CN115021934A - Authentication searchable encryption system and method based on BB signature - Google Patents
Authentication searchable encryption system and method based on BB signature Download PDFInfo
- Publication number
- CN115021934A CN115021934A CN202210608761.XA CN202210608761A CN115021934A CN 115021934 A CN115021934 A CN 115021934A CN 202210608761 A CN202210608761 A CN 202210608761A CN 115021934 A CN115021934 A CN 115021934A
- Authority
- CN
- China
- Prior art keywords
- keyword
- receiver
- ciphertext
- sender
- trapdoor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/14—Details of searching files based on file metadata
- G06F16/144—Query formulation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Algebra (AREA)
- Pure & Applied Mathematics (AREA)
- Computer Hardware Design (AREA)
- Power Engineering (AREA)
- Library & Information Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to an authentication searchable encryption system based on BB signature, which comprises a server, a receiver and a sender; the receiver and the sender respectively generate keys, further generate a keyword trapdoor and a keyword ciphertext and send the keyword trapdoor and the keyword ciphertext to the server; and the server calls a Test algorithm to match the keyword trapdoor with the keyword ciphertext, if a matching item exists, the server indicates that the file to which the keyword ciphertext belongs contains the content corresponding to the keyword contained in the trapdoor, and after the retrieval is finished, the server sends the files corresponding to all the matching items to a receiver. The invention can effectively improve the efficiency of authenticating the searchable encryption scheme and enhance the practicability and universality of the encryption scheme.
Description
Technical Field
The invention relates to the technical field of information security, in particular to an authentication searchable encryption system and method based on BB signature.
Background
In recent years, cloud storage has been rapidly developed due to the advantages of flexible and convenient use, pay-as-needed, high cost performance and the like. More and more people and enterprise users select to outsource own data to the cloud server for storage, so that tedious local management is avoided for the data, and meanwhile, more convenient data use service can be obtained. Because the network environment is complex and the cloud server is not trusted, the user usually stores the data ciphertext to the cloud, but the traditional encryption technology brings difficulty for retrieving data in the subsequent data use process, and keyword information retrieved by the user is easily revealed in the searching process.
Searchable encryption technology can provide data encryption and confidential retrieval functions, and can well solve the problems. However, in a using scene of a traditional searchable encryption scheme, because a common keyword space is small, after receiving a keyword trapdoor, an internal semi-honest server can generate a keyword ciphertext to be matched with the keyword trapdoor through an exhaustion method, and then an internal keyword guessing attack is launched. This may reveal keywords contained in the user search trapdoor and keyword information contained in the return file, posing a great threat to the privacy of the user. The searchable encryption of the authentication can resist the attack and provide powerful guarantee for the privacy of the user, but most of the existing schemes are low in efficiency, and performance optimization cannot be achieved through pre-calculation due to the fact that private information is required to be used in calculation. A more efficient authentication searchable encryption scheme is urgently needed to be provided for protecting the privacy of the user.
Disclosure of Invention
In view of the above, the present invention provides a searchable authentication encryption system and method based on BB signatures, which effectively improves the efficiency of searchable authentication schemes and enhances the practicability and universality thereof.
In order to achieve the purpose, the invention adopts the following technical scheme:
a BB signature based authentication searchable encryption system comprising a server, a recipient, and a sender; the receiver and the sender respectively generate keys, further generate a keyword trapdoor and a keyword ciphertext and send the keyword trapdoor and the keyword ciphertext to the server; and the server calls a Test algorithm to match the keyword trapdoor with the keyword ciphertext, if the matching is successful, the server indicates that the file to which the keyword ciphertext belongs contains the content corresponding to the keyword contained in the trapdoor, and after the retrieval is finished, the server sends the files corresponding to all the matching items to a receiver.
A method of authenticating a searchable encryption system based on BB signatures, comprising the steps of: step S1, initializing system parameters;
step S2, the receiver and the sender respectively generate keys;
step S3, generating a keyword ciphertext according to the public key of the receiver and the private key of the sender;
step S4, generating a key word trapdoor according to the private key of the receiver and the public key of the sender;
and step S5, the server calls a Test algorithm to match the keyword trapdoor with the keyword ciphertext, if the matching is successful, the file to which the keyword ciphertext belongs contains the content corresponding to the keyword contained in the trapdoor, and after the retrieval is finished, the file corresponding to all the matching items is sent to the receiver.
Further, the step S1 is specifically: inputting a safety parameter lambda, and selecting a bilinear pairing groupWhere N is a large prime number, e is bilinear pairwise mapping: g is a groupA generator of (2); selecting secure hash functions Calculating u-e (g, g); returning to the system common parameter pp ═ { BP, u, H 1 ,H 2 }。
Further, the step S2 is specifically:
receiver random selectionComputing the public key PK of the recipient R =g x Let the receiver private key SK R =x;
Sender random selectionCalculating the sender's public key PK S =g y Let the sender private key SK S =y。
Further, the step S3 is specifically: according to the input recipient public key PK R Sender's private key y, keyword w ∈ {0,1} * The following operations are performed:
(3) The returned keyword ciphertext C is (a, B).
Further, the step S4 is specifically: based on the input sender's public keyPK S The recipient's private key x and the keyword w ∈ {0,1} * Calculating and outputting keyword trapdoorsWherein
Further, the step S5 is specifically: entry keyword trapdoor T w Keyword ciphertext C, verification equation H 2 (e(T w B) if the equation is true, returning 1, which indicates that the keyword trapdoor is consistent with the keyword contained in the keyword ciphertext, and returning the ciphertext data corresponding to the keyword ciphertext to the receiver by the server through a matching test.
Compared with the prior art, the invention has the following beneficial effects:
according to the invention, the high-time-consumption bilinear pairwise mapping operation in scheme application is reduced by performing precomputation in the system initialization stage, so that the efficiency of authenticating the searchable encryption scheme is improved, and the practicability and universality of the searchable encryption scheme are enhanced.
Drawings
FIG. 1 is a schematic diagram of a system model of the present invention.
Detailed Description
The invention is further explained below with reference to the drawings and the embodiments.
Referring to fig. 1, the present invention provides a searchable encryption system for authentication based on BB signatures, which includes a cloud storage service provider Server, a data Receiver, and a data Sender; the receiver and the sender respectively generate keys, further generate a keyword trapdoor and a keyword ciphertext and send the keyword trapdoor and the keyword ciphertext to the server; and the server calls a Test algorithm to match the keyword trapdoor with the keyword ciphertext, if a matching item exists, the server indicates that the file to which the keyword ciphertext belongs contains the content corresponding to the keyword contained in the trapdoor, and after the retrieval is finished, the server sends the files corresponding to all the matching items to a receiver.
In this embodiment, the symbols and definitions specifically include:
x y is the concatenation of x and y, where x and y are bit or byte strings.
And the Server is a cloud storage service provider.
Sender, Receiver, both communication parties.
H 1 ,H 2 Collision resistant hash function.
In this example, KeyGen R The algorithm is used to generate a Receiver's key, KeyGen S The algorithm is used to generate a key for Sender. And the Sender calls a PAEKS algorithm by using the private key, the public key of the Receiver and the key words to generate a key word ciphertext and sends the key word ciphertext to the Server. The Receiver can call a Trapdoor algorithm to generate a Trapdoor of the key words by utilizing the private key of the Receiver, the public key of the sender and the key words when retrieving data each time, and then sends the Trapdoor to the Server. After receiving the key word trap door sent by the Receiver, the Server calls a Test algorithm immediately to search and match the key word trap door with the key word ciphertext list; if the matching is successful, the file or the message corresponding to the keyword ciphertext contains the keyword inquired in the trapdoor, otherwise, the keyword is not contained. In practical application, the Server finally sends all files containing keywords to the ReceAnd the driver completes data retrieval while protecting the data security and keyword privacy of the user.
The embodiment also provides a method for authenticating a searchable encryption system based on a BB signature, which comprises the following steps:
step 1. System Setup (Setup):
generating public parameters required by the whole authentication searchable encryption process, inputting security parameter lambda, and selecting bilinear pairingsWherein N is a large prime number, e is bilinear pairwise mapping:g is a groupA generator of (2); selecting secure hash functionsCalculating u-e (g, g); returning to the system common parameter pp ═ { BP, u, H 1 ,H 2 }。
Step 2. receiver Key Generation (KeyGen) R ):
The step generates a public and private key pair of the receiver, and selects randomlyCalculating the public key PK of the receiver R =g x Let the receiving party private key SK R =x。
Step 3. receiver Key Generation (KeyGen) S ):
The step generates a public and private key pair of the sender, and randomly selectsComputing sender public key PK S =g y Let the sender private key SK S =y。
Step 4, keyword ciphertext generation (PAEKS):
the step generates a ciphertext of the keyword contained in the file, and inputs a public key PK of a receiver R Private key y of sender, keyword w e {0,1} * The following operations are performed:
Step 4.3 returns the keyword ciphertext C ═ (a, B).
Step 5, keyword Trapdoor generation (Trapdoor):
the step generates a key word trapdoor and inputs a sender public key PK S Receiving party private key x and key word w e {0,1} * ,
Step 6, testing algorithm (Test)
The step is mainly used for matching the keyword ciphertext and the keyword trapdoor and inputting the keyword trapdoor T w Keyword ciphertext C, verification equation H 2 (e(T w B) if a is true, if the equation is true, returning 1, which indicates that the keyword trapdoor is consistent with the keyword contained in the keyword ciphertext, and through the matching test, the Server returns the ciphertext data corresponding to the keyword ciphertext to the Receiver.
The above description is only a preferred embodiment of the present invention, and all equivalent changes and modifications made in accordance with the claims of the present invention should be covered by the present invention.
Claims (7)
1. A BB signature-based authentication searchable encryption system comprising a server, a receiver, and a sender; the sender and the receiver respectively call a key generation algorithm to generate a key, further generate a keyword ciphertext and a keyword trapdoor and send the keyword ciphertext and the keyword trapdoor to the server; and the server calls a Test algorithm to match the keyword trapdoor with the keyword ciphertext, if the matching is successful, the server indicates that the file to which the keyword ciphertext belongs contains the content corresponding to the keyword contained in the trapdoor, and after the retrieval is finished, the server sends the files corresponding to all the matching items to a receiver.
2. The method of BB-signature-based authenticated searchable encryption system according to claim 1, comprising the steps of:
step S1, initializing system parameters;
step S2, the receiver and the sender respectively generate keys;
step S3, generating a keyword ciphertext according to the public key of the receiver and the private key of the sender;
step S4, generating a key word trapdoor according to the private key of the receiver and the public key of the sender;
and step S5, the server calls a Test algorithm to match the keyword trapdoor with the keyword ciphertext, if the matching is successful, the file to which the keyword ciphertext belongs contains the content corresponding to the keyword contained in the trapdoor, and after the retrieval is completed, the files corresponding to all matching items are sent to the receiver.
3. The method for authenticating a searchable encryption system based on BB signatures as claimed in claim 2, wherein the step S1 is specifically: inputting a safety parameter lambda, and selecting a bilinear pairing groupWhere N is a large prime number, e is bilinear pairwise mapping: g is a groupThe generator of (2); selecting secure hash functions Calculating u-e (g, g); returning to the system common parameter pp ═ { BP, u, H 1 ,H 2 }。
4. The method for authenticating a searchable encryption system based on BB signatures as claimed in claim 2, wherein the step S2 is specifically:
receiver random selectionComputing the public key PK of the recipient R =g x Let the receiver private key SK R =x;
5. The method for authenticating a searchable encryption system based on BB signatures as claimed in claim 2, wherein the step S3 is specifically: according to the input recipient public key PK R Sender's private key y, keyword w ∈ {0,1} * The following operations are performed:
(3) The return keyword ciphertext C ═ (a, B).
6. The method for authenticating a searchable encryption system based on BB signatures as claimed in claim 2, wherein the step S4 is specifically: according to the input sender's public key PK S The recipient's private key x and the keyword w ∈ {0,1} * Calculating and outputting keyword trapdoorsWherein
7. The method for authenticating a searchable encryption system based on BB signatures as claimed in claim 2, wherein the step S5 is specifically: entry of keyword trapdoors T w Keyword ciphertext C, verification equation H 2 (e(T w B) if the equation is true, returning 1, which indicates that the keyword trapdoor is consistent with the keyword contained in the keyword ciphertext, and returning the ciphertext data corresponding to the keyword ciphertext to the receiver by the server through a matching test.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210608761.XA CN115021934A (en) | 2022-05-31 | 2022-05-31 | Authentication searchable encryption system and method based on BB signature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210608761.XA CN115021934A (en) | 2022-05-31 | 2022-05-31 | Authentication searchable encryption system and method based on BB signature |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115021934A true CN115021934A (en) | 2022-09-06 |
Family
ID=83071628
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210608761.XA Pending CN115021934A (en) | 2022-05-31 | 2022-05-31 | Authentication searchable encryption system and method based on BB signature |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115021934A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111786790A (en) * | 2020-06-09 | 2020-10-16 | 河海大学 | Privacy protection identity-based encryption method and system with keyword search function |
CN112152803A (en) * | 2020-09-15 | 2020-12-29 | 河海大学 | Identity-based encryption method and system with multiple receiver ciphertext searchable |
CN113810416A (en) * | 2021-09-17 | 2021-12-17 | 福建师范大学 | Public key searchable encryption method based on SM2 public key encryption algorithm |
CN114244498A (en) * | 2021-12-06 | 2022-03-25 | 国网河南省电力公司电力科学研究院 | Dynamic searchable public key encryption method with forward security |
-
2022
- 2022-05-31 CN CN202210608761.XA patent/CN115021934A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111786790A (en) * | 2020-06-09 | 2020-10-16 | 河海大学 | Privacy protection identity-based encryption method and system with keyword search function |
CN112152803A (en) * | 2020-09-15 | 2020-12-29 | 河海大学 | Identity-based encryption method and system with multiple receiver ciphertext searchable |
CN113810416A (en) * | 2021-09-17 | 2021-12-17 | 福建师范大学 | Public key searchable encryption method based on SM2 public key encryption algorithm |
CN114244498A (en) * | 2021-12-06 | 2022-03-25 | 国网河南省电力公司电力科学研究院 | Dynamic searchable public key encryption method with forward security |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107491497B (en) | Multi-user multi-keyword sequencing searchable encryption system supporting query in any language | |
Wang et al. | Efficient verifiable fuzzy keyword search over encrypted data in cloud computing | |
CN107256248B (en) | Wildcard-based searchable encryption method in cloud storage security | |
CN108197499B (en) | Verifiable ciphertext data range query method | |
JPWO2010005071A1 (en) | Password authentication method | |
CN112861153A (en) | Keyword searchable delay encryption method and system | |
CN113114454B (en) | Efficient privacy outsourcing k-means clustering method | |
CN114244498A (en) | Dynamic searchable public key encryption method with forward security | |
Liu et al. | EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination | |
Hosen et al. | SPTM-EC: A security and privacy-preserving task management in edge computing for IIoT | |
Su et al. | Efficient verifiable multi-key searchable encryption in cloud computing | |
Yan et al. | Efficient lattice‐based signcryption in standard model | |
CN114338025A (en) | Ciphertext equivalence testing method in cloud environment | |
CN115622702A (en) | Public key authentication searchable encryption method without bilinear pairing operation | |
CN114142996B (en) | Searchable encryption method based on SM9 cryptographic algorithm | |
CN115473703A (en) | Identity-based ciphertext equivalence testing method, device, system and medium for authentication | |
CN112560075B (en) | Lightweight searchable encryption method and device based on elliptic curve | |
CN112804052B (en) | User identity encryption method based on composite order group | |
EdalatNejad et al. | {DatashareNetwork}: A Decentralized {Privacy-Preserving} Search Engine for Investigative Journalists | |
CN115021993B (en) | Verifiable public key searchable encryption system and method | |
Xie et al. | Identity-based chameleon hash without random oracles and application in the mobile internet | |
Yang et al. | Cryptanalysis of a transaction scheme with certificateless cryptographic primitives for IoT-based mobile payments | |
CN115021934A (en) | Authentication searchable encryption system and method based on BB signature | |
CN115712910A (en) | Method and system for protecting operation privacy of database SQL (structured query language) character string | |
CN115048432A (en) | Bloom filter-based fuzzy keyword public auditing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |