CN115021934A - Authentication searchable encryption system and method based on BB signature - Google Patents

Authentication searchable encryption system and method based on BB signature Download PDF

Info

Publication number
CN115021934A
CN115021934A CN202210608761.XA CN202210608761A CN115021934A CN 115021934 A CN115021934 A CN 115021934A CN 202210608761 A CN202210608761 A CN 202210608761A CN 115021934 A CN115021934 A CN 115021934A
Authority
CN
China
Prior art keywords
keyword
receiver
ciphertext
sender
trapdoor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210608761.XA
Other languages
Chinese (zh)
Inventor
林超
蒲浪
黄欣沂
何德彪
宁建廷
陈泌文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Normal University
Original Assignee
Fujian Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Normal University filed Critical Fujian Normal University
Priority to CN202210608761.XA priority Critical patent/CN115021934A/en
Publication of CN115021934A publication Critical patent/CN115021934A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/144Query formulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Physics (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Algebra (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Power Engineering (AREA)
  • Library & Information Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to an authentication searchable encryption system based on BB signature, which comprises a server, a receiver and a sender; the receiver and the sender respectively generate keys, further generate a keyword trapdoor and a keyword ciphertext and send the keyword trapdoor and the keyword ciphertext to the server; and the server calls a Test algorithm to match the keyword trapdoor with the keyword ciphertext, if a matching item exists, the server indicates that the file to which the keyword ciphertext belongs contains the content corresponding to the keyword contained in the trapdoor, and after the retrieval is finished, the server sends the files corresponding to all the matching items to a receiver. The invention can effectively improve the efficiency of authenticating the searchable encryption scheme and enhance the practicability and universality of the encryption scheme.

Description

Authentication searchable encryption system and method based on BB signature
Technical Field
The invention relates to the technical field of information security, in particular to an authentication searchable encryption system and method based on BB signature.
Background
In recent years, cloud storage has been rapidly developed due to the advantages of flexible and convenient use, pay-as-needed, high cost performance and the like. More and more people and enterprise users select to outsource own data to the cloud server for storage, so that tedious local management is avoided for the data, and meanwhile, more convenient data use service can be obtained. Because the network environment is complex and the cloud server is not trusted, the user usually stores the data ciphertext to the cloud, but the traditional encryption technology brings difficulty for retrieving data in the subsequent data use process, and keyword information retrieved by the user is easily revealed in the searching process.
Searchable encryption technology can provide data encryption and confidential retrieval functions, and can well solve the problems. However, in a using scene of a traditional searchable encryption scheme, because a common keyword space is small, after receiving a keyword trapdoor, an internal semi-honest server can generate a keyword ciphertext to be matched with the keyword trapdoor through an exhaustion method, and then an internal keyword guessing attack is launched. This may reveal keywords contained in the user search trapdoor and keyword information contained in the return file, posing a great threat to the privacy of the user. The searchable encryption of the authentication can resist the attack and provide powerful guarantee for the privacy of the user, but most of the existing schemes are low in efficiency, and performance optimization cannot be achieved through pre-calculation due to the fact that private information is required to be used in calculation. A more efficient authentication searchable encryption scheme is urgently needed to be provided for protecting the privacy of the user.
Disclosure of Invention
In view of the above, the present invention provides a searchable authentication encryption system and method based on BB signatures, which effectively improves the efficiency of searchable authentication schemes and enhances the practicability and universality thereof.
In order to achieve the purpose, the invention adopts the following technical scheme:
a BB signature based authentication searchable encryption system comprising a server, a recipient, and a sender; the receiver and the sender respectively generate keys, further generate a keyword trapdoor and a keyword ciphertext and send the keyword trapdoor and the keyword ciphertext to the server; and the server calls a Test algorithm to match the keyword trapdoor with the keyword ciphertext, if the matching is successful, the server indicates that the file to which the keyword ciphertext belongs contains the content corresponding to the keyword contained in the trapdoor, and after the retrieval is finished, the server sends the files corresponding to all the matching items to a receiver.
A method of authenticating a searchable encryption system based on BB signatures, comprising the steps of: step S1, initializing system parameters;
step S2, the receiver and the sender respectively generate keys;
step S3, generating a keyword ciphertext according to the public key of the receiver and the private key of the sender;
step S4, generating a key word trapdoor according to the private key of the receiver and the public key of the sender;
and step S5, the server calls a Test algorithm to match the keyword trapdoor with the keyword ciphertext, if the matching is successful, the file to which the keyword ciphertext belongs contains the content corresponding to the keyword contained in the trapdoor, and after the retrieval is finished, the file corresponding to all the matching items is sent to the receiver.
Further, the step S1 is specifically: inputting a safety parameter lambda, and selecting a bilinear pairing group
Figure BDA0003672550590000031
Where N is a large prime number, e is bilinear pairwise mapping:
Figure BDA0003672550590000032
Figure BDA0003672550590000033
g is a group
Figure BDA0003672550590000034
A generator of (2); selecting secure hash functions
Figure BDA0003672550590000035
Figure BDA0003672550590000036
Calculating u-e (g, g); returning to the system common parameter pp ═ { BP, u, H 1 ,H 2 }。
Further, the step S2 is specifically:
receiver random selection
Figure BDA0003672550590000037
Computing the public key PK of the recipient R =g x Let the receiver private key SK R =x;
Sender random selection
Figure BDA00036725505900000311
Calculating the sender's public key PK S =g y Let the sender private key SK S =y。
Further, the step S3 is specifically: according to the input recipient public key PK R Sender's private key y, keyword w ∈ {0,1} * The following operations are performed:
(1) random selection
Figure BDA0003672550590000038
And calculating A ═ H 2 (u r );
(2) Computing
Figure BDA0003672550590000039
Wherein
Figure BDA00036725505900000310
(3) The returned keyword ciphertext C is (a, B).
Further, the step S4 is specifically: based on the input sender's public keyPK S The recipient's private key x and the keyword w ∈ {0,1} * Calculating and outputting keyword trapdoors
Figure BDA0003672550590000041
Wherein
Figure BDA0003672550590000042
Further, the step S5 is specifically: entry keyword trapdoor T w Keyword ciphertext C, verification equation H 2 (e(T w B) if the equation is true, returning 1, which indicates that the keyword trapdoor is consistent with the keyword contained in the keyword ciphertext, and returning the ciphertext data corresponding to the keyword ciphertext to the receiver by the server through a matching test.
Compared with the prior art, the invention has the following beneficial effects:
according to the invention, the high-time-consumption bilinear pairwise mapping operation in scheme application is reduced by performing precomputation in the system initialization stage, so that the efficiency of authenticating the searchable encryption scheme is improved, and the practicability and universality of the searchable encryption scheme are enhanced.
Drawings
FIG. 1 is a schematic diagram of a system model of the present invention.
Detailed Description
The invention is further explained below with reference to the drawings and the embodiments.
Referring to fig. 1, the present invention provides a searchable encryption system for authentication based on BB signatures, which includes a cloud storage service provider Server, a data Receiver, and a data Sender; the receiver and the sender respectively generate keys, further generate a keyword trapdoor and a keyword ciphertext and send the keyword trapdoor and the keyword ciphertext to the server; and the server calls a Test algorithm to match the keyword trapdoor with the keyword ciphertext, if a matching item exists, the server indicates that the file to which the keyword ciphertext belongs contains the content corresponding to the keyword contained in the trapdoor, and after the retrieval is finished, the server sends the files corresponding to all the matching items to a receiver.
In this embodiment, the symbols and definitions specifically include:
Figure BDA0003672550590000051
the order is a multiplicative cyclic group of prime numbers N.
e from
Figure BDA0003672550590000052
To
Figure BDA0003672550590000053
Bilinear mapping of (2).
g group
Figure BDA0003672550590000054
The generator of (1).
g u Multiplication group
Figure BDA0003672550590000055
To the power of u of g.
x y is the concatenation of x and y, where x and y are bit or byte strings.
And the Server is a cloud storage service provider.
Sender, Receiver, both communication parties.
H 1 ,H 2 Collision resistant hash function.
In this example, KeyGen R The algorithm is used to generate a Receiver's key, KeyGen S The algorithm is used to generate a key for Sender. And the Sender calls a PAEKS algorithm by using the private key, the public key of the Receiver and the key words to generate a key word ciphertext and sends the key word ciphertext to the Server. The Receiver can call a Trapdoor algorithm to generate a Trapdoor of the key words by utilizing the private key of the Receiver, the public key of the sender and the key words when retrieving data each time, and then sends the Trapdoor to the Server. After receiving the key word trap door sent by the Receiver, the Server calls a Test algorithm immediately to search and match the key word trap door with the key word ciphertext list; if the matching is successful, the file or the message corresponding to the keyword ciphertext contains the keyword inquired in the trapdoor, otherwise, the keyword is not contained. In practical application, the Server finally sends all files containing keywords to the ReceAnd the driver completes data retrieval while protecting the data security and keyword privacy of the user.
The embodiment also provides a method for authenticating a searchable encryption system based on a BB signature, which comprises the following steps:
step 1. System Setup (Setup):
generating public parameters required by the whole authentication searchable encryption process, inputting security parameter lambda, and selecting bilinear pairings
Figure BDA0003672550590000061
Wherein N is a large prime number, e is bilinear pairwise mapping:
Figure BDA0003672550590000062
g is a group
Figure BDA0003672550590000063
A generator of (2); selecting secure hash functions
Figure BDA0003672550590000064
Calculating u-e (g, g); returning to the system common parameter pp ═ { BP, u, H 1 ,H 2 }。
Step 2. receiver Key Generation (KeyGen) R ):
The step generates a public and private key pair of the receiver, and selects randomly
Figure BDA0003672550590000065
Calculating the public key PK of the receiver R =g x Let the receiving party private key SK R =x。
Step 3. receiver Key Generation (KeyGen) S ):
The step generates a public and private key pair of the sender, and randomly selects
Figure BDA0003672550590000066
Computing sender public key PK S =g y Let the sender private key SK S =y。
Step 4, keyword ciphertext generation (PAEKS):
the step generates a ciphertext of the keyword contained in the file, and inputs a public key PK of a receiver R Private key y of sender, keyword w e {0,1} * The following operations are performed:
step 4.1 random selection
Figure BDA0003672550590000071
And calculating A ═ H 2 (u r );
Step 4.2 calculation
Figure BDA0003672550590000072
Wherein
Figure BDA0003672550590000073
Step 4.3 returns the keyword ciphertext C ═ (a, B).
Step 5, keyword Trapdoor generation (Trapdoor):
the step generates a key word trapdoor and inputs a sender public key PK S Receiving party private key x and key word w e {0,1} *
Calculating and outputting keyword trapdoors
Figure BDA0003672550590000074
Wherein
Figure BDA0003672550590000075
Step 6, testing algorithm (Test)
The step is mainly used for matching the keyword ciphertext and the keyword trapdoor and inputting the keyword trapdoor T w Keyword ciphertext C, verification equation H 2 (e(T w B) if a is true, if the equation is true, returning 1, which indicates that the keyword trapdoor is consistent with the keyword contained in the keyword ciphertext, and through the matching test, the Server returns the ciphertext data corresponding to the keyword ciphertext to the Receiver.
The above description is only a preferred embodiment of the present invention, and all equivalent changes and modifications made in accordance with the claims of the present invention should be covered by the present invention.

Claims (7)

1. A BB signature-based authentication searchable encryption system comprising a server, a receiver, and a sender; the sender and the receiver respectively call a key generation algorithm to generate a key, further generate a keyword ciphertext and a keyword trapdoor and send the keyword ciphertext and the keyword trapdoor to the server; and the server calls a Test algorithm to match the keyword trapdoor with the keyword ciphertext, if the matching is successful, the server indicates that the file to which the keyword ciphertext belongs contains the content corresponding to the keyword contained in the trapdoor, and after the retrieval is finished, the server sends the files corresponding to all the matching items to a receiver.
2. The method of BB-signature-based authenticated searchable encryption system according to claim 1, comprising the steps of:
step S1, initializing system parameters;
step S2, the receiver and the sender respectively generate keys;
step S3, generating a keyword ciphertext according to the public key of the receiver and the private key of the sender;
step S4, generating a key word trapdoor according to the private key of the receiver and the public key of the sender;
and step S5, the server calls a Test algorithm to match the keyword trapdoor with the keyword ciphertext, if the matching is successful, the file to which the keyword ciphertext belongs contains the content corresponding to the keyword contained in the trapdoor, and after the retrieval is completed, the files corresponding to all matching items are sent to the receiver.
3. The method for authenticating a searchable encryption system based on BB signatures as claimed in claim 2, wherein the step S1 is specifically: inputting a safety parameter lambda, and selecting a bilinear pairing group
Figure FDA0003672550580000011
Where N is a large prime number, e is bilinear pairwise mapping:
Figure FDA0003672550580000012
Figure FDA0003672550580000021
g is a group
Figure FDA0003672550580000022
The generator of (2); selecting secure hash functions
Figure FDA0003672550580000023
Figure FDA0003672550580000024
Figure FDA0003672550580000025
Calculating u-e (g, g); returning to the system common parameter pp ═ { BP, u, H 1 ,H 2 }。
4. The method for authenticating a searchable encryption system based on BB signatures as claimed in claim 2, wherein the step S2 is specifically:
receiver random selection
Figure FDA0003672550580000026
Computing the public key PK of the recipient R =g x Let the receiver private key SK R =x;
Sender random selection
Figure FDA0003672550580000027
Calculating the sender's public key PK S =g y Let the sender private key SK S =y。
5. The method for authenticating a searchable encryption system based on BB signatures as claimed in claim 2, wherein the step S3 is specifically: according to the input recipient public key PK R Sender's private key y, keyword w ∈ {0,1} * The following operations are performed:
(1) random selection
Figure FDA0003672550580000028
And calculating A ═ H 2 (u r );
(2) Computing
Figure FDA0003672550580000029
Wherein
Figure FDA00036725505800000210
(3) The return keyword ciphertext C ═ (a, B).
6. The method for authenticating a searchable encryption system based on BB signatures as claimed in claim 2, wherein the step S4 is specifically: according to the input sender's public key PK S The recipient's private key x and the keyword w ∈ {0,1} * Calculating and outputting keyword trapdoors
Figure FDA00036725505800000211
Wherein
Figure FDA00036725505800000212
7. The method for authenticating a searchable encryption system based on BB signatures as claimed in claim 2, wherein the step S5 is specifically: entry of keyword trapdoors T w Keyword ciphertext C, verification equation H 2 (e(T w B) if the equation is true, returning 1, which indicates that the keyword trapdoor is consistent with the keyword contained in the keyword ciphertext, and returning the ciphertext data corresponding to the keyword ciphertext to the receiver by the server through a matching test.
CN202210608761.XA 2022-05-31 2022-05-31 Authentication searchable encryption system and method based on BB signature Pending CN115021934A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210608761.XA CN115021934A (en) 2022-05-31 2022-05-31 Authentication searchable encryption system and method based on BB signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210608761.XA CN115021934A (en) 2022-05-31 2022-05-31 Authentication searchable encryption system and method based on BB signature

Publications (1)

Publication Number Publication Date
CN115021934A true CN115021934A (en) 2022-09-06

Family

ID=83071628

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210608761.XA Pending CN115021934A (en) 2022-05-31 2022-05-31 Authentication searchable encryption system and method based on BB signature

Country Status (1)

Country Link
CN (1) CN115021934A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111786790A (en) * 2020-06-09 2020-10-16 河海大学 Privacy protection identity-based encryption method and system with keyword search function
CN112152803A (en) * 2020-09-15 2020-12-29 河海大学 Identity-based encryption method and system with multiple receiver ciphertext searchable
CN113810416A (en) * 2021-09-17 2021-12-17 福建师范大学 Public key searchable encryption method based on SM2 public key encryption algorithm
CN114244498A (en) * 2021-12-06 2022-03-25 国网河南省电力公司电力科学研究院 Dynamic searchable public key encryption method with forward security

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111786790A (en) * 2020-06-09 2020-10-16 河海大学 Privacy protection identity-based encryption method and system with keyword search function
CN112152803A (en) * 2020-09-15 2020-12-29 河海大学 Identity-based encryption method and system with multiple receiver ciphertext searchable
CN113810416A (en) * 2021-09-17 2021-12-17 福建师范大学 Public key searchable encryption method based on SM2 public key encryption algorithm
CN114244498A (en) * 2021-12-06 2022-03-25 国网河南省电力公司电力科学研究院 Dynamic searchable public key encryption method with forward security

Similar Documents

Publication Publication Date Title
CN107491497B (en) Multi-user multi-keyword sequencing searchable encryption system supporting query in any language
Wang et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing
CN107256248B (en) Wildcard-based searchable encryption method in cloud storage security
CN108197499B (en) Verifiable ciphertext data range query method
JPWO2010005071A1 (en) Password authentication method
CN112861153A (en) Keyword searchable delay encryption method and system
CN113114454B (en) Efficient privacy outsourcing k-means clustering method
CN114244498A (en) Dynamic searchable public key encryption method with forward security
Liu et al. EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination
Hosen et al. SPTM-EC: A security and privacy-preserving task management in edge computing for IIoT
Su et al. Efficient verifiable multi-key searchable encryption in cloud computing
Yan et al. Efficient lattice‐based signcryption in standard model
CN114338025A (en) Ciphertext equivalence testing method in cloud environment
CN115622702A (en) Public key authentication searchable encryption method without bilinear pairing operation
CN114142996B (en) Searchable encryption method based on SM9 cryptographic algorithm
CN115473703A (en) Identity-based ciphertext equivalence testing method, device, system and medium for authentication
CN112560075B (en) Lightweight searchable encryption method and device based on elliptic curve
CN112804052B (en) User identity encryption method based on composite order group
EdalatNejad et al. {DatashareNetwork}: A Decentralized {Privacy-Preserving} Search Engine for Investigative Journalists
CN115021993B (en) Verifiable public key searchable encryption system and method
Xie et al. Identity-based chameleon hash without random oracles and application in the mobile internet
Yang et al. Cryptanalysis of a transaction scheme with certificateless cryptographic primitives for IoT-based mobile payments
CN115021934A (en) Authentication searchable encryption system and method based on BB signature
CN115712910A (en) Method and system for protecting operation privacy of database SQL (structured query language) character string
CN115048432A (en) Bloom filter-based fuzzy keyword public auditing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination