CN117131209B - Phrase searching and verifying method and system for encrypted data based on blockchain - Google Patents

Phrase searching and verifying method and system for encrypted data based on blockchain Download PDF

Info

Publication number
CN117131209B
CN117131209B CN202311397883.XA CN202311397883A CN117131209B CN 117131209 B CN117131209 B CN 117131209B CN 202311397883 A CN202311397883 A CN 202311397883A CN 117131209 B CN117131209 B CN 117131209B
Authority
CN
China
Prior art keywords
document
encrypted
blockchain
keyword
llt
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311397883.XA
Other languages
Chinese (zh)
Other versions
CN117131209A (en
Inventor
徐万山
朱泽
姜正涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Communication University of China
Original Assignee
Communication University of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Communication University of China filed Critical Communication University of China
Priority to CN202311397883.XA priority Critical patent/CN117131209B/en
Publication of CN117131209A publication Critical patent/CN117131209A/en
Application granted granted Critical
Publication of CN117131209B publication Critical patent/CN117131209B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/38Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/31Indexing; Data structures therefor; Storage structures
    • G06F16/316Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/279Recognition of textual entities
    • G06F40/289Phrasal analysis, e.g. finite state techniques or chunking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Library & Information Science (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a phrase searching and verifying method and system for encrypted data based on a blockchain, wherein the method comprises the following steps: s1: the method comprises the steps that the Internet of things equipment generates a key set by using private parameters; s2: generating a security index from a given document, keyword, and key setIEncryption databaseTList of examinationsCLAnd location lookup tableLLTThe method comprises the steps of carrying out a first treatment on the surface of the S3: the data user acquires the sharing parameters from the key set and generates a retrieval trapdoor by combining the phrase to be queried; s4: cloud server utilizationITLLTSearching with trapdoor to obtain search resultRThe method comprises the steps of carrying out a first treatment on the surface of the S5: block chainICLLLTAnd trapdoor to obtain verification standard value, forRVerifying, and comparing the evidence withRSending the data to a data user; s6: the data user judges the search result according to the evidence, if yes, the encrypted document is decrypted to check the plaintext. The method of the invention can improve phrase searching efficiency, realize reliable and fair verification of the searching result and reduce communication and calculation cost.

Description

Phrase searching and verifying method and system for encrypted data based on blockchain
Technical Field
The invention relates to the field of blockchain and phrase searching, in particular to a phrase searching and verifying method and system for encrypted data based on a blockchain.
Background
In recent years, the Internet of things is rapidly developed, is widely applied to the fields of agriculture, industry, medicine and the like, improves crop yield and production efficiency, reduces fertilizer use and pollutant emission, assists green development, and protects the health of patients. Sensors of devices in the internet of things network generate large amounts of data that are stored in a local or cloud server. The cloud storage of the internet of things data can reduce the cost of local storage and management, realize efficient data processing and analysis, and also facilitate data sharing among different data users.
However, this brings new concerns about security and privacy. Since the cloud server is not trusted, unauthorized internal data users may attempt to access sensitive data (e.g., patient's disease name, blood pressure, etc.), and some hackers may also illegally access the data, which may lead to compromised data users' privacy. Therefore, in order to ensure confidentiality of data, the internet of things data is generally encrypted and then outsourced to the cloud.
In order to realize keyword search of encrypted data and keep balance between search efficiency and security, song proposes a concept of searchable encryption. Phrase searching is an important technology for searchable encryption, which can search for a series of consecutive keywords in a sentence or document. Existing single-keyword or multi-keyword encryption search schemes cannot be directly applied to phrase searches because they cannot determine the relative locations of keywords. For example, in electronic medical systems, certain diseases are represented by phrases such as "myocardial infarction. When searching for this phrase using the multi-keyword encryption search scheme, the cloud server may return search results that contain both "myocardium" and "infarct," but they may not be displayed as phrases. Obviously, the search results contain many invalid documents. Therefore, it is important to design phrase search schemes.
Another challenge to phrase searches is verification of search results. Because of system failure or cost savings, the cloud server may return partial or incorrect search results to the data user, thus, it is necessary to verify the results of the phrase search.
In existing verifiable phrase search schemes, both search results and verification evidence are generated by a cloud server and then sent to a data user for verification. Such verification schemes are unreliable because the search results and verification evidence may be forged by the cloud server (e.g., the server may store only a portion of the documents and search index to gain economic benefit, in which case the search results and verification evidence are incomplete). In addition, the data user may forge the verification result to save costs, and may cause the verification result to be unreliable. In recent studies, some researchers have adopted blockchain techniques. These schemes guarantee the reliability of the validation based on the inherent invariance properties of the blockchain and obtain ideal experimental results. However, these schemes mainly focus on encryption searching of a single keyword, and cannot be applied to phrase searching.
Disclosure of Invention
In order to solve the technical problems, the invention provides a phrase searching and verifying method and system for encrypted data based on a blockchain.
The technical scheme of the invention is as follows: a phrase search and verification method for blockchain-based encrypted data, comprising:
step S1: the method comprises the steps that the Internet of things equipment generates a key set by using private parameters;
step S2: according to a given set of documents PRF and id thereof, a set of keywords W and a Key set Key, the Internet of things device generates a security index I, an encryption database T, a check list CL and a location lookup table LLT, and uploads (I, T, LLT) to a cloud server and (I, CL, LLT) to a blockchain;
step S3: data user obtains shared parameters from the key setAccording to the phrase to be queriedAnd->Co-generation search trapdoor->
Step S4: the cloud server utilizes the security index I, the encryption database T, the location lookup table LLT and the trapdoorSearching the encrypted data to obtain a search result R;
step S5: blockchain utilizes the secure index I, the checklist CL, the location lookup table LLT, and the trapdoorSearching the encrypted data to obtain a reference value Acc corresponding to the search result on the chain, and calculating the test value of the search result R>By comparing Acc with +.>Verification of the search result R is achieved, for example, verification is achieved by sending proof and the search result R to the data user;
step S6: the data user authenticates whether the search result is valid, if so, based on proof, and decrypts the encrypted document using the symmetric key to view plaintext.
Compared with the prior art, the invention has the following advantages:
1. the invention discloses a phrase searching and verifying method of encrypted data based on a blockchain. The method comprises the steps that the internet of things equipment encrypts all documents by means of symmetric encryption to obtain ciphertext, calculates a hash value of each ciphertext through sha256, adds the hash value into an inspection list, and finally sends the hash value to a blockchain; the internet of things device and the blockchain are completely trusted, i.e., the internet of things device can honest collect data and generate a secure index and check list.
2. The invention uses the block chain to fairly verify the search result, and the verification result is reliable and can not be forged. To enable reliable verification of search results, a copy of the secure index is stored on the blockchain. Using this copy and trapdoor, the blockchain can search for reliable results and calculate a reference Acc using the checklist. Block chain computing test values for search resultsIf->Then proof=1,otherwise proof=0. The blockchain returns search results and proof to the data user. In particular, in the invention, the blockchain only stores the identification of the document, does not store ciphertext, and the ciphertext is stored on the server.
3. The invention designs a phrase recognition distance discrimination algorithm to determine the positions of the keywords of the phrases, and can realize accurate search of the phrases.
Drawings
FIG. 1 is a flow chart of a phrase search and verification method for blockchain-based encrypted data in accordance with an embodiment of the present invention;
FIG. 2 is a schematic diagram of a physical structure of an embodiment of the present invention;
FIG. 3 is a timing diagram of a phrase search and verification method for blockchain-based encrypted data in accordance with an embodiment of the present invention;
FIG. 4 is a block diagram of a phrase search and verification system for blockchain-based encrypted data in accordance with an embodiment of the present invention.
Detailed Description
The invention provides a phrase searching and verifying method for encrypted data based on a blockchain, which utilizes the blockchain to reliably verify the result of phrase searching on cloud-internet of things data, and simultaneously utilizes a homomorphic encrypted novel lookup table and a phrase identification distance discrimination algorithm to identify phrases under ciphertext, thereby improving phrase searching efficiency and reducing communication and calculation cost.
The present invention will be further described in detail below with reference to the accompanying drawings by way of specific embodiments in order to make the objects, technical solutions and advantages of the present invention more apparent. Before describing the specific implementation method of the present invention, the present invention will be first described assuming that the basic concepts and algorithms used are:
(1) In the invention, the Internet of things equipment and the blockchain are assumed to be completely trusted, namely, the Internet of things equipment can collect data honest and generate a safe index and check list. The block chain performs fair verification on the search result, and the verification result is reliable and cannot be forged; it is assumed that the server and the data user are not trusted. The cloud server may store only a portion of the index and ciphertext to save storage resources. At the same time, it may dishonest perform the search to save computational costs. In addition, other software/hardware failures may exist in the system. Both of these causes may result in incomplete or incorrect documents and proof of verification returned by the server. The data user is also untrustworthy in that it may falsify the verification result and refuse payment.
(2) Bitmap: a group of information is represented by binary character strings, and the binary character strings are widely used for storing document identifiers in encryption searching, so that the storage space can be effectively reduced. In the present invention, each keywordA bitmap, which contains alpha bits, alpha is the number of documents in the system. If the jth document contains +>The value of alpha at the j position is 1, otherwise 0.
(3) Homomorphic encryption: an encryption primitive can convert a ciphertext into another ciphertext without altering a decryption key. The invention uses widely used Paillier additive homomorphic encryption to calculate the distance between keywords in the phrase.
(4) Location Lookup Table (LLT): an inverted index structure is adopted to ensure high searching efficiency, and each keyword not only corresponds to the IDs of a series of documents, but also stores all positions of the keywords in the documents.
(5) Phrase recognition distance discrimination algorithm: the order of keywords in a phrase may be represented by the labels and the distance between each of the remaining keywords and the labels.
Example 1
As shown in fig. 1, the phrase searching and verifying method for encrypted data based on blockchain provided by the embodiment of the invention includes the following steps:
step S1: the method comprises the steps that the Internet of things equipment generates a key set by using private parameters;
step S2: generating a security index I, an encryption database T, a check list CL and a position lookup table LLT by the Internet of things device according to a given document PRF and id thereof, a keyword W and a Key set Key, uploading (I, T, LLT) to a cloud server, and uploading (I, CL, LLT) to a blockchain;
step S3: data user obtains shared parameters from key setAccording to the phrase to be queried
And->Co-generation search trapdoor->
Step S4: the cloud server utilizes the security index I, the encryption database T, the position lookup table LLT and the trapdoorSearching the encrypted data to obtain a search result R;
step S5: blockchain utilizes secure index I, checklist CL, location lookup table LLT and trapdoorSearching the encrypted data to obtain a reference value Acc corresponding to the search result on the chain, and calculating a test value +.>By comparing Acc with +.>Verification of the search result R is achieved, for example, verification is achieved by sending proof and the search result R to a data user;
step S6: the data user authenticates whether the search result is valid, based on proof, and if so, decrypts the encrypted document using the symmetric key to view plaintext.
The method of the present invention involves four entities: the system comprises Internet of things equipment, a data user, a cloud server and a blockchain, as shown in fig. 2. The internet of things equipment is responsible for encrypting data, sending a secure cable to a cloud server, sending an inspection list to a blockchain, and authorizing a data user; after the data user receives the authorization, a search trapdoor can be generated according to the search phrase and simultaneously sent to the cloud server and the blockchain; the cloud server performs data retrieval after receiving the search trapdoor and sends the search result to the blockchain; the block chain also performs data retrieval after receiving the search trapdoor, compares the retrieved data with a search result sent by the cloud server, and sends a comparison result proof and the search result to a data user; if proof=1, the data user receives the search result and decrypts and checks the plaintext, otherwise, the search result is wrong and the receiving is refused.
In one embodiment, S1 above: the secret parameter is used by the internet of things equipment to generate a key set, and the method specifically comprises the following steps:
step S11: internet of things device selection privacy parameters
Step S12: by means ofGenerating a Key set->Wherein->Is an identifier of an encrypted document,/->Is a symmetric key->Is a pseudo-random function F, and (pk, sk) is a public key and a private key, respectively, encrypted using a Paillier.
Key set constructed by the embodiment of the invention
Wherein,,/>,/>;/>
the invention constructs the key set for encrypting the data in the subsequent steps, thereby protecting the security and privacy of the data. By converting the data into a format that is not readily understood, only authorized persons or systems can decrypt and access the content therein.
In one embodiment, step S2 above: based on a given set of documents PRF and its id, a set of keywords W and a Key set Key, the internet of things device generates a security index I, an encryption database T, a checklist CL and a location lookup table LLT, and uploads (I, T, LLT) to the cloud server and (I, CL, LLT) to the blockchain, including in particular:
step S21: internet of things device using symmetric encryptionEach document is processedEncryption as ciphertext->At the same time will->Stored in the encryption database T, will +.>Hash value +.>Stored in the checklist CL;
the specific implementation of the steps is shown in the following pseudo code lines 1-4 of the construction index algorithm;
step S22: the Internet of things equipment is used for each keywordGenerating bitmap->Will->Encryption-derived->Stored in the security index I;
step S23: internet of things device extraction documentKeyword->Position information of (a)
Step S24: usingEncrypting the position information to obtain encrypted position information +.>Wherein E represents paillier.enc;
step S25: keywords are processedDocument of the place->All of the encrypted location stores in (a)In a location look-up table LLT;
step S26: uploading (I, T, LLT) to the cloud server, while uploading (I, CL, LLT) to the blockchain.
The build index algorithm is shown as the following pseudocode:
the invention realizes the purpose of accelerating the efficiency of data retrieval and inquiry by constructing the index.
In one embodiment, step S22 described above: the Internet of things equipment is used for each keywordGenerating bitmapsWill->Encryption-derived->The security index I is stored in the security index I, and specifically comprises the following steps:
step S221: internet of things equipment useAnd keyword->Hash value +.>Generating a status value +.>
Step S222: internet of things equipment randomly generates a group of binary character stringsAnd use +.>And->Generating keywords +.>Position coordinates in security index I +.>
Step S223: internet of things equipment useAnd->For bitmaps->Encrypting to obtain an encrypted bitmap ++>Will beStored in the security index I.
The specific implementation of this step is shown in the 7 th to 8 th lines of the pseudo code of the above-described build indexing algorithm.
In one embodiment, step S25 is as follows: keywords are processedDocument of the place->The encrypted positions in (a) are stored in a position lookup table LLT, and specifically include:
calculating a storage position according to the following formulas (1) - (2):
(1)
(2)
wherein,representing encryption functions->Representing keywords +.>In document->The encrypted values for all of the locations where they occur,
representing keywords +.>The encrypted value of the location appears in all documents.
The specific implementation of this step is shown in the above-described pseudo code lines 10-11 of the build indexing algorithm.
In one embodiment, the step S3: data user obtains shared parameters from key setThen according to the phrase to be queried->Generating search trapdoor->The method specifically comprises the following steps:
step S31: obtaining shared parameters from an internet of things device by a data user
Step S32: according toFor each keyword +.>Calculating trapdoor +.>
Step S33: calculation ofAnd->The first keyword +.>The distance d between them, and encrypting d with Paillier. Enc (d) to obtain +.>
Step S34: will beAnd->Added to trapdoor->And sent to the cloud server and blockchain.
The user authorization algorithm is shown in the following pseudo code:
the main purpose of the user authorization of the present invention is data access rights, ensuring that only authorized users can use specific resources, functions or information. User authorization is an important component of information security and data privacy, which involves determining who can access what content, and under what conditions.
In one embodiment, step S4 above: the cloud server utilizes the security index I, the encryption database T, the position lookup table LLT and the trapdoorSearching the encrypted data to obtain a search result R, which specifically comprises the following steps:
step S41: after receiving the search request, the cloud server analyzes the trapdoorAcquisition of
Step S42: the slave according toObtain +.>According to->Acquisition->Bitmap of->
Step S43: for all ofPerforming AND operation to obtain the inclusion +.>Document identifier set corresponding to all keywords in +.>
Step S44: determining document identificationWhether the order of the keywords in each document corresponding to the character set is the same as the phraseThe order of the keywords in the document is consistent, if so, the corresponding document is +.>Added to the search results R.
The encryption retrieval algorithm is shown in the following pseudo code:
in one embodiment, step S44 described above: determining whether the order of keywords in each document corresponding to the identifier set is the same as a phraseThe order of the keywords in the search result R is consistent, if the order of the keywords in the search result R is consistent, the corresponding documents are added to the search result R, and the method specifically comprises the following steps:
step S441: for identifier setsIs +.>The cloud server selects a binary string flag of length (t-1) and sets all values to "0";
step S442: cloud server passing through、/>Obtaining the keyword +.>All positions of (3), />…,/>
Step S443: the cloud server calculates the presence using formula (3)Keywords in the corresponding document->And the first keyword in the phrase ++>Distance between:
(3)
wherein,is a keyword->At->A location in the corresponding document;
step S444: if equation (3) holds, then the keywordAnd->The distance between the two is (d-1), which is the same as the distance in the phrase, and the cloud server sets the position (i-1) of the flag to be "1";
step S445: if all the positions of the flag are "1", thenCorresponding document->Containing the phrase->Find +.o from the encryption database T>And will->Added to the search results R.
The specific implementation of the step is shown in the 7 th to 19 th lines of pseudo codes of the encryption retrieval algorithm;
the 13 th to 16 th rows adopt phrase recognition distance discrimination algorithm, and the pseudo codes are as follows:
the encryption retrieval of the invention is that the cloud server carries out the phrase encryption retrieval of the Internet of things by utilizing the security index I, the encryption database T, the position lookup table LLT and the trapdoor, so as to obtain a search result.
In one embodiment, the step S5 is as follows: blockchain utilizes secure index I, checklist CL, location lookup table LLT and trapdoorSearching the encrypted data to obtain a reference value Acc corresponding to the search result on the chain, and calculating a test value +.>By comparing Acc with +.>Verification of the search result R is achieved, for example, by transmitting proof, the search result R to the data user, and specifically includes:
step S51:the blockchain executes the step S4 to search out the corresponding document identifier on the blockchain);
Step S52: blockchain utilizing document identificationHash values in search checklist CLAnd compresses it to a reference value Acc;
step S53: computing encrypted ciphertext for each document in RIs a hash value of (2): />And compresses it to the test value +.>
Step S54: judging Acc andwhether equal, if so, let proof=1; otherwise, let proof=0;
step S55: the search results from R and proof are sent to the data user.
The data verification algorithm is shown as the following pseudo code:
the data verification of the invention is the process of searching the result R returned by the block chain verification cloud server, namely searching the security index I by using trapdoors by using the block chain, and obtaining a document identification set meeting the search phraseThen, the reference value Acc thereof is acquired. RecalculatingHash value of each ciphertext in search result R and aggregate into test value +.>If Acc and->Equal, proof proof=1, otherwise 0. And finally, transmitting R and proof to a data user.
In one embodiment, step S6 above: the data user decrypts the encrypted document through the symmetric key to view the plaintext, and specifically comprises the following steps:
step S61: the data user judges the received proof, if proof=1, the search result R is accepted, otherwise R is refused;
step S62: for the accepted search result R, the data user decrypts the document in the received search result R by using the symmetric key, acquires the plaintext of the document, and completes the phrase searching process.
The data decryption of the invention is that the data user decrypts the encrypted document by using the symmetric key for checking the plaintext for the document passing through the verification, and the phrase searching process is completed.
FIG. 3 is a timing diagram of a phrase search and verification method for blockchain-based encrypted data.
Example two
As shown in FIG. 4, an embodiment of the present invention provides a phrase search and verification system for blockchain-based encrypted data, comprising the following modules:
a key set generation module 71, configured to generate a key set by using the privacy parameter by using the internet of things device;
an index module 72 is configured to generate, according to a given set of documents PRF and ids thereof, a set of keywords W and a Key set Key, a security index I, an encryption database T, an inspection list CL and a location lookup table LLT, upload (I, T, LLT) to a cloud server, and upload (I, CL, LLT) to a blockchain;
a data user authorization module 73 for the data user to obtain the sharing parameters from the key setAccording to the phrase to be queried->And->Co-generation search trapdoor->
An encryption retrieval module 74 for the cloud server to utilize the security index I, the encryption database T, the location lookup table LLT and trapdoorsSearching the encrypted data to obtain a search result R;
a data verification module 75 for blockchain utilization security index I, checklist CL, location lookup table LLT, and trapdoorSearching the encrypted data to obtain a reference value Acc corresponding to the search result on the chain, and calculating a test value +.>By comparing Acc with +.>Verification of the search result R is achieved, for example, verification is achieved by sending proof and the search result R to a data user;
a data decryption module 76 for the data user to identify if the search result is valid based on proof, and if so, to decrypt the encrypted document using the symmetric key to view plaintext.
The above examples are provided for the purpose of describing the present invention only and are not intended to limit the scope of the present invention. The scope of the invention is defined by the appended claims. Various equivalents and modifications that do not depart from the spirit and principles of the invention are intended to be included within the scope of the invention.

Claims (5)

1.一种基于区块链的加密数据的短语搜索和验证方法,其特征在于,包括:1. A blockchain-based phrase search and verification method for encrypted data, characterized by: 步骤S1:物联网设备使用私密参数生成密钥集,具体包括:Step S1: The IoT device uses private parameters to generate a key set, including: 步骤S11:所述物联网设备选择私密参数λ;Step S11: The Internet of Things device selects the private parameter λ; 步骤S12:利用λ生成密钥集Key = {K1,K2,K3,pk,sk},其中,K1是加密文档的标识符,K2是对称密钥,K3是伪随机函数F的密钥,(pk,sk)分别是使用Paillier加密的公钥和私钥;Step S12: Use λ to generate the key set Key = {K 1 , K 2 , K 3 , pk, sk}, where K 1 is the identifier of the encrypted document, K 2 is the symmetric key, and K 3 is the pseudo-random function The keys of F, (pk, sk) are the public key and private key respectively encrypted using Paillier; 步骤S2:根据一组给定文档PRF及其id、一组关键词W和密钥集Key,所述物联网设备生成安全索引I、加密数据库T、检查列表CL和位置查找表LLT,并将(I,T,LLT)上传到云服务器,将(I,CL,LLT)上传到区块链,具体包括:Step S2: According to a given set of documents PRF and its id, a set of keywords W and a key set Key, the Internet of Things device generates a security index I, an encrypted database T, a check list CL and a location lookup table LLT, and Upload (I, T, LLT) to the cloud server and upload (I, CL, LLT) to the blockchain, including: 步骤S21:所述物联网设备使用对称加密Enc(K2,PRFi)将每个文档PRFi∈PRF加密为密文Ci,同时将Ci存储在加密数据库T中,将Ci的哈希值hashi存储在检查列表CL;Step S21: The Internet of Things device uses symmetric encryption Enc(K 2 , PRF i ) to encrypt each document PRF i ∈ PRF into ciphertext C i , and at the same time stores C i in the encrypted database T, and the hash of C i The hash value hash i is stored in the check list CL; 步骤S22:所述物联网设备为每个关键词ωj∈W生成位图Bωj,将Bωj加密后得到的vB存储在安全索引I中;Step S22: The Internet of Things device generates a bitmap B ωj for each keyword ω j ∈W, and stores the v B obtained after encrypting B ωj in the security index I; 步骤S23:所述物联网设备提取文档PRFi中关键词ωj的位置信息(pos1,pos2,...,posm);Step S23: The Internet of Things device extracts the location information (pos 1 , pos 2 ,..., pos m ) of the keyword ω j in the document PRF i ; 步骤S24:使用Paillier.Enc(posm)对所述位置信息进行加密,得到加密后的位置信息(E(pos1),E(pos1),..., E(posm)), 其中, E代表Paillier.Enc;Step S24: Use Paillier.Enc(pos m ) to encrypt the location information to obtain the encrypted location information (E(pos 1 ), E(pos 1 ),..., E(pos m )), where , E stands for Paillier.Enc; 步骤S25:将关键词ωj所在文档(id1,id2,...,idi)中的所有的所述加密后的位置存储在位置查找表LLT中;Step S25: Store all the encrypted locations in the document (id 1 , id 2 ,..., id i ) where the keyword ω j is located in the location lookup table LLT; 步骤S26:将(I,T,LLT)上传到云服务器,同时将(I,CL,LLT)上传到区块链;Step S26: Upload (I, T, LLT) to the cloud server and (I, CL, LLT) to the blockchain; 步骤S3:数据使用者从所述密钥集中获取共享参数Ω,根据待查询短语和Ω共同生成检索陷门TKk,Q,具体包括:Step S3: The data user obtains the shared parameter Ω from the key set, according to the query phrase and Ω jointly generate retrieval trapdoor TK k,Q , including: 步骤S31:所述数据使用者从所述物联网设备中获取共享参数Ω= {K3,pk};Step S31: The data user obtains the shared parameter Ω = {K 3 , pk} from the Internet of Things device; 步骤S32:根据K3,对每个关键词,计算其陷门tωkStep S32: According to K 3 , for each keyword , calculate its trapdoor tωk ; 步骤S33:计算ωk中的第一个关键词/>之间的距离d,并用Paillier.Enc(d)对d进行加密后得到EdStep S33: Calculate ω k and The first keyword in/> The distance d between them, and use Paillier.Enc(d) to encrypt d to obtain E d ; 步骤S34:将tωk和Ed添加到陷门TKk,Q中并发送到云服务器和区块链;Step S34: Add t ωk and E d to the trapdoor TK k,Q and send it to the cloud server and blockchain; 步骤S4:云服务器利用所述安全索引I、所述加密数据库T、所述位置查找表LLT和所述陷门TKk,Q进行加密数据的检索,得到搜索结果R,具体包括:Step S4: The cloud server uses the security index I, the encrypted database T, the location lookup table LLT and the trapdoor TK k, Q to retrieve the encrypted data and obtain the search result R, which specifically includes: 步骤S41:所述云服务器收到检索请求后,解析所述陷门TKk,Q ,获取{tω1, tω2, ...,tωK, E1, E2, ..Et-1};Step S41: After receiving the retrieval request, the cloud server analyzes the trapdoor TK k,Q and obtains {t ω1 , t ω2 , ..., t ωK , E 1 , E 2 , ..E t-1 }; 步骤S42:从根据tωk从安全索引I获取vB,根据vB获取ωk的位图BωkStep S42: Obtain v B from the security index I according to t ωk , and obtain the bitmap B ωk of ω k according to v B ; 步骤S43:对所有Bω进行“与”运算以获取包含中的所有关键词对应的文档标识符集IDBStep S43: Perform an AND operation on all B ω to obtain the The document identifier set ID B corresponding to all keywords in ; 步骤S44:确定所述文档标识符集对应的每个文档中关键词的顺序是否与所述短语中关键词的顺序一致,若一致,就将该对应的文档PRFi添加到搜索结果R中;Step S44: Determine whether the order of keywords in each document corresponding to the document identifier set is consistent with the phrase. The order of the keywords in is consistent. If they are consistent, the corresponding document PRF i is added to the search result R; 步骤S5:区块链利用所述安全索引I、所述检查列表CL、所述位置查找表LLT和所述陷门TKk,Q进行加密数据的检索,得到链上搜索结果对应的基准值Acc,并计算所述搜索结果R的测试值Acc′,通过比较Acc与Acc′实现所述搜索结果R的验证,如验证通过将proof、搜索结果R发送给所述数据使用者,具体包括:Step S5: The blockchain uses the security index I, the check list CL, the location lookup table LLT and the trapdoor TK k, Q to retrieve the encrypted data and obtain the reference value Acc corresponding to the search results on the chain. , and calculate the test value Acc' of the search result R, and verify the search result R by comparing Acc with Acc'. For example, the verification is by sending proof and search result R to the data user, which specifically includes: 步骤S51:区块链执行上述步骤S4,搜索出区块链上对应的文档标识();Step S51: The blockchain executes step S4 above to search for the corresponding document identifier on the blockchain ( ); 步骤S52:区块链利用所述文档标识()搜索所述检查列表CL中的哈希值hashi,并将其压缩成基准值Acc;Step S52: The blockchain utilizes the document identification ( ) Search the hash value hash i in the check list CL and compress it into the reference value Acc; 步骤S53:计算R中的每个文档的加密密文Cj的哈希值:hashj= H(Cj),并将其压缩为测试值Acc′;Step S53: Calculate the hash value of the encrypted ciphertext C j of each document in R: hash j = H (C j ), and compress it into the test value Acc′; 步骤S54:判断Acc与Acc′是否相等,如果是,令proof=1;否则,令proof=0;Step S54: Determine whether Acc and Acc′ are equal. If so, let proof=1; otherwise, let proof=0; 步骤S55:将来自R的搜索结果和proof发送给数据使用者;Step S55: Send the search results and proof from R to the data user; 步骤S6:所述数据使用者根据proof鉴别所述搜索结果是否有效,如有效,则利用对称密钥解密加密文档以查看明文,具体包括:Step S6: The data user identifies whether the search result is valid based on the proof. If valid, the encrypted document is decrypted using the symmetric key to view the plain text, which specifically includes: 步骤S61:所述数据使用者判断收到的proof,如果proof=1则接受搜索结果R,否则拒绝R;Step S61: The data user judges the received proof, and if proof=1, then accepts the search result R, otherwise rejects R; 步骤S62:对于接受的搜索结果R,所述数据使用者使用对称密钥解密其中的文档,获取文档的明文,短语搜索过程完成。Step S62: For the accepted search result R, the data user uses the symmetric key to decrypt the document, obtain the plain text of the document, and the phrase search process is completed. 2.根据权利要求1所述的基于区块链的加密数据的短语搜索和验证方法,其特征在于,所述步骤S22:所述物联网设备为每个关键词ωj∈W生成位图Bωj,将Bωj加密后得到的vB存储在安全索引I中,具体包括:2. The phrase search and verification method of blockchain-based encrypted data according to claim 1, characterized in that step S22: the Internet of Things device generates a bitmap B for each keyword ω j ∈ W ωj , v B obtained after encrypting B ωj is stored in the security index I, specifically including: 步骤S221:所述物联网设备使用K3和关键词ωj的哈希值H(ωj)生成状态值uωjStep S221: The Internet of Things device uses K 3 and the hash value H(ω j ) of the keyword ω j to generate the state value u ωj ; 步骤S222:所述物联网设备随机生成一组二进制字符串stj,并利用stj和uωj生成关键词ωj在安全索引I中的位置坐标tωjStep S222: The Internet of Things device randomly generates a set of binary strings st j , and uses st j and u ωj to generate the position coordinate t ωj of the keyword ω j in the security index I; 步骤S223:所述物联网设备使用stj和uωj对位图Bωj加密,得到加密后的位图vB,将vB存储在安全索引I中。Step S223: The Internet of Things device uses st j and u ωj to encrypt the bitmap B ωj to obtain the encrypted bitmap v B , and store v B in the security index I. 3.根据权利要求1所述的基于区块链的加密数据的短语搜索和验证方法,其特征在于,所述步骤S25:将关键词ωj所在文档(id1,id2,...,idi)中的所有的所述加密后的位置存储在位置查找表LLT中,具体包括:3. The phrase search and verification method for blockchain-based encrypted data according to claim 1, characterized in that step S25: search the document (id 1 , id 2 ,..., where the keyword ω j is located) All the encrypted locations in id i ) are stored in the location lookup table LLT, specifically including: 根据下述公式(1)~(2)计算存储位置:Calculate the storage location according to the following formulas (1)~(2): (1) (1) (2) (2) 其中,π表示加密函数,表示关键词ωj在文档PRFi所有出现的位置的加密值,Among them, π represents the encryption function, Represents the encrypted value of all occurrences of keyword ω j in document PRF i , LLT(tωj)表示关键词ωj在所有文档中出现位置的加密值。LLT(t ωj ) represents the encrypted value of the occurrence position of keyword ω j in all documents. 4.根据权利要求1所述的基于区块链的加密数据的短语搜索和验证方法,其特征在于,所述步骤S44:确定所述标识符集对应的每个文档中关键词的顺序是否与所述短语中关键词的顺序一致,若一致,就将该对应的文档添加到搜索结果R中,具体包括:4. The phrase search and verification method for blockchain-based encrypted data according to claim 1, characterized in that step S44: Determine whether the order of keywords in each document corresponding to the identifier set is consistent with the phrase The order of the keywords in the keywords is consistent. If they are consistent, the corresponding document will be added to the search result R, specifically including: 步骤S441:对所述标识符集IDB中每个文档标识符,所述云服务器选择长度为(t -1)的二进制字符串flag,并将所有值设置为“0”;Step S441: For each document identifier in the identifier set ID B , the cloud server selects a binary string flag with a length of (t -1) and sets all values to "0"; 步骤S442:所述云服务器通过tωi从所述位置查找表LLT中获取关键词ωj的所有位置/>, />…, />Step S442: The cloud server passes tωi , Obtain all positions of keyword ω j from the position lookup table LLT/> , /> …, /> ; 步骤S443:所述云服务器利用公式(3)来计算在对应的文档中关键词ωj(j > 1)与短语中第一个关键词/>之间的距离:Step S443: The cloud server uses formula (3) to calculate The corresponding keyword ω j (j > 1) in the document and the first keyword in the phrase/> the distance between: (3) (3) 其中, 是关键词ωj在/>对应的文档中的位置;in, is the keyword ω j in/> The location in the corresponding document; 步骤S444:如果公式(3)成立,则关键词ω1和ωj之间的距离为(d-1),这与短语中的距离相同,所述云服务器将flag的位置(i-1)设置为 “1”;Step S444: If formula (3) is established, the distance between the keywords ω 1 and ω j is (d-1), which is the same as the distance in the phrase, and the cloud server will set the flag’s position (i-1) set to "1"; 步骤S445:如果flag的所有位置都是“1”,则对应的文档PRFi包含短语/>,从加密数据库T中找到PRFi,并将PRFi添加到搜索结果R中。Step S445: If all positions of flag are "1", then The corresponding document PRF i contains the phrase /> , find PRF i from the encrypted database T, and add PRF i to the search result R. 5.一种基于区块链的加密数据的短语搜索和验证系统,其特征在于,包括下述模块:5. A blockchain-based phrase search and verification system for encrypted data, characterized by including the following modules: 生成密钥集模块,用于物联网设备使用私密参数生成密钥集,具体包括:The key set generation module is used for IoT devices to generate key sets using private parameters, including: 步骤S11:所述物联网设备选择私密参数λ;Step S11: The Internet of Things device selects the private parameter λ; 步骤S12:利用λ生成密钥集Key = {K1,K2,K3,pk,sk},其中,K1是加密文档的标识符,K2是对称密钥,K3是伪随机函数F的密钥,(pk,sk)分别是使用Paillier加密的公钥和私钥;Step S12: Use λ to generate the key set Key = {K 1 , K 2 , K 3 , pk, sk}, where K 1 is the identifier of the encrypted document, K 2 is the symmetric key, and K 3 is the pseudo-random function The keys of F, (pk, sk) are the public key and private key respectively encrypted using Paillier; 构建索引模块,用于根据一组给定文档PRF及其id、一组关键词W和密钥集Key,所述物联网设备生成安全索引I、加密数据库T、检查列表CL和位置查找表LLT,并将(I,T,LLT)上传到云服务器,将(I,CL,LLT)上传到区块链,具体包括:Construct an index module for generating a security index I, an encrypted database T, a check list CL and a location lookup table LLT based on a given set of documents PRF and their ids, a set of keywords W and a key set Key. , and upload (I, T, LLT) to the cloud server and (I, CL, LLT) to the blockchain, including: 步骤S21:所述物联网设备使用对称加密Enc(K2,PRFi)将每个文档PRFi∈PRF加密为密文Ci,同时将Ci存储在加密数据库T中,将Ci的哈希值hashi存储在检查列表CL;Step S21: The Internet of Things device uses symmetric encryption Enc(K 2 , PRF i ) to encrypt each document PRF i ∈ PRF into ciphertext C i , and at the same time stores C i in the encrypted database T, and the hash of C i The hash value hash i is stored in the check list CL; 步骤S22:所述物联网设备为每个关键词ωj∈W生成位图Bωj,将Bωj加密后得到的vB存储在安全索引I中;Step S22: The Internet of Things device generates a bitmap B ωj for each keyword ω j ∈W, and stores the v B obtained after encrypting B ωj in the security index I; 步骤S23:所述物联网设备提取文档PRFi中关键词ωj的位置信息(pos1,pos2,...,posm);Step S23: The Internet of Things device extracts the location information (pos 1 , pos 2 ,..., pos m ) of the keyword ω j in the document PRF i ; 步骤S24:使用Paillier.Enc(posm)对所述位置信息进行加密,得到加密后的位置信息(E(pos1),E(pos1),..., E(posm)), 其中, E代表Paillier.Enc;Step S24: Use Paillier.Enc(pos m ) to encrypt the location information to obtain the encrypted location information (E(pos 1 ), E(pos 1 ),..., E(pos m )), where , E stands for Paillier.Enc; 步骤S25:将关键词ωj所在文档(id1,id2,...,idi)中的所有的所述加密后的位置存储在位置查找表LLT中;Step S25: Store all the encrypted locations in the document (id 1 , id 2 ,..., id i ) where the keyword ω j is located in the location lookup table LLT; 步骤S26:将(I,T,LLT)上传到云服务器,同时将(I,CL,LLT)上传到区块链;Step S26: Upload (I, T, LLT) to the cloud server and (I, CL, LLT) to the blockchain; 数据使用者授权模块,用于数据使用者从所述密钥集中获取共享参数Ω,根据待查询短语和Ω共同生成检索陷门TKk,Q,具体包括:The data user authorization module is used by the data user to obtain the shared parameter Ω from the key set, according to the query phrase and Ω jointly generate retrieval trapdoor TK k,Q , including: 步骤S31:所述数据使用者从所述物联网设备中获取共享参数Ω= {K3,pk};Step S31: The data user obtains the shared parameter Ω = {K 3 , pk} from the Internet of Things device; 步骤S32:根据K3,对每个关键词,计算其陷门tωkStep S32: According to K 3 , for each keyword , calculate its trapdoor tωk ; 步骤S33:计算ωk中的第一个关键词/>之间的距离d,并用Paillier.Enc(d)对d进行加密后得到EdStep S33: Calculate ω k and The first keyword in/> The distance d between them, and use Paillier.Enc(d) to encrypt d to obtain E d ; 步骤S34:将tωk和Ed添加到陷门TKk,Q中并发送到云服务器和区块链;Step S34: Add t ωk and E d to the trapdoor TK k,Q and send it to the cloud server and blockchain; 加密检索模块,用于云服务器利用所述安全索引I、所述加密数据库T、所述位置查找表LLT和所述陷门TKk,Q进行加密数据的检索,得到搜索结果R,具体包括:The encrypted retrieval module is used by the cloud server to retrieve encrypted data using the security index I, the encrypted database T, the location lookup table LLT and the trapdoor TK k, Q , and obtain the search result R, specifically including: 步骤S41:所述云服务器收到检索请求后,解析所述陷门TKk,Q ,获取{tω1, tω2, ...,tωK, E1, E2, ..Et-1};Step S41: After receiving the retrieval request, the cloud server analyzes the trapdoor TK k,Q and obtains {t ω1 , t ω2 , ..., t ωK , E 1 , E 2 , ..E t-1 }; 步骤S42:从根据tωk从安全索引I获取vB,根据vB获取ωk的位图BωkStep S42: Obtain v B from the security index I according to t ωk , and obtain the bitmap B ωk of ω k according to v B ; 步骤S43:对所有Bω进行“与”运算以获取包含中的所有关键词对应的文档标识符集IDBStep S43: Perform an AND operation on all B ω to obtain the The document identifier set ID B corresponding to all keywords in ; 步骤S44:确定所述文档标识符集对应的每个文档中关键词的顺序是否与所述短语中关键词的顺序一致,若一致,就将该对应的文档PRFi添加到搜索结果R中;Step S44: Determine whether the order of keywords in each document corresponding to the document identifier set is consistent with the phrase. The order of the keywords in is consistent. If they are consistent, the corresponding document PRF i is added to the search result R; 数据验证模块,用于区块链利用所述安全索引I、所述检查列表CL、所述位置查找表LLT和所述陷门TKk,Q进行加密数据的检索,得到链上搜索结果对应的基准值Acc,并计算所述搜索结果R的测试值Acc′,通过比较Acc与Acc′实现所述搜索结果R的验证,如验证通过将proof、搜索结果R发送给所述数据使用者,具体包括:Data verification module, used in the blockchain to retrieve encrypted data using the security index I, the check list CL, the location lookup table LLT and the trapdoor TK k, Q , and obtain the search results corresponding to the chain The reference value Acc, and calculate the test value Acc′ of the search result R, and realize the verification of the search result R by comparing Acc with Acc′. For example, the verification is by sending proof and search result R to the data user. Specifically, include: 步骤S51:区块链执行上述步骤S4,搜索出区块链上对应的文档标识();Step S51: The blockchain executes step S4 above to search for the corresponding document identifier on the blockchain ( ); 步骤S52:区块链利用所述文档标识()搜索所述检查列表CL中的哈希值hashi,并将其压缩成基准值Acc;Step S52: The blockchain utilizes the document identification ( ) Search the hash value hash i in the check list CL and compress it into the reference value Acc; 步骤S53:计算R中的每个文档的加密密文Cj的哈希值:hashj= H(Cj),并将其压缩为测试值Acc′;Step S53: Calculate the hash value of the encrypted ciphertext C j of each document in R: hash j = H (C j ), and compress it into the test value Acc′; 步骤S54:判断Acc与Acc′是否相等,如果是,令proof=1;否则,令proof=0;Step S54: Determine whether Acc and Acc′ are equal. If so, let proof=1; otherwise, let proof=0; 步骤S55:将来自R的搜索结果和proof发送给数据使用者;Step S55: Send the search results and proof from R to the data user; 数据解密模块,用于所述数据使用者根据proof鉴别所述搜索结果是否有效,如有效,则利用对称密钥解密加密文档以查看明文,具体包括:The data decryption module is used by the data user to identify whether the search result is valid based on the proof. If it is valid, use the symmetric key to decrypt the encrypted document to view the plain text, specifically including: 步骤S61:所述数据使用者判断收到的proof,如果proof=1则接受搜索结果R,否则拒绝R;Step S61: The data user judges the received proof, and if proof=1, then accepts the search result R, otherwise rejects R; 步骤S62:对于接受的搜索结果R,所述数据使用者使用对称密钥解密其中的文档,获取文档的明文,短语搜索过程完成。Step S62: For the accepted search result R, the data user uses the symmetric key to decrypt the document, obtain the plain text of the document, and the phrase search process is completed.
CN202311397883.XA 2023-10-26 2023-10-26 Phrase searching and verifying method and system for encrypted data based on blockchain Active CN117131209B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311397883.XA CN117131209B (en) 2023-10-26 2023-10-26 Phrase searching and verifying method and system for encrypted data based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311397883.XA CN117131209B (en) 2023-10-26 2023-10-26 Phrase searching and verifying method and system for encrypted data based on blockchain

Publications (2)

Publication Number Publication Date
CN117131209A CN117131209A (en) 2023-11-28
CN117131209B true CN117131209B (en) 2024-02-13

Family

ID=88856781

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311397883.XA Active CN117131209B (en) 2023-10-26 2023-10-26 Phrase searching and verifying method and system for encrypted data based on blockchain

Country Status (1)

Country Link
CN (1) CN117131209B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107766739A (en) * 2017-09-18 2018-03-06 北京理工大学 Towards the phrase retrieval method and its device of cipher text data
CN112632598A (en) * 2020-12-09 2021-04-09 西安电子科技大学 Encrypted data retrieval and sharing method, system, medium, equipment and application
CN113626853A (en) * 2021-07-03 2021-11-09 西安电子科技大学 Searchable encryption method based on block chain and information data processing terminal
CN114531220A (en) * 2022-01-12 2022-05-24 重庆邮电大学 Efficient fault-tolerant dynamic phrase searching method based on forward privacy and backward privacy
CN114884650A (en) * 2022-03-21 2022-08-09 江苏大学 Searchable encryption method based on safe inverted index

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102246172A (en) * 2008-10-13 2011-11-16 法卢资产有限公司 System and method for distributed index searching of electronic content

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107766739A (en) * 2017-09-18 2018-03-06 北京理工大学 Towards the phrase retrieval method and its device of cipher text data
CN112632598A (en) * 2020-12-09 2021-04-09 西安电子科技大学 Encrypted data retrieval and sharing method, system, medium, equipment and application
CN113626853A (en) * 2021-07-03 2021-11-09 西安电子科技大学 Searchable encryption method based on block chain and information data processing terminal
CN114531220A (en) * 2022-01-12 2022-05-24 重庆邮电大学 Efficient fault-tolerant dynamic phrase searching method based on forward privacy and backward privacy
CN114884650A (en) * 2022-03-21 2022-08-09 江苏大学 Searchable encryption method based on safe inverted index

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链的动态可验证对称可搜索加密方案;徐万山 等;《软件学报》;第34卷(第11期);5392-5407 *

Also Published As

Publication number Publication date
CN117131209A (en) 2023-11-28

Similar Documents

Publication Publication Date Title
CN113626484B (en) Encryption method, system and computer equipment capable of flexibly replacing ciphertext and searching
CN113194078B (en) Sequencing multi-keyword search encryption method with privacy protection supported by cloud
US8474025B2 (en) Methods and apparatus for credential validation
Zhang et al. PIC: Enable large-scale privacy preserving content-based image search on cloud
JP6180177B2 (en) Encrypted data inquiry method and system capable of protecting privacy
CN106650205B (en) A kind of cloud medical data monitoring method of efficient secret protection
TWI463857B (en) Weight authentication and secret retrieval
Zhu et al. An efficient and privacy-preserving biometric identification scheme in cloud computing
CN106776904B (en) The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment
CN108959567A (en) It is suitable for the safe retrieving method of large-scale image under a kind of cloud environment
WO2020177326A1 (en) Searchable encryption method supporting location protection and query privacy
CN111339539B (en) Efficient encrypted image retrieval method under multi-user environment
CN112446041A (en) Verifiable multi-keyword ciphertext query method and system based on security index
CN114021164A (en) Privacy protection method of credit information system based on blockchain
Zhang et al. Toward privacy-preserving aggregate reverse skyline query with strong security
Yadav et al. An IoT based secure patient health monitoring system
CN117131209B (en) Phrase searching and verifying method and system for encrypted data based on blockchain
Li et al. Avpmir: Adaptive verifiable privacy-preserving medical image retrieval
CN105118117A (en) Entrance guard identification device and method
CN116737750A (en) Encryption searching method and device based on text semantics
JP7132506B2 (en) Confidential Information Retrieval System, Confidential Information Retrieval Program, and Confidential Information Retrieval Method
Chen et al. VerFHS: Verifiable image retrieval on forward privacy in blockchain-enabled IoT
CN110059630B (en) Verifiable outsourced monitoring video pedestrian re-identification method with privacy protection
CN114900318B (en) Searchable encryption method based on key agreement protocol and verifiable one-round communication
Chen et al. Memory leakage-resilient dynamic and verifiable multi-keyword ranked search on encrypted smart body sensor network data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant