CN102385627B - Query method of disjunctive normal form in public key encryption system - Google Patents
Query method of disjunctive normal form in public key encryption system Download PDFInfo
- Publication number
- CN102385627B CN102385627B CN 201110350085 CN201110350085A CN102385627B CN 102385627 B CN102385627 B CN 102385627B CN 201110350085 CN201110350085 CN 201110350085 CN 201110350085 A CN201110350085 A CN 201110350085A CN 102385627 B CN102385627 B CN 102385627B
- Authority
- CN
- China
- Prior art keywords
- center dot
- centerdot
- beta
- dot
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 125000004122 cyclic group Chemical group 0.000 claims description 6
- 239000013598 vector Substances 0.000 description 2
- 238000013507 mapping Methods 0.000 description 1
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
本发明公开了一种公钥加密系统中析取范式的查询方法,包括步骤:(1)随机选取安全参数,并选择2n+3个随机数α0,α1,...,αn,β0,β1,...,βn,
其中n为整数;(2)对安全参数和随机数进行计算,以得到公共密钥pk和秘密密钥sk:(3)对公共密钥pk和一组关键词集合进行计算,以得到索引Iw,并对秘密密钥sk和另一组关键词集合进行计算,以得到陷门TQ;(4)根据索引Iw、陷门TQ和公共密钥pk确定两组关键词集合是否匹配。本发明支持多关键词检索的需求,并可不利用关键词域作为辅助信息。The invention discloses a query method of a disjunctive paradigm in a public key encryption system, comprising the steps of: (1) randomly selecting security parameters, and selecting 2n+3 random numbers α 0 , α 1 ,..., α n , β 0 , β 1 ,..., β n ,
where n is an integer; (2) calculate the security parameters and random numbers to obtain the public key pk and secret key sk; (3) calculate the public key pk and a set of keywords to obtain the index I w , and calculate the secret key sk and another set of keywords to obtain the trapdoor T Q ; (4) Determine whether the two sets of keywords match according to the index I w , the trapdoor T Q and the public key pk . The invention supports the requirement of multi-keyword retrieval, and does not use the keyword field as auxiliary information.Description
技术领域 technical field
本发明涉及计算机信息安全领域,更具体地说,本发明涉及一种公钥加密系统中析取范式的查询方法。The present invention relates to the field of computer information security, more specifically, the present invention relates to a query method of disjunctive paradigm in a public key encryption system.
背景技术 Background technique
公钥系统是这样一个系统:密钥是由信息的接收者成对生成的,每对密钥由一个公钥和一个私钥组成,公钥为公开的,而私钥由接收者自己秘密保存。任何发送者可以用公钥加密信息并发送给接收者,而此加密信息只能由拥有对应私钥的接收者才能解密。析取范式关键词查询是为了检测一个文档的关键词列表中是否包含至少一个用户想要查询的关键词。假设文档关键词列表中的关键词集合为A,用户想要查询的关键词为B,那么析取范式关键词查询就是为了查询那些A∪B≠Θ的文档。此处,Θ代表空集。A public key system is a system in which keys are generated in pairs by recipients of information, each pair of keys consists of a public key and a private key, the public key is public, and the private key is kept secret by the recipient . Any sender can encrypt information with the public key and send it to the receiver, and the encrypted information can only be decrypted by the receiver who has the corresponding private key. The disjunctive normal form keyword query is to detect whether the keyword list of a document contains at least one keyword that the user wants to query. Assuming that the keyword set in the document keyword list is A, and the keyword that the user wants to query is B, then the disjunctive paradigm keyword query is to query those documents where A∪B≠Θ. Here, Θ represents the empty set.
现有的在密文上支持析取范式关键词查询使用内积的方法。该方法通过把关键词集合A映射成一组向量X,把关键词集合B映射成V,然后在不解密的情况下通过计算X·V是否为0来判断A∪B是否为空集。通过此方法,来达到在不解密的情况下进行密文上的析取范式关键词查询。The existing methods that support disjunctive normal form keyword query using inner product on ciphertext. This method maps the keyword set A into a set of vectors X, maps the keyword set B into V, and then judges whether A∪B is an empty set by calculating whether X·V is 0 without decryption. Through this method, the keyword query in the disjunctive normal form on the ciphertext can be achieved without decryption.
通过使用以上的方法,虽然能解决析取范式关键词查询,但是由于将关键词映射到一组向量上,会引起系统空间和时间复杂度的指数型上升。By using the above method, although the keyword query in the disjunctive paradigm can be solved, the system space and time complexity will increase exponentially due to the mapping of keywords to a set of vectors.
发明内容Contents of the invention
本发明的目的在于提供一种公钥加密系统中析取范式的查询方法,其能够建立一个关键词域无关的公钥密钥体制下的进行析取关键词查询体系和方法。The purpose of the present invention is to provide a query method for extracting paradigms in a public key encryption system, which can establish a query system and method for extracting keywords under a public key system that is independent of the keyword domain.
一种公钥加密系统中析取范式的查询方法,包括以下步骤:A method for querying a disjunctive paradigm in a public key encryption system, comprising the following steps:
(1)随机选取安全参数,并选择2n+3个随机数α0,α1,...,αn,β0,β1,...,βn,其中n为整数,q为素数,Zq *是在q上的乘法群;(1) Randomly select security parameters, and select 2n+3 random numbers α 0 , α 1 , ..., α n , β 0 , β 1 , ..., β n , Wherein n is an integer, q is a prime number, and Z q * is a multiplicative group on q;
(2)根据以下公式对安全参数和随机数进行计算,以得到公共密钥pk和秘密密钥sk:(2) Calculate the security parameters and random numbers according to the following formula to obtain the public key pk and secret key sk:
(3)对公共密钥pk和一组关键词集合W={W1,W2,...,Wn}进行计算,以得到索引Iw,并对秘密密钥sk和另一组关键词集合Q={Q1,Q2,...,Qm}进行计算,以得到陷门TQ,具体包括以下子步骤:(3) Calculate the public key pk and a set of keywords W={W 1 , W 2 ,...,W n } to obtain the index I w , and calculate the secret key sk and another set of keys The word set Q={Q 1 , Q 2 ,..., Q m } is calculated to obtain the trapdoor T Q , which specifically includes the following sub-steps:
(31)选择n2+2n个随机数r1,r2,...,rn和其中i∈[1,n],j∈[0,n];(31) Select n 2 +2n random numbers r 1 , r 2 ,..., r n and where i ∈ [1, n], j ∈ [0, n];
(32)对于每个Wi∈W,计算
(33)根据以上公式得到索引Iw:(33) Obtain the index I w according to the above formula:
(34)选择s-m个随机关键词{w1,w2,...,ws-m},其中m≤s≤n;(34) Select sm random keywords {w 1 , w 2 , ..., w sm }, where m≤s≤n;
(35)构建一个s阶多项式f(x)=asxs+as-1xs-1+...+a1x1+a0,f(x)具有s个根为H1(Q1),H1(Q2),...H1(Qm),H1(w1),H1(w2),...,H1(ws-m);(35) Construct an s-order polynomial f(x)=a s x s +a s-1 x s-1 +...+a 1 x 1 +a 0 , f(x) has s roots as H 1 (Q 1 ), H 1 (Q 2 ), ... H 1 (Q m ), H 1 (w 1 ), H 1 (w 2 ), ..., H 1 (w sm );
(36)选择一个随机数u∈Zq,计算出
其中j∈[0,s],并令T3=u,Zq是在q上的整数群;where j∈[0,s], and let T 3 =u, Z q is the integer group on q;
(37)根据以上公式得到陷门为TQ=(T10,...,T1s,T20,...,T2s,T3);(37) According to the above formula, the trapdoor is T Q = (T 10 ,..., T 1s , T 20 ,..., T 2s , T 3 );
(4)根据索引Iw、陷门TQ和公共密钥pk确定关键词集合W={W1,W2,...,Wn}是否与关键词集合Q={Q1,Q2,...,Qm}匹配,具体包括子步骤:(4) Determine whether the keyword set W={W 1 , W 2 ,...,W n } is consistent with the keyword set Q={Q 1 , Q 2 according to the index I w , the trapdoor T Q and the public key pk ,...,Q m } match, specifically including sub-steps:
(41)设置计数器v=0;(41) setting counter v=0;
(42)判断v不大于n;(42) judging that v is not greater than n;
(43)若v不大于n,则检查以下等式是否成立:
(44)若等式成立,则表示二者匹配,并输出1。(44) If the equation is established, it means that the two match, and
上述步骤(4)进一步包括:若v大于n,则表示二者不匹配,并输出0。The above step (4) further includes: if v is greater than n, it means that the two do not match, and 0 is output.
上述步骤(4)进一步包括:若等式不成立,则设置v=v+1,并返回步骤(42)。The above step (4) further includes: if the equation is not established, then set v=v+1, and return to step (42).
本发明具有以下优点:The present invention has the following advantages:
1.本发明支持多关键词检索的需求;1. The present invention supports the requirement of multi-keyword retrieval;
2.本发明可以不利用关键词域作为辅助信息;2. The present invention may not use the keyword field as auxiliary information;
3.本发明空间和时间复杂度为O(n2)。这里n为一个文档的关键词列表中关键词的个数。3. The space and time complexity of the present invention is O(n 2 ). Here n is the number of keywords in the keyword list of a document.
附图说明 Description of drawings
图1是本发明公钥加密系统中析取范式的查询方法的流程图。Fig. 1 is a flow chart of the query method of the disjunctive paradigm in the public key encryption system of the present invention.
图2是本发明查询方法中步骤(3)的细化流程图。Fig. 2 is a detailed flowchart of step (3) in the query method of the present invention.
图3是本发明查询方法中步骤(4)的细化流程图。Fig. 3 is a detailed flowchart of step (4) in the query method of the present invention.
具体实施方式 Detailed ways
以下结合附图对本发明进行具体描述。The present invention will be specifically described below in conjunction with the accompanying drawings.
如图1所示,本发明公钥加密系统中析取范式的查询方法包括以下步骤:As shown in Figure 1, the query method of the disjunction paradigm in the public key encryption system of the present invention comprises the following steps:
(1)随机选取安全参数,并选择2n+3个随机数α0,α1,...,αn,β0,β1,...,βn,其中n为整数,q为素数,Zq *是在q上的乘法群;(1) Randomly select security parameters, and select 2n+3 random numbers α 0 , α 1 , ..., α n , β 0 , β 1 , ..., β n , Wherein n is an integer, q is a prime number, and Z q * is a multiplicative group on q;
(2)根据以下公式对安全参数和随机数进行计算,以得到公共密钥pk和秘密密钥sk:(2) Calculate the security parameters and random numbers according to the following formula to obtain the public key pk and secret key sk:
(3)对公共密钥pk和一组关键词集合W={W1,W2,...,Wn}进行计算,以得到索引Iw,并对秘密密钥sk和另一组关键词集合Q={Q1,Q2,...,Qm}进行计算,以得到陷门TQ;(3) Calculate the public key pk and a set of keywords W={W 1 , W 2 ,...,W n } to obtain the index I w , and calculate the secret key sk and another set of keys Word set Q={Q 1 , Q 2 ,..., Q m } is calculated to obtain trapdoor T Q ;
(4)根据索引Iw、陷门TQ和公共密钥pk确定关键词集合W={W1,W2,...,Wn}是否与关键词集合Q={Q1,Q2,...,Qm}匹配。(4) Determine whether the keyword set W={W 1 , W 2 ,...,W n } is consistent with the keyword set Q={Q 1 , Q 2 according to the index I w , the trapdoor T Q and the public key pk ,...,Q m } matches.
如图2所示,上述步骤(3)包括以下子步骤:As shown in Figure 2, above-mentioned step (3) comprises following sub-step:
(31)选择n2+2n个随机数r1,r2,...,rn和其中i∈[1,n],j∈[0,n];(31) Select n 2 +2n random numbers r 1 , r 2 ,..., r n and where i ∈ [1, n], j ∈ [0, n];
(32)对于每个Wi∈W,计算
(33)根据以上公式得到索引Iw:(33) Obtain the index I w according to the above formula:
(34)选择s-m个随机关键词{w1,w2,...,ws-m},其中m≤s≤n;(34) Select sm random keywords {w 1 , w 2 , ..., w sm }, where m≤s≤n;
(35)构建一个s阶多项式f(x)=asxs+as-1xs-1+...+a1x1+a0,f(x)具有s个根为H1(Q1),H1(Q2),...H1(Qm),H1(w1),H1(w2),...,H1(ws-m);(35) Construct an s-order polynomial f(x)=a s x s +a s-1 x s-1 +...+a 1 x 1 +a 0 , f(x) has s roots as H 1 (Q 1 ), H 1 (Q 2 ), ... H 1 (Q m ), H 1 (w 1 ), H 1 (w 2 ), ..., H 1 (w sm );
(36)选择一个随机数u∈Zq,计算出
(37)根据以上公式得到陷门为TQ=(T10,...,T1s,T20,...,T2s,T3)。如图3所示,上述步骤(4)包括以下子步骤:(37) According to the above formula, the trapdoor is obtained as T Q = (T 10 , . . . , T 1s , T 20 , . . . , T 2s , T 3 ). As shown in Figure 3, above-mentioned step (4) comprises following sub-step:
(41)设置计数器v=0;(41) setting counter v=0;
(42)判断v不大于n,若v不大于n,则转入步骤(43),否则转入步骤(46);(42) Judging that v is not greater than n, if v is not greater than n, then proceed to step (43), otherwise proceed to step (46);
(43)检查以下等式是否成立:
(44)表示二者匹配,并输出1;(44) represent that both match, and
(45)设置v=v+1,并返回步骤(42);(45) set v=
(46)表示二者不匹配,并输出0。(46) indicates that the two do not match, and outputs 0.
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201110350085 CN102385627B (en) | 2011-11-08 | 2011-11-08 | Query method of disjunctive normal form in public key encryption system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201110350085 CN102385627B (en) | 2011-11-08 | 2011-11-08 | Query method of disjunctive normal form in public key encryption system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102385627A CN102385627A (en) | 2012-03-21 |
CN102385627B true CN102385627B (en) | 2013-07-24 |
Family
ID=45825043
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 201110350085 Expired - Fee Related CN102385627B (en) | 2011-11-08 | 2011-11-08 | Query method of disjunctive normal form in public key encryption system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102385627B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105099693B (en) * | 2014-05-23 | 2018-10-19 | 华为技术有限公司 | A kind of transmission method and transmitting device |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101694672A (en) * | 2009-10-16 | 2010-04-14 | 华中科技大学 | Distributed safe retrieval system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7558970B2 (en) * | 2004-01-23 | 2009-07-07 | At&T Corp. | Privacy-enhanced searches using encryption |
-
2011
- 2011-11-08 CN CN 201110350085 patent/CN102385627B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101694672A (en) * | 2009-10-16 | 2010-04-14 | 华中科技大学 | Distributed safe retrieval system |
Non-Patent Citations (2)
Title |
---|
一种基于"陷门收缩"原理的公钥算法;胡坤华;《武汉科技学院学报》;20041231;第17卷(第8期);第77-79页 * |
胡坤华.一种基于"陷门收缩"原理的公钥算法.《武汉科技学院学报》.2004,第17卷(第8期),第77-79页. |
Also Published As
Publication number | Publication date |
---|---|
CN102385627A (en) | 2012-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shao et al. | Proxy re-encryption with keyword search | |
Fang et al. | Public key encryption with keyword search secure against keyword guessing attacks without random oracle | |
Wang et al. | Further observation on proxy re-encryption with keyword search | |
CN105262843A (en) | Data anti-leakage protection method for cloud storage environment | |
CN105282167A (en) | Searchable certificateless public key encryption method | |
JP2014126865A (en) | Device and method for encryption processing | |
US20130268750A1 (en) | Encoded database management system, client and server, natural joining method and program | |
CN106407822A (en) | Keyword or multi-keyword based searchable encryption method and system | |
CN104052740A (en) | Verifiable dictionary-based searchable encryption method in cloud storage | |
CN105635135A (en) | Encryption system based on attribute sets and relational predicates and access control method | |
CN104967693A (en) | Document similarity calculation method facing cloud storage based on fully homomorphic password technology | |
CN105007161A (en) | Fuzzy keyword public key searchable encryption scheme achieving unrecognizable trap door | |
CN101859306B (en) | Method and equipment for generating blind index table, and united keyword search method and equipment | |
Li et al. | A biometric identity-based signcryption scheme | |
Lee et al. | Public key encryption with equality test from generic assumptions in the random oracle model | |
Zhang et al. | Secure and efficient searchable public key encryption for resource constrained environment based on pairings under prime order group | |
KR101217491B1 (en) | A method for searching keyword based on public key | |
Park et al. | Fully secure hidden vector encryption under standard assumptions | |
WO2014030706A1 (en) | Encrypted database system, client device and server, method and program for adding encrypted data | |
Yang et al. | Semantic searchable encryption scheme based on lattice in quantum-era | |
Lim et al. | A short redactable signature scheme using pairing | |
US20170359177A1 (en) | Method and System for Cryptographic Decision-making of Set Membership | |
CN106301776A (en) | Many authorization center outsourcing attribute base encryption method of a kind of keyword search and system | |
CN104980271A (en) | Multiplication operation method and system in cloud computing and based on Batch RSA | |
CN102385627B (en) | Query method of disjunctive normal form in public key encryption system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20130724 Termination date: 20141108 |
|
EXPY | Termination of patent right or utility model |