[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109740364A - The cipher text searching method based on attribute of controllable search permission - Google Patents

The cipher text searching method based on attribute of controllable search permission Download PDF

Info

Publication number
CN109740364A
CN109740364A CN201910009193.XA CN201910009193A CN109740364A CN 109740364 A CN109740364 A CN 109740364A CN 201910009193 A CN201910009193 A CN 201910009193A CN 109740364 A CN109740364 A CN 109740364A
Authority
CN
China
Prior art keywords
ciphertext
private key
cipher text
attribute
text searching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910009193.XA
Other languages
Chinese (zh)
Other versions
CN109740364B (en
Inventor
刘艳
段茹
王丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University
Original Assignee
Dalian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University filed Critical Dalian University
Priority to CN201910009193.XA priority Critical patent/CN109740364B/en
Publication of CN109740364A publication Critical patent/CN109740364A/en
Application granted granted Critical
Publication of CN109740364B publication Critical patent/CN109740364B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The cipher text searching method based on attribute of controllable search permission, belongs to and can search for field of encryption, and solution must not carry out sharing problem to search permission, and S5. re-encrypted private key generates: input common parameter, private key, access structure obtain re-encrypted private key;S6. re-encryption ciphertext generates: input common parameter, initial ciphertext and re-encrypted private key, Cloud Server export re-encryption ciphertext;S7. cipher text searching: former ciphertext and data owner's token are inputted, cipher text searching algorithm is executed;S8. re-encryption cipher text searching: input re-encryption ciphertext and data consumer's token execute cipher text searching algorithm, and effect is that retrieval and decryption distinguish so that designing more flexible easy to operate.

Description

The cipher text searching method based on attribute of controllable search permission
Technical field
The invention belongs to can search for field of encryption, it is related to a kind of cipher text searching side based on attribute of controllable search permission Method.
Background technique
With the rapid development of cloud computing technology and big data, cloud storage mode significantly reduce local datastore and Management cost realizes the application service of high quality, therefore more and more by the favor of enterprises and individuals user.Because cloud takes Data on business device are not perfectly safe, usually need to be to ciphertext data are stored in Cloud Server again after data encryption, this Although way solves the safety problem of data, but encrypted data searching ciphertext and search access control become a difficulty Topic.
For that can limit user's decryption capabilities while guaranteeing data confidentiality again, attribute base encrypts (Attribute-Based Encryption, ABE) method be suggested.Communication pattern based on encryption attribute scheme is one-to-many, guarantee data secret Property while, it is flexible, convenient to have the characteristics that, can effectively reduce the expense in data encryption process, well protect user it is hidden It is private.With going deep into for research, two kinds can be divided into according to ciphertext or the difference of cipher key associated attribute based on the encipherment scheme of attribute Form: the attribute base encryption of key strategy and the attribute base of Ciphertext policy encrypt.On the basis of encryption attribute, document is proposed Ciphertext policy based on attribute can search for encryption (Ciphertext-Policy Atrribute based Searchable Encryption, CP-ABSE) scheme, but the research achievement of document shows that key is in no any processing in CP-ABS scheme In the case of be directly uploaded to Cloud Server and can cause the unsafe problems such as Key Exposure, and using tree-like access structure efficiency compared with It is low.
1998, BLAZE M et al. proposed the concept of proxy re-encryption (ProxyRe-encryption, PRE), In PRE, authorized person generates a proxy re-encrypted private key to succedaneum based on the private key of oneself, and succedaneum utilizes re-encrypted private key The ciphertext of donor is converted into the ciphertext for licensee, and succedaneum can not obtain in plain text, also can not according to again plus The private key of key acquisition donor.2014, document will can search for encipherment scheme and proxy re-encryption technology phase based on attribute In conjunction with proposing a kind of proxy re-encryption for supporting to can search for function, in the case where meeting condition, the program can be by itself Search capability is assigned to succedaneum, executes searching ciphertext by succedaneum and operates.2015, Liang et al. proposed a kind of based on KP- ABE's can search for encipherment scheme.The program supports keyword to update, and recall precision with higher, and in random oracle mould The safety of scheme is demonstrated under type.But the encryption attribute of key strategy is used, the setting of access strategy can only rely on authorization Center.
Summary of the invention
In view of the above-mentioned problems, the present invention proposes a kind of cipher text searching method based on attribute of controllable search permission, including Following steps:
S1. system is established, and obtains common parameter and main private key;
S2. key generates: inputting the attribute set and main private key of user, obtains the private key for user of corresponding attribute set;
S3. ciphertext generates: input access structure, common parameter, main private key and keyword, data owner execute algorithm and produce Raw original ciphertext;
S4. threshold generation: input common parameter, private key and keyword to be checked, data owner generate the order of keyword Board;
S5. re-encrypted private key generates: input common parameter, private key, access structure obtain re-encrypted private key;
S6. re-encryption ciphertext generates: input common parameter, initial ciphertext and re-encrypted private key, and Cloud Server output adds again Ciphertext;
S7. cipher text searching: former ciphertext and data owner's token are inputted, cipher text searching algorithm is executed;
S8. re-encryption cipher text searching: input re-encryption ciphertext and data consumer's token execute cipher text searching algorithm.
Further, the step of system is established, and obtains common parameter and main private key is as follows:
System is established setup (N, n): the maximum number of column n of the attribute total number N and access control matrix M of input system, raw At a 4- multilinear pairing: { ei:G0×Gi→Gi+1| i=0,1,2 }, wherein (G0,...,G3) it is that the plain rank that rank is p recycles Group, enables g0∈G0, g0It is G0Generation member, and for i=0,1,2, gi+1=ei(g0,g1) it is Gi+1Generation member, take h1,1, h1,2,...,hn,N∈G0, define hash function H:{ 0,1 } and * → G0, randomly select Expression integer set 0, 1 ..., p-1 }, then common parameter is and main private key are as follows:
Msk=(a, b) (2).
Further, the step of key generates is as follows:
Key generates keyGen (msk, S): inputting the attribute set S and main private key msk of user, randomly selects index t1,...tn←ZP, ZPIndicate the set of integer { 0,1 ..., p-1 }, ifX ∈ S is taken,The raw private key of the user of corresponding attribute set S are as follows:
Sk=(D, { Lj}j∈[1,n],{Dx}x∈S) (3)。
Further, the step of ciphertext generates is as follows:
Ciphertext generate Enc (kw, pp, msk, (M, ρ)): input access structure (M, ρ), common parameter pp, main private key msk and Keyword kw ∈ { 0,1 }*, data owner executes the algorithm and generates former ciphertext, and the line number and column of matrix M are respectively indicated with l and n Number, is associated with attribute for the every a line of access structure, and defining the mapping function is ρ, and calculating randomly selects n-1 random element and choosing Select s ← ZPVector is formed as shared secretFor i ∈ { 1,2 ..., l }, takeWith J ∈ { 1 ..., n } is calculated
And obtain ciphertext:
Cph=((M, ρ), Ai,j,B,Ci,C1,C2)i∈[1,l],j∈[1,n] (4)。
Further, threshold generation TokenGen (pp, sk, kw): input common parameter pp, private key sk and key to be checked Word kw calculates separately T for i ∈ { 1,2 ..., l }1=e0(H (kw), D), Tj=e0(H(kw),Lj), Tx=e0(H(kw),Dx)x ∈ S, then data owner generates the token of keyword kw are as follows:
Token=(S, T1,{Tj}j∈[1,n],{Tx}∈S) (5)。
Further, re-encrypted private key generate ReKeyGen (pp, sk, (M ', ρ ')): input common parameter pp, private key sk, Access structure (M ', ρ ') respectively indicates the line number and columns of matrix M ' with l and n, and the every a line of access structure is associated with attribute, Defining the mapping function is ρ ', randomly selects n-1 element and composition vectors immediatelyFor i ' ∈ { 1,2 ..., l }, takesWith j ' ∈ { 1 ..., n }, calculate
Export re-encrypted private key are as follows:
rk(M′,ρ′)=(B ', { A 'i,j}i∈[1,l],j∈[1,n]) (6)。
Further, re-encryption ciphertext generates ReEnc (cph, pp, rk(M′,ρ′)): input common parameter pp, initial ciphertext Cph=(C1,C2) and re-encrypted private key rk(M′,ρ′), calculateCloud Server exports re-encryption ciphertext are as follows:
cphR=((M ', ρ '), C '1,C′2,B′,{Ai,j}i∈[1,l],j∈[1,n]) (7)。
Further, cipher text searching Search (token, cph): input original ciphertext cph and data owner's token Token executes cipher text searching algorithm, and whether verifying user property collection S meets access structure P=(M, ρ), if it is satisfied, then one Surely set c can be obtained in polynomial timei, which meets ∑ρ(i)∈Sci·λi=(1,0 ..., 0), then it calculates
IfIt then proves to search for successfully, otherwise search failure.
Further, re-encryption cipher text searching SearchR(tokenR,cphR): input re-encryption ciphertext cphRAnd data User token token executes cipher text searching algorithm, and whether verifying user property collection S meets access structure P=(M ', ρ '), such as Fruit meets, then set c ' can be centainly obtained in polynomial timei, which meets ∑ρ′(i)∈Sc′i·λ′i=(1, 0 ..., 0), then calculate
If e2(K′,C′1)=C '2, then prove to search for successfully, otherwise search failure.
The utility model has the advantages that controllable search is realized using the encryption attribute mode that can search for based on Ciphertext policy, in conjunction with agency's weight The mode of encryption shares search permission.Extract the keyword fragment in ciphertext to form search token in scheme, retrieval and Decryption distinguishes so that designing more flexible easy to operate.The mode used for the linear sharing matrix of LSSS, visit by fine granularity control Search efficiency is improved while asking.New departure can carry out fine-grained control to search permission while guaranteeing data security System.
Detailed description of the invention
Fig. 1 system model figure.
Specific embodiment
1 basic conception explanation
1.1 bilinear map
Define 1 bilinear map.G and GTIt is the multiplicative cyclic group that two ranks are p.Bilinear map e:G × G → GT, g, gT Respectively G, GTGeneration member, while meet with following property:
Bilinearity: there are e (ga,gb)=e (g, g)ab, wherein
Non-degeneracy: there are g ∈ G, so that e (g, g) ≠ 1.
Computability: rightE (u, v) can be calculated effectively.
1.2 difficulty problems are assumed
The definition of n- multilinear pairing: the prime number p of given security parameter l and a l bit, n- multilinear pairing is by n A p rank group (G0,G1,...,Gn-1) and n-1 mapping ei:G0×Gi→Gi+1(i=0 ... n-2) composition.N- multilinear pairing is answered Property under the satisfaction, for (i=0 ... n-2):
If g ∈ G0For G0Generation member, then gi+1=ei(g0,gi) it is Gi+1Generation member.
·Meet
·eiIt can effectively calculate.
N- polyteny Decisional Diffie-Hellman assumption (n-Mut-ilinear Decisional Diffie- Hellman Assumption, n-MDDH) selectionG is the generation member of G.Given ga,gb,gs,gz, do not deposit Z=e (g, g) can be distinguished in probabilistic polynomial time algorithm with the advantage that can not ignoreabsWith Z=e (g, g)z, wherein algorithm Advantage be defined as | Pr [Α (ga,gb,gs,e(g,g)abs)=1]-Pr [Α (ga,gb,gs,e(g,g)z)=1] |.
2 scheme models
2.1 system model
The system model that the present invention uses by taking medical cloud scene as an example as shown in Figure 1, illustrate: model includes four realities Body is authorization center, Cloud Server, data owner Alice and search user Bob respectively.Of the data owner Alice oneself It is uploaded to cloud after people's medical data and data key words encryption, subsequent search operaqtion can be divided into two kinds of situations, first is that working as her Attending physician Bob when needing to check case, condition can be set to C1The access conditions of={ attending physician }, and retrieval is enabled Board and Cloud Server is sent it to, commission Cloud Server completes searching ciphertext;Second is that attending physician needs to check her disease When example inquires into the state of an illness with other doctor Carol, Alice, which can need to formulate according to oneself access strategy such as doctor, need to meet C2= The condition of { attending physician Bob, doctor Carol } generates re-encrypted private key and is sent to Cloud Server, and commission Cloud Server will The permission of search key is shared with the data consumer for meeting access conditions.In this model, authorization center is responsible for management and is belonged to Property collection, and be generated for user according to property set and distribution is corresponding private key.Cloud Server is responsible for the data of storage encryption, is to use Family provides cipher text searching service and uses re-encrypted private key, and grantee is allowed to carry out keyword to the ciphertext of re-encryption Retrieval.In whole process, data grant person completes not online and in the case where not interacting with authorized user, and search is weighed Limit is shared with other users.
3 algorithms are realized
The specific implementation of 3.1 schemes
System is established setup (N, n): the maximum number of column n of the attribute total number N and access control matrix M of input system, raw At a 4- multilinear pairing: { ei:G0×Gi→Gi+1| i=0,1,2 }, wherein (G0,...,G3) it is that the plain rank that rank is p recycles Group.Enable g0∈G0It is G0Generation member, and for i=0,1,2, gi+1=ei(g0,g1) it is Gi+1Generation member.Take h1,1, h1,2,...,hn,N∈G0, define hash function H:{ 0,1 }*→G0.It randomly selectsExpression integer set 0, 1 ..., p-1 } all subsets, choose element a, b, c uniformly randomly from set, then common parameter is and main private key are as follows:
Msk=(a, b) (11)
Key generates keyGen (msk, S): inputting the attribute set S and main private key msk of user.Randomly select index t1,...tn←ZP, indicate that the set of integer { 0,1 ..., p-1 }, the meaning of this formula are that n are randomly selected in set at random Number, ifX ∈ S is taken,The raw private of the user of corresponding attribute set S Key are as follows:
Sk=(D, { Lj}j∈[1,n],{Dx}x∈S) (12)
Ciphertext generate Enc (kw, pp, msk, (M, ρ)): input access structure (M, ρ), common parameter pp, main private key msk and Keyword kw ∈ { 0,1 }*, data owner executes the algorithm and generates former ciphertext.The line number and column of matrix M are respectively indicated with l and n Number, is associated with attribute for the every a line of access structure, and defining the mapping function is ρ.Calculating randomly selects n-1 random element and choosing Select s ← ZPVector is formed as shared secretFor i ∈ { 1,2 ..., l }, takeAnd j ∈ { 1 ..., n } is calculated Need specification: H indicates hash function, is a kind of operation.H (kw) indicates to carry out Hash operation to kw.
By above-mentioned, ciphertext is obtained:
Cph=((M, ρ), Ai,j,B,Ci,C1,C2)i∈[1,l],j∈[1,n] (13)。
Threshold generation TokenGen (pp, sk, kw): input common parameter pp, private key sk and keyword kw to be checked, for I ∈ 1,2 ..., and l } calculate separately T1=e0(H (kw), D), Tj=e0(H(kw),Lj), Tx=e0(H(kw),Dx) x ∈ S, then it counts The token of keyword kw is generated according to owner are as follows:
Token=(S, T1,{Tj}j∈[1,n],{Tx}∈S) (14)
Re-encrypted private key generates ReKeyGen (pp, sk, (M ', ρ ')): input common parameter pp, private key sk, access structure (M′,ρ′).The every a line of access structure is associated with attribute, defines this and reflect by the line number and columns that matrix M ' is respectively indicated with l and n Penetrating function is ρ '.Randomly select n-1 element and composition vectors immediatelyFor i ' ∈ 1, 2 ..., l }, it takesWith j ' ∈ { 1 ..., n }, calculate Export re-encrypted private key are as follows:
rk(M′,ρ′)=(B ', { A 'i,j}i∈[1,l],j∈[1,n]) (15)
Re-encryption ciphertext generates ReEnc (cph, pp, rk(M′,ρ′)): input common parameter pp, initial ciphertext cph=(C1, C2) and re-encrypted private key rk(M′,ρ′).It calculatesCloud Server exports re-encryption ciphertext are as follows:
cphR=((M ', ρ '), C '1,C′2,B′,{Ai,j}i∈[1,l],j∈[1,n]) (16)
Cipher text searching Search (token, cph): input original ciphertext cph and data owner token token executes close Literary searching algorithm.Whether verifying user property collection S meets access structure P=(M, ρ), if it is satisfied, then centainly can be multinomial Set c is obtained in the formula timei, which meets ∑ρ(i)∈Sci·λi=(1,0 ..., 0), then it calculates
IfIt then proves to search for successfully, output 1, otherwise search failure, output 0.
Re-encryption cipher text searching SearchR(tokenR,cphR): input re-encryption ciphertext cphRAnd data consumer's token Token executes cipher text searching algorithm.
Whether verifying user property collection S meets access structure P=(M ', ρ '), if it is satisfied, then centainly can be in multinomial Set c ' is obtained in timei, which meets ∑ρ′(i)∈Sc′i·λ′i=(1,0 ..., 0), then calculate
If e2(K′,C′1)=C '2, then prove to search for successfully, output 1, otherwise search failure, output 0.
3.2 correctness
Search key verification of correctness:
If property set S meets access structure (M, ρ), and re-encryption ciphertext is corresponding crucial identical, then
Therefore available:
Search key verification of correctness after re-encryption:
Therefore available:
4 Security Proofs
4.1 data confidentiality
If 1 4-MDDH problem of theorem is difficult to resolve, CP-ABRKS scheme is under random oracle model can not area Divide property selection keyword attack safety.
Prove that assuming that there are a probabilistic polynomial time opponent A breaks through the random of CP-ABRK with the advantage ε that can not ignore Indistinguishability selection keyword attacks safe game under oracle model, then a challenger can be constructed can not neglect Probability slightlySolve the problems, such as 4-MDDH, wherein qTIt is the maximum times of opponent's inquiry response devices.
The example that challenger C gives a 4-MDDH problemWhereinW is from setIn random number, simulation as follows:
Initialization: opponent A selects a challenge access structure (M**) wherein M*For l*×k*Matrix, l*For line number, k* For columns, and send them to challenger.Assuming that attribute total number is N, access control matrix M in system*Maximum number of column For nmax, challenger generates common parameter and main private key as follows:
(1) access structure (M is given**), for every a pair of (j, x), wherein 1≤x≤N, 1≤j≤nmax, selectionMake ρ if there is an i*(i)=x and i≤k*, then enable It is the i row j column of matrix; Otherwise it enablesIf common parameter are as follows:
Main private key is mk=(a, b).
(2) challenger analog answer device H as follows
OH(kw): a keyword kw is given, simulator works as follows:
If kw was not queried, takeAnd with probability P r [ci=0]=1/ (qT+ 1) a bit c is selectedi∈ {0,1}.If ci=0, it calculatesOtherwise it calculates(kw, ai,H(kw),ci) be added Table LHIn and return to H (kw).Otherwise, from LHIn retrieve H (kw) corresponding with kw and return H (kw).
Stage 1:A can carry out the inquiry of multinomial time or less transponder:
(a)OkeyGen(S) given attribute collection S, challenger work as follows:
If S meets access structure, return ⊥ (end mark).
Otherwise, if S is unsatisfactory for access structure (M**), then there is a vector The set for indicating n times vector operation in integer { 0,1 ..., p-1 }, so that w1=-1 and For k* ≤ j≤n is setIt calculatesRandom selectionAnd impliedly define tj=rj+wjB, then for each x ∈ S, setting makes if there is iOtherwise it sets
(b)Ork(S, P): one property set S of input and an access structure P=(M, ρ), wherein M is the matrix of l × k, is chosen War person works as follows:
LrkIt is re-encryption list, if LrkRecord is not present in table, returns to ⊥.Else if record exists, then random choosing Take n index and composition vectorIf Otherwise, vector is formed IfWherein define s=cs '.
(c)OReEnc(S, cph): a given property set S and former ciphertext cph, challenger work as follows:
If LrkIn table it is existing record or when P ≠ P*, O is inquired with (S, P)rkObtain re-encrypted private key rkuid→P, and count Calculate cphR←Re Enc(cph,pp,rkP).It can be regarded as the combination that property set and access structure are constituted.
Otherwise, if in such as middle LHThere are kwi, so that ci=1 andSelect d ∈ ZPIf And for every a pair of i=1 ... N, and j=1 ... nReturn to cphR=(C1,C′2,B,{Ri,j}i∈[1,l],j∈[1,n])。
Otherwise, mistake occurs and stops.
(d)Otoken(S, kw): a given property set S and a keyword kw, challenger work as follows:
O is inquired with kwHObtain (ai,H(kw),ci)。
If ci=1, selectionIt calculatesL′j=e0(H(kw),Lj)j∈[1, n];And for each x ∈ S,
If ci=0 and access structure is not met, inquires O with SkeyGenSk is obtained for j=1 ... n calculates D ', L 'jMode is same as above.
Otherwise, it generates mistake and stops.
Challenge: A two isometric keyword (kw0,kw1).If c0=1 and c1=0, if η=1;Work as c0=0 and c1=1, So set η=0;If c0=1 ∧ c1=1, challenger generates mistake and stops;Otherwise, it randomly chooses
Challenger will use kwηInquiry obtains ciphertextReturn to A.
Stage 2: increase limitation (kw0, kw1) O cannot be inquiredtoken, the other similar stage 1.If S meets access knot Structure, then (S, kw0) and ((S, kw1) cannot inquire
Conjecture: A exports a conjecture μ '.If μ=μ ', challenger's outputOtherwise, it exports
So far the simulation of game is completed.Now game probability is won to challenger under conditions of working properly to analyze. If outputSo cph*Actually kwμAn effective ciphertext, so A output μ=μ ' probability be 1/2+ ε.If Z is from G3In it is randomly selected, then A output μ=μ ' probability be 1/2.Therefore, challenger correctly guessesProbability be 1/2 ε/2 (1/2+ ε)+1/21/2=1/2+.
That is, it is (1/e+1/q that challenger, which has the advantage for solving the problems, such as 4-MDDH,T)ε/2。
5 functional analyses
In this section, the present invention is proposed a plan and is compared with the method for document [1], document [2] from aspect of performance, is seen Table 1.The scheme support of document [1] can search for encrypting but not support re-encryption, and disadvantageous inhabitant shares data retrieval permissions, searches The flexibility of rope reduces;And tree-like access structure efficiency is lower, this is not accounted in the data forwarding of cloud computing and search mechanisms Advantage.Document [16] uses the encryption attribute side based on key strategy though keyword search and proxy re-encryption may be implemented Case pole is unfavorable for control of the data owner for access authority.And the present invention program is due to using the higher LSSS knot of access efficiency Structure, can be realized simultaneously the function of keyword search and proxy re-encryption, therefore be more suitable for cloud computing and practical application.
[1]Zheng Q,Xu S,Ateniese G.VABKS:Verifiable attribute-based keyword search over outsourced encrypted data[C]//Proc of IEEE INFOCOM.2014:522-530.
[2]Liang K,Susilo W.Searchable Attribute-based mechanism with efficient data sharing for secure cloud storage[J].IEEE Trans on Information Forensics&Security,2015,10(9):1981-1992.
1 scheme performance of table compares
6 efficiency analysis
This section will compare in terms of efficiency with document [1], document [2], and comparison result is shown in Table 2.Wherein s indicates attribute Attribute number is concentrated, l indicates the number of attribute in access structure, and E is used to indicate that an index operation exponent arithmetic on G, P It is to indicate that Bilinear map matches operation.Since hash algorithm, the non-index operation calculation amount generated on first group element are smaller, therefore neglect Slightly disregard the calculation amount of two kinds of algorithms.
2 computing cost of table compares
The solution of the present invention is generated in key as can be seen from Table 2 and ciphertext generation phase is substantially better than document [1].Surely belong to Property concentrate attribute number it is close with access structure number when, the present invention program will be much higher than document in the efficiency of key generation phase [2], in threshold generation and search phase, simultaneously above both schemes.Added this is because the present invention is used based on Ciphertext policy Close mode and document [2] calculate access structure key strategy using key generation phase, therefore efficiency reduces.Even if raw in ciphertext After the computations of access control are added at the stage, the efficiency of the present invention program is still higher than document [2].Comprehensive analysis can obtain, This programme has more practicability compared to the search plan based on attribute in same stage.
7 effects
For searching ciphertext existing under cloud environment, retrieval permissions are shared and access control problem, the present invention use crucial The mode of word and ciphertext segmentation operation, in conjunction with the property broker re-encryption scheme based on key strategy, proposing a kind of cloud can Control the cipher text searching scheme based on attribute of search permission.Scheme under the conditions of ciphertext, can carry out the data of condition setting beyond the clouds Retrieval and search permission it is shared.Meanwhile in conjunction with cloud computing ability, saves and be locally stored and the cost of management service, mention High retrieval rate, so that user still is able to shared search permission in the case where online.Although scheme realizes access control It makes, improve retrieval rate, but functionally, can only realize the search of single keyword, still can not achieve multiple key or key The functions such as fuzzy query, sequence, the relational calculus of word, therefore how to solve the above problems, and following research direction.
Under cloud storage environment, the searching ciphertext scheme of keyword search is supported to cannot achieve fine-granularity access control, it cannot Search permission is shared.For this purpose, the present invention mutually ties the encipherment scheme that can search for based on attribute with proxy re-encryption technology Close the cipher text searching scheme based on attribute for proposing a kind of controllable search permission in cloud.In the present solution, using keyword and ciphertext Divide the mode of operation, the access structure and keyword of multiple attribute compositions realize search access control;Pass through proxy re-encryption In the case that technology can realize that user is not online, search permission is shared with to the other users for meeting access conditions.Safety analysis Show that this programme can be with the safety of valid certificates this programme under polyteny Decisional Diffie-Hellman assumption.
The preferable specific embodiment of the above, only the invention, but the protection scope of the invention is not It is confined to this, anyone skilled in the art is in the technical scope that the invention discloses, according to the present invention The technical solution of creation and its inventive concept are subject to equivalent substitution or change, should all cover the invention protection scope it It is interior.

Claims (9)

1. a kind of cipher text searching method based on attribute of controllable search permission, which comprises the steps of:
S1. system is established, and obtains common parameter and main private key;
S2. key generates: inputting the attribute set and main private key of user, obtains the private key for user of corresponding attribute set;
S3. ciphertext generates: input access structure, common parameter, main private key and keyword, data owner execute algorithm and generate original Ciphertext;
S4. threshold generation: input common parameter, private key and keyword to be checked, data owner generate the token of keyword;
S5. re-encrypted private key generates: input common parameter, private key, access structure obtain re-encrypted private key;
S6. re-encryption ciphertext generates: input common parameter, initial ciphertext and re-encrypted private key, it is close that Cloud Server exports re-encryption Text;
S7. cipher text searching: former ciphertext and data owner's token are inputted, cipher text searching algorithm is executed;
S8. re-encryption cipher text searching: input re-encryption ciphertext and data consumer's token execute cipher text searching algorithm.
2. the cipher text searching method based on attribute of controllable search permission as described in claim 1, which is characterized in that
The step of system is established, and common parameter and main private key are obtained is as follows:
System is established setup (N, n): the maximum number of column n of the attribute total number N and access control matrix M of input system, generates one A 4- multilinear pairing: { ei:G0×Gi→Gi+1| i=0,1,2 }, wherein (G0,...,G3) it is the plain rank cyclic group that rank is p, it enables g0∈G0, g0It is G0Generation member, and for i=0,1,2, gi+1=ei(g0,g1) it is Gi+1Generation member, take h1,1,h1,2,..., hn,N∈G0, define hash function H:{ 0,1 }*→G0, randomly select Expression integer set 0,1 ..., p- 1 }, then common parameter is and main private key are as follows:
Msk=(a, b) (2).
3. the cipher text searching method based on attribute of controllable search permission as claimed in claim 2, which is characterized in that
The step of key generates is as follows:
Key generates keyGen (msk, S): inputting the attribute set S and main private key msk of user, randomly selects index t1, ...tn←ZP, ZPIndicate the set of integer { 0,1 ..., p-1 }, ifX ∈ S is taken,The raw private key of the user of corresponding attribute set S are as follows:
Sk=(D, { Lj}j∈[1,n],{Dx}x∈S) (3)。
4. the cipher text searching method based on attribute of controllable search permission as claimed in claim 3, which is characterized in that ciphertext is raw At the step of it is as follows:
Ciphertext generates Enc (kw, pp, msk, (M, ρ)): input access structure (M, ρ), common parameter pp, main private key msk and key Word kw ∈ { 0,1 }*, data owner executes the algorithm and generates former ciphertext, the line number and columns of matrix M are respectively indicated with l and n, The every a line of access structure is associated with attribute, defining the mapping function is ρ, and calculating randomly selects n-1 random element and selection s ←ZPVector is formed as shared secretFor i ∈ { 1,2 ..., l }, takeWith j ∈ { 1 ..., n } is calculated
And obtain ciphertext:
Cph=((M, ρ), Ai,j,B,Ci,C1,C2)i∈[1,l],j∈[1,n] (4)。
5. the cipher text searching method based on attribute of controllable search permission as claimed in claim 4, which is characterized in that thresholding is raw At the step of it is as follows:
TokenGen (pp, sk, kw): input common parameter pp, private key sk and keyword kw to be checked, for i ∈ 1,2 ..., L } calculate separately T1=e0(H (kw), D), Tj=e0(H(kw),Lj), Tx=e0(H(kw),Dx) x ∈ S, then data owner generates The token of keyword kw are as follows:
Token=(S, T1,{Tj}j∈[1,n],{Tx}∈S) (5)。
6. the cipher text searching method based on attribute of controllable search permission as claimed in claim 5, which is characterized in that re-encryption The step of key generates is as follows:
Re-encrypted private key generate ReKeyGen (pp, sk, (M ', ρ ')): input common parameter pp, private key sk, access structure (M ', ρ '), the line number and columns of matrix M ' are respectively indicated with l and n, and the every a line of access structure is associated with attribute, defines the mapping letter Number is ρ ', randomly selects n-1 element and composition vectors immediatelyFor i ' ∈ { 1,2 ..., l }, It takesWith j ' ∈ { 1 ..., n }, calculate
Export re-encrypted private key are as follows:
rk(M′,ρ′)=(B ', { A 'i,j}i∈[1,l],j∈[1,n]) (6)。
7. the cipher text searching method based on attribute of controllable search permission as claimed in claim 6, which is characterized in that re-encryption The step of ciphertext generates is as follows:
Re-encryption ciphertext generates ReEnc (cph, pp, rk(M′,ρ′)): input common parameter pp, initial ciphertext cph=(C1,C2) and Re-encrypted private key rk(M′,ρ′), calculateCloud Server exports re-encryption ciphertext are as follows:
cphR=((M ', ρ '), C '1,C′2,B′,{Ai,j}i∈[1,l],j∈[1,n]) (7)。
8. the cipher text searching method based on attribute of controllable search permission as claimed in claim 7, which is characterized in that ciphertext is searched The step of rope, is as follows:
Cipher text searching Search (token, cph): input original ciphertext cph and data owner token token executes cipher text searching Algorithm, whether verifying user property collection S meets access structure P=(M, ρ), if it is satisfied, then centainly can be in polynomial time Inside obtain set ci, which meets ∑ρ(i)∈Sci·λi=(1,0 ..., 0), then it calculates
IfIt then proves to search for successfully, otherwise search failure.
9. the cipher text searching method based on attribute of controllable search permission as claimed in claim 8, which is characterized in that re-encryption The step of cipher text searching, is as follows:
Re-encryption cipher text searching SearchR(tokenR,cphR): input re-encryption ciphertext cphRAnd data consumer's token Token executes cipher text searching algorithm, and whether verifying user property collection S meets access structure P=(M ', ρ '), if it is satisfied, then Set c ' can be centainly obtained in polynomial timei, which meets ∑ρ′(i)∈Sc′i·λ′i=(1,0 ..., 0), then It calculates
If e2(K′,C′1)=C '2, then prove to search for successfully, otherwise search failure.
CN201910009193.XA 2019-01-04 2019-01-04 Attribute-based ciphertext searching method capable of controlling searching authority Active CN109740364B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910009193.XA CN109740364B (en) 2019-01-04 2019-01-04 Attribute-based ciphertext searching method capable of controlling searching authority

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910009193.XA CN109740364B (en) 2019-01-04 2019-01-04 Attribute-based ciphertext searching method capable of controlling searching authority

Publications (2)

Publication Number Publication Date
CN109740364A true CN109740364A (en) 2019-05-10
CN109740364B CN109740364B (en) 2020-12-15

Family

ID=66363521

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910009193.XA Active CN109740364B (en) 2019-01-04 2019-01-04 Attribute-based ciphertext searching method capable of controlling searching authority

Country Status (1)

Country Link
CN (1) CN109740364B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110602099A (en) * 2019-09-16 2019-12-20 广西师范大学 Privacy protection method based on verifiable symmetric searchable encryption
CN110933026A (en) * 2019-10-22 2020-03-27 东北大学 Lightweight privacy protection equivalent query method
CN113343258A (en) * 2021-06-09 2021-09-03 哈尔滨学院 Attribute-based agent re-encryption method applicable to lattice-based ciphertext strategy shared by body test result cloud
CN113569271A (en) * 2021-09-27 2021-10-29 深圳前海环融联易信息科技服务有限公司 Threshold proxy re-encryption method and system based on attribute condition
CN113904818A (en) * 2021-09-27 2022-01-07 九江学院 Lightweight fine-grained access control method supporting ciphertext sharing and aggregation
CN114257446A (en) * 2021-12-20 2022-03-29 湖北工业大学 Data access control method based on searchable encryption and computer equipment
CN114615050A (en) * 2022-03-08 2022-06-10 中山大学 Verifiable searchable symmetric encryption method based on block chain storage

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701833A (en) * 2014-01-20 2014-04-02 深圳大学 Ciphertext access control method and system based on cloud computing platform
WO2014112048A1 (en) * 2013-01-16 2014-07-24 三菱電機株式会社 Encryption system, re-encryption key generation device, re-encryption device, encryption method and encryption program
CN105743888A (en) * 2016-01-22 2016-07-06 河南理工大学 Agent re-encryption scheme based on keyword research
CN106850652A (en) * 2017-02-21 2017-06-13 重庆邮电大学 One kind arbitration can search for encryption method
CN108092766A (en) * 2017-11-30 2018-05-29 深圳大学 A kind of cipher text searching method for verifying authority and its system
CN108400871A (en) * 2018-01-25 2018-08-14 南京邮电大学 In conjunction with the searching ciphertext system and method for identity and the support proxy re-encryption of attribute
CN108418681A (en) * 2018-01-22 2018-08-17 南京邮电大学 A kind of searching ciphertext system and method based on attribute for supporting proxy re-encryption
CN108512662A (en) * 2018-04-12 2018-09-07 上海海事大学 The hiding multimachine structure encryption method of support policy on a kind of lattice

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014112048A1 (en) * 2013-01-16 2014-07-24 三菱電機株式会社 Encryption system, re-encryption key generation device, re-encryption device, encryption method and encryption program
CN103701833A (en) * 2014-01-20 2014-04-02 深圳大学 Ciphertext access control method and system based on cloud computing platform
CN105743888A (en) * 2016-01-22 2016-07-06 河南理工大学 Agent re-encryption scheme based on keyword research
CN106850652A (en) * 2017-02-21 2017-06-13 重庆邮电大学 One kind arbitration can search for encryption method
CN108092766A (en) * 2017-11-30 2018-05-29 深圳大学 A kind of cipher text searching method for verifying authority and its system
CN108418681A (en) * 2018-01-22 2018-08-17 南京邮电大学 A kind of searching ciphertext system and method based on attribute for supporting proxy re-encryption
CN108400871A (en) * 2018-01-25 2018-08-14 南京邮电大学 In conjunction with the searching ciphertext system and method for identity and the support proxy re-encryption of attribute
CN108512662A (en) * 2018-04-12 2018-09-07 上海海事大学 The hiding multimachine structure encryption method of support policy on a kind of lattice

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110602099A (en) * 2019-09-16 2019-12-20 广西师范大学 Privacy protection method based on verifiable symmetric searchable encryption
CN110933026A (en) * 2019-10-22 2020-03-27 东北大学 Lightweight privacy protection equivalent query method
CN110933026B (en) * 2019-10-22 2021-06-04 东北大学 Lightweight privacy protection equivalent query method
CN113343258A (en) * 2021-06-09 2021-09-03 哈尔滨学院 Attribute-based agent re-encryption method applicable to lattice-based ciphertext strategy shared by body test result cloud
CN113569271A (en) * 2021-09-27 2021-10-29 深圳前海环融联易信息科技服务有限公司 Threshold proxy re-encryption method and system based on attribute condition
CN113904818A (en) * 2021-09-27 2022-01-07 九江学院 Lightweight fine-grained access control method supporting ciphertext sharing and aggregation
CN113569271B (en) * 2021-09-27 2022-01-25 深圳前海环融联易信息科技服务有限公司 Threshold proxy re-encryption method based on attribute condition
CN113904818B (en) * 2021-09-27 2023-04-18 九江学院 Lightweight fine-grained access control method supporting ciphertext sharing and aggregation
CN114257446A (en) * 2021-12-20 2022-03-29 湖北工业大学 Data access control method based on searchable encryption and computer equipment
CN114257446B (en) * 2021-12-20 2023-05-23 湖北工业大学 Data access control method based on searchable encryption and computer equipment
CN114615050A (en) * 2022-03-08 2022-06-10 中山大学 Verifiable searchable symmetric encryption method based on block chain storage
CN114615050B (en) * 2022-03-08 2023-03-28 中山大学 Verifiable searchable symmetric encryption method based on block chain storage

Also Published As

Publication number Publication date
CN109740364B (en) 2020-12-15

Similar Documents

Publication Publication Date Title
Sun et al. Blockchain-based secure storage and access scheme for electronic medical records in IPFS
CN112765650B (en) Attribute-based searchable encrypted blockchain medical data sharing method
Zhang et al. Searchable encryption for healthcare clouds: A survey
CN109740364A (en) The cipher text searching method based on attribute of controllable search permission
CN107682353B (en) A kind of health account access control method in electron medical treatment cloud
Ying et al. A lightweight policy preserving EHR sharing scheme in the cloud
CN104021157B (en) Keyword in cloud storage based on Bilinear map can search for encryption method
Zaghloul et al. P-MOD: Secure privilege-based multilevel organizational data-sharing in cloud computing
Yao et al. Privacy-preserving search over encrypted personal health record in multi-source cloud
Chaudhari et al. Keysea: Keyword-based search with receiver anonymity in attribute-based searchable encryption
CN105024802B (en) Multi-user's multi-key word based on Bilinear map can search for encryption method in cloud storage
CN106921674A (en) The re-encryption semanteme of acting on behalf of that quantum is attacked after anti-can search for encryption method
Pham et al. Survey on secure search over encrypted data on the cloud
CN112989375B (en) Hierarchical optimization encryption lossless privacy protection method
Huang et al. FSSR: Fine-grained EHRs sharing via similarity-based recommendation in cloud-assisted eHealthcare system
CN106850656A (en) Multi-user's file-sharing control method under a kind of cloud environment
CN108092972A (en) A kind of more authorization centers can search for encryption method based on attribute
CN109981643A (en) A kind of inquiry authorization of fine granularity can search for encryption method and system
CN108632385A (en) Multiway tree data directory structure cloud storage method for secret protection based on time series
CN109451077A (en) The model that medical cloud search permission is shared
Du et al. A Lightweight Blockchain‐based Public‐Key Authenticated Encryption with Multi‐Keyword Search for Cloud Computing
Verma Secure client-side deduplication scheme for cloud with dual trusted execution environment
Chen et al. Multi-user boolean searchable encryption supporting fast ranking in mobile clouds
Liu et al. Verifiable attribute-based keyword search encryption with attribute revocation for electronic health record system
Almarwani et al. Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant