the public key of oneself to be:PK S =x S ∙P;
2)User sets the public key of oneself to be:PK R =x R ∙P;
B, data encryption stage:
Encryption keyword(SCF-MCLPEKS+):The function is performed by data owner, for encryption keyword;If data are gathered around
The person of having wants to send his data to data consumer, then he can be in the following method to set of keywordsWIt is encrypted:
1)To each keywordw i ∈W, select a random numberr i ,
2)CalculateQ R =H 1(ID R );
3)CalculateU i ,V i , K i It is as follows:
U i =e(r i H 2(w i ), PK R )∙e(r i Q R , P pub ),
V i =r i PK S ,
K i =r i P;
4)Set ciphertext be:C={C i , whereinC i ={U i , V i , K i };
C, retrieval phase:
C1:Generate trapdoor:The function is performed by data consumer, for generating the trapdoor of retrieval;If the user of data
Want retrieval and carry keywordwSome ciphertext, then he can generate the trapdoor of retrieval according to the methods below:
1)Calculate one random number of selectionr;
2)Trapdoor is setT w For:T w ={T 1,T 2, wherein,T 1,T 2It is as follows:
T 1= D R + x R ∙H 2(w)+rP,
T 2=rPK S ;
(8) test:The function is performed by server, for testing ciphertextCAnd trapdoorT w Whether match;
1) to each ciphertextC i ∈C, calculateU=(U i ) xS ;
2) verify:e(T 1,V i )=U∙e(K i , T 2);If set up, 1 is returned, otherwise, returns to 0;
Ifw=w i , then we can obtain:
e(T 1,V i )
= e(D R + x R ∙H 2(w)+rP,r i PK S )
= e(x R ∙H 2(w),r i PK S )∙ e(D R ,r i PK S )∙ e(rP,r i PK S )
= e(r i ∙H 2(w),x R PK S )∙ e(sQ R ,r i PK S )∙ e(r i P,rPK S ).
= [e(r i ∙H 2(w),x R P)∙ e(r i Q R ,sP)] xS ∙ e(K i , T 2)
= (U i ) xS ∙e(K i , T 2)。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711042726.1A CN107580003A (en) | 2017-10-31 | 2017-10-31 | Safe no certificate can search for public key cryptography scheme under industrial environment of internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711042726.1A CN107580003A (en) | 2017-10-31 | 2017-10-31 | Safe no certificate can search for public key cryptography scheme under industrial environment of internet of things |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107580003A true CN107580003A (en) | 2018-01-12 |
Family
ID=61041443
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711042726.1A Pending CN107580003A (en) | 2017-10-31 | 2017-10-31 | Safe no certificate can search for public key cryptography scheme under industrial environment of internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107580003A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108924103A (en) * | 2018-06-22 | 2018-11-30 | 广东石油化工学院 | The on-line/off-line of identity-based towards cloud storage can search for encryption method |
CN112564923A (en) * | 2021-03-01 | 2021-03-26 | 南京信息工程大学 | Certificateless-based secure network connection handshake method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101540669A (en) * | 2008-03-20 | 2009-09-23 | 深圳市奥联科技有限公司 | Method for distributing keys and protecting information for wireless mobile communication network |
CN105282167A (en) * | 2015-11-06 | 2016-01-27 | 福建工程学院 | Searchable certificateless public key encryption method |
US20160028538A1 (en) * | 2014-07-23 | 2016-01-28 | Samsung Sds Co., Ltd. | Apparatus and method for generating key |
-
2017
- 2017-10-31 CN CN201711042726.1A patent/CN107580003A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101540669A (en) * | 2008-03-20 | 2009-09-23 | 深圳市奥联科技有限公司 | Method for distributing keys and protecting information for wireless mobile communication network |
US20160028538A1 (en) * | 2014-07-23 | 2016-01-28 | Samsung Sds Co., Ltd. | Apparatus and method for generating key |
CN105282167A (en) * | 2015-11-06 | 2016-01-27 | 福建工程学院 | Searchable certificateless public key encryption method |
Non-Patent Citations (1)
Title |
---|
马米米,何德彪等: "《大数据环境下支持多关键字的可搜索公钥加密方案》", 《南京信息工程大学学报》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108924103A (en) * | 2018-06-22 | 2018-11-30 | 广东石油化工学院 | The on-line/off-line of identity-based towards cloud storage can search for encryption method |
CN108924103B (en) * | 2018-06-22 | 2021-04-16 | 广东石油化工学院 | Identity-based online/offline searchable encryption method for cloud storage |
CN112564923A (en) * | 2021-03-01 | 2021-03-26 | 南京信息工程大学 | Certificateless-based secure network connection handshake method |
CN112564923B (en) * | 2021-03-01 | 2021-05-11 | 南京信息工程大学 | Certificateless-based secure network connection handshake method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Full verifiability for outsourced decryption in attribute based encryption | |
CN104486307B (en) | A kind of fraction key management method based on homomorphic cryptography | |
CN103427998B (en) | The authentication of a kind of Internet data distribution and data ciphering method | |
CN105681273B (en) | Client-side deduplication method | |
CN106161428B (en) | A kind of ciphertext can comparison of equalization encryption attribute method | |
CN106549753B (en) | A kind of encryption method that the support ciphertext of identity-based compares | |
CN107196926A (en) | A kind of cloud outsourcing privacy set comparative approach and device | |
CN108111295B (en) | Homomorphic encryption method based on analog-to-analog operation | |
CN104038349A (en) | Effective and verifiable public key searching encryption method based on KP-ABE | |
CN105024812B (en) | The encryption method that can search for of the nominative testing person of identity-based in cloud storage | |
CN104618332B (en) | Secure two party computation method and system based on symbol boundary values Binary Decision Diagrams | |
CN110933033A (en) | Cross-domain access control method for multiple Internet of things domains in smart city environment | |
CN108462575A (en) | Upload data ciphering method based on no trusted party thresholding Hybrid Encryption | |
CN108924103A (en) | The on-line/off-line of identity-based towards cloud storage can search for encryption method | |
CN111274594A (en) | Block chain-based secure big data privacy protection sharing method | |
CN104993929B (en) | A kind of attribute-based encryption system that system property is supported to extend and method | |
Gu et al. | Self-verifiable attribute-based keyword search scheme for distributed data storage in fog computing with fast decryption | |
CN106657002A (en) | Novel crash-proof base correlation time multi-password identity authentication method | |
CN114697042A (en) | Block chain-based Internet of things security data sharing proxy re-encryption method | |
CN102907041B (en) | A kind of data-sharing systems, data distribution systems and data guard method | |
Xiong et al. | A secure document self-destruction scheme with identity based encryption | |
Arumugam et al. | Secure data sharing for mobile cloud computing using RSA | |
CN106230840B (en) | A kind of command identifying method of high security | |
CN107580003A (en) | Safe no certificate can search for public key cryptography scheme under industrial environment of internet of things | |
CN105007258B (en) | A kind of quick keyword can search for public key encryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180112 |