[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN102385627B - Query method of disjunctive normal form in public key encryption system - Google Patents

Query method of disjunctive normal form in public key encryption system Download PDF

Info

Publication number
CN102385627B
CN102385627B CN 201110350085 CN201110350085A CN102385627B CN 102385627 B CN102385627 B CN 102385627B CN 201110350085 CN201110350085 CN 201110350085 CN 201110350085 A CN201110350085 A CN 201110350085A CN 102385627 B CN102385627 B CN 102385627B
Authority
CN
China
Prior art keywords
center dot
centerdot
beta
dot
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 201110350085
Other languages
Chinese (zh)
Other versions
CN102385627A (en
Inventor
路松峰
张钰
赵友桥
刘阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN 201110350085 priority Critical patent/CN102385627B/en
Publication of CN102385627A publication Critical patent/CN102385627A/en
Application granted granted Critical
Publication of CN102385627B publication Critical patent/CN102385627B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本发明公开了一种公钥加密系统中析取范式的查询方法,包括步骤:(1)随机选取安全参数,并选择2n+3个随机数α0,α1,...,αn,β0,β1,...,βn

Figure DDA0000106452900000011
其中n为整数;(2)对安全参数和随机数进行计算,以得到公共密钥pk和秘密密钥sk:(3)对公共密钥pk和一组关键词集合进行计算,以得到索引Iw,并对秘密密钥sk和另一组关键词集合进行计算,以得到陷门TQ;(4)根据索引Iw、陷门TQ和公共密钥pk确定两组关键词集合是否匹配。本发明支持多关键词检索的需求,并可不利用关键词域作为辅助信息。

Figure 201110350085

The invention discloses a query method of a disjunctive paradigm in a public key encryption system, comprising the steps of: (1) randomly selecting security parameters, and selecting 2n+3 random numbers α 0 , α 1 ,..., α n , β 0 , β 1 ,..., β n ,

Figure DDA0000106452900000011
where n is an integer; (2) calculate the security parameters and random numbers to obtain the public key pk and secret key sk; (3) calculate the public key pk and a set of keywords to obtain the index I w , and calculate the secret key sk and another set of keywords to obtain the trapdoor T Q ; (4) Determine whether the two sets of keywords match according to the index I w , the trapdoor T Q and the public key pk . The invention supports the requirement of multi-keyword retrieval, and does not use the keyword field as auxiliary information.

Figure 201110350085

Description

公钥加密系统中析取范式的查询方法Query Method of Disjunctive Normal Form in Public Key Encryption System

技术领域 technical field

本发明涉及计算机信息安全领域,更具体地说,本发明涉及一种公钥加密系统中析取范式的查询方法。The present invention relates to the field of computer information security, more specifically, the present invention relates to a query method of disjunctive paradigm in a public key encryption system.

背景技术 Background technique

公钥系统是这样一个系统:密钥是由信息的接收者成对生成的,每对密钥由一个公钥和一个私钥组成,公钥为公开的,而私钥由接收者自己秘密保存。任何发送者可以用公钥加密信息并发送给接收者,而此加密信息只能由拥有对应私钥的接收者才能解密。析取范式关键词查询是为了检测一个文档的关键词列表中是否包含至少一个用户想要查询的关键词。假设文档关键词列表中的关键词集合为A,用户想要查询的关键词为B,那么析取范式关键词查询就是为了查询那些A∪B≠Θ的文档。此处,Θ代表空集。A public key system is a system in which keys are generated in pairs by recipients of information, each pair of keys consists of a public key and a private key, the public key is public, and the private key is kept secret by the recipient . Any sender can encrypt information with the public key and send it to the receiver, and the encrypted information can only be decrypted by the receiver who has the corresponding private key. The disjunctive normal form keyword query is to detect whether the keyword list of a document contains at least one keyword that the user wants to query. Assuming that the keyword set in the document keyword list is A, and the keyword that the user wants to query is B, then the disjunctive paradigm keyword query is to query those documents where A∪B≠Θ. Here, Θ represents the empty set.

现有的在密文上支持析取范式关键词查询使用内积的方法。该方法通过把关键词集合A映射成一组向量X,把关键词集合B映射成V,然后在不解密的情况下通过计算X·V是否为0来判断A∪B是否为空集。通过此方法,来达到在不解密的情况下进行密文上的析取范式关键词查询。The existing methods that support disjunctive normal form keyword query using inner product on ciphertext. This method maps the keyword set A into a set of vectors X, maps the keyword set B into V, and then judges whether A∪B is an empty set by calculating whether X·V is 0 without decryption. Through this method, the keyword query in the disjunctive normal form on the ciphertext can be achieved without decryption.

通过使用以上的方法,虽然能解决析取范式关键词查询,但是由于将关键词映射到一组向量上,会引起系统空间和时间复杂度的指数型上升。By using the above method, although the keyword query in the disjunctive paradigm can be solved, the system space and time complexity will increase exponentially due to the mapping of keywords to a set of vectors.

发明内容Contents of the invention

本发明的目的在于提供一种公钥加密系统中析取范式的查询方法,其能够建立一个关键词域无关的公钥密钥体制下的进行析取关键词查询体系和方法。The purpose of the present invention is to provide a query method for extracting paradigms in a public key encryption system, which can establish a query system and method for extracting keywords under a public key system that is independent of the keyword domain.

一种公钥加密系统中析取范式的查询方法,包括以下步骤:A method for querying a disjunctive paradigm in a public key encryption system, comprising the following steps:

(1)随机选取安全参数,并选择2n+3个随机数α0,α1,...,αn,β0,β1,...,βn

Figure BDA0000106452880000021
其中n为整数,q为素数,Zq *是在q上的乘法群;(1) Randomly select security parameters, and select 2n+3 random numbers α 0 , α 1 , ..., α n , β 0 , β 1 , ..., β n ,
Figure BDA0000106452880000021
Wherein n is an integer, q is a prime number, and Z q * is a multiplicative group on q;

(2)根据以下公式对安全参数和随机数进行计算,以得到公共密钥pk和秘密密钥sk:(2) Calculate the security parameters and random numbers according to the following formula to obtain the public key pk and secret key sk:

pk = { X 0 = g α 0 , X 1 = g α 1 , . . . , X n = g α n , Y 0 = g β 0 , Y 1 = g β 1 , . . . , Y n = g β n , Z = g θ , μ = e ^ ( g , g ) } , sk = { α 0 , α 1 , . . . , α n , β 0 , β 1 , . . . , β n , θ ∈ Z q * } , 其中G1,G2为两个循环群,q是循环群的阶数且为素数,g为G1的任一生成元,

Figure BDA0000106452880000024
为双线性配对函数,且 e ^ : G 1 × G 1 → G 2 ; pk = { x 0 = g α 0 , x 1 = g α 1 , . . . , x no = g α no , Y 0 = g β 0 , Y 1 = g β 1 , . . . , Y no = g β no , Z = g θ , μ = e ^ ( g , g ) } , sk = { α 0 , α 1 , . . . , α no , β 0 , β 1 , . . . , β no , θ ∈ Z q * } , Among them, G 1 and G 2 are two cyclic groups, q is the order of the cyclic group and is a prime number, g is any generator of G 1 ,
Figure BDA0000106452880000024
is a bilinear pairing function, and e ^ : G 1 × G 1 &Right Arrow; G 2 ;

(3)对公共密钥pk和一组关键词集合W={W1,W2,...,Wn}进行计算,以得到索引Iw,并对秘密密钥sk和另一组关键词集合Q={Q1,Q2,...,Qm}进行计算,以得到陷门TQ,具体包括以下子步骤:(3) Calculate the public key pk and a set of keywords W={W 1 , W 2 ,...,W n } to obtain the index I w , and calculate the secret key sk and another set of keys The word set Q={Q 1 , Q 2 ,..., Q m } is calculated to obtain the trapdoor T Q , which specifically includes the following sub-steps:

(31)选择n2+2n个随机数r1,r2,...,rn

Figure BDA0000106452880000026
其中i∈[1,n],j∈[0,n];(31) Select n 2 +2n random numbers r 1 , r 2 ,..., r n and
Figure BDA0000106452880000026
where i ∈ [1, n], j ∈ [0, n];

(32)对于每个Wi∈W,计算 A ij = X j r i × g r i H 1 ( W i ) j + u ij = g r i ( α j + H 1 ( W i ) j ) + u ij , B ij = Y j u ij = g β j u ij , C i = Z r i = g θ r i , D i = H 2 ( μ r i ) , 其中i∈[1,n],

Figure BDA00001064528800000211
H 1 : { 0,1 } * → { 0,1 } log 2 q H 2 : G 2 → { 0,1 } log 2 q 为两个哈希函数;(32) For each W i ∈ W, calculate A ij = x j r i × g r i h 1 ( W i ) j + u ij = g r i ( α j + h 1 ( W i ) j ) + u ij , B ij = Y j u ij = g β j u ij , C i = Z r i = g θ r i , D. i = h 2 ( μ r i ) , where i ∈ [1,n],
Figure BDA00001064528800000211
h 1 : { 0,1 } * &Right Arrow; { 0,1 } log 2 q and h 2 : G 2 &Right Arrow; { 0,1 } log 2 q are two hash functions;

(33)根据以上公式得到索引Iw(33) Obtain the index I w according to the above formula:

II ww == AA 1010 AA 1111 ·· ·&Center Dot; ·&Center Dot; AA 11 nno BB 1010 BB 1111 ·&Center Dot; ·· ·· BB 11 nno CC 11 DD. 11 AA 2020 AA 21twenty one ·· ·· ·&Center Dot; AA 22 nno BB 2020 BB 21twenty one ·&Center Dot; ·· ·&Center Dot; BB 22 nno CC 22 DD. 22 ·&Center Dot; ·· ·· ·&Center Dot; ·· ·· ·· ·· ·&Center Dot; ·&Center Dot; ·&Center Dot; ·· ·· ·· ·&Center Dot; ·&Center Dot; ·&Center Dot; ·&Center Dot; ·&Center Dot; ·· ·&Center Dot; ·&Center Dot; ·· ·&Center Dot; ·· ·· ·· ·· ·&Center Dot; ·&Center Dot; AA nno 00 AA nno 11 ·&Center Dot; ·&Center Dot; ·&Center Dot; AA nnn BB nno 00 BB nno 11 ·· ·· ·&Center Dot; BB nnn CC nno DD. nno

(34)选择s-m个随机关键词{w1,w2,...,ws-m},其中m≤s≤n;(34) Select sm random keywords {w 1 , w 2 , ..., w sm }, where m≤s≤n;

(35)构建一个s阶多项式f(x)=asxs+as-1xs-1+...+a1x1+a0,f(x)具有s个根为H1(Q1),H1(Q2),...H1(Qm),H1(w1),H1(w2),...,H1(ws-m);(35) Construct an s-order polynomial f(x)=a s x s +a s-1 x s-1 +...+a 1 x 1 +a 0 , f(x) has s roots as H 1 (Q 1 ), H 1 (Q 2 ), ... H 1 (Q m ), H 1 (w 1 ), H 1 (w 2 ), ..., H 1 (w sm );

(36)选择一个随机数u∈Zq,计算出 T 1 j = g a j Σ j = 0 s a j a j + Σ j = 0 s a j uθ , T 2 j = T 1 j 1 β j , (36) Choose a random number u∈Z q , calculate T 1 j = g a j Σ j = 0 the s a j a j + Σ j = 0 the s a j uθ , T 2 j = T 1 j 1 β j ,

其中j∈[0,s],并令T3=u,Zq是在q上的整数群;where j∈[0,s], and let T 3 =u, Z q is the integer group on q;

(37)根据以上公式得到陷门为TQ=(T10,...,T1s,T20,...,T2s,T3);(37) According to the above formula, the trapdoor is T Q = (T 10 ,..., T 1s , T 20 ,..., T 2s , T 3 );

(4)根据索引Iw、陷门TQ和公共密钥pk确定关键词集合W={W1,W2,...,Wn}是否与关键词集合Q={Q1,Q2,...,Qm}匹配,具体包括子步骤:(4) Determine whether the keyword set W={W 1 , W 2 ,...,W n } is consistent with the keyword set Q={Q 1 , Q 2 according to the index I w , the trapdoor T Q and the public key pk ,...,Q m } match, specifically including sub-steps:

(41)设置计数器v=0;(41) setting counter v=0;

(42)判断v不大于n;(42) judging that v is not greater than n;

(43)若v不大于n,则检查以下等式是否成立: H 2 ( test i 1 test i 2 ) = D i , 其中i∈[1,n], test i 1 = Π j = 0 s e ^ ( T 1 j , A ij C i T 3 ) , test i 2 = Π j = 0 s e ^ ( T 2 j , B ij ) ; (43) If v is not greater than n, then check whether the following equation holds true: h 2 ( test i 1 test i 2 ) = D. i , where i ∈ [1,n], test i 1 = Π j = 0 the s e ^ ( T 1 j , A ij C i T 3 ) , test i 2 = Π j = 0 the s e ^ ( T 2 j , B ij ) ;

(44)若等式成立,则表示二者匹配,并输出1。(44) If the equation is established, it means that the two match, and output 1.

上述步骤(4)进一步包括:若v大于n,则表示二者不匹配,并输出0。The above step (4) further includes: if v is greater than n, it means that the two do not match, and 0 is output.

上述步骤(4)进一步包括:若等式不成立,则设置v=v+1,并返回步骤(42)。The above step (4) further includes: if the equation is not established, then set v=v+1, and return to step (42).

本发明具有以下优点:The present invention has the following advantages:

1.本发明支持多关键词检索的需求;1. The present invention supports the requirement of multi-keyword retrieval;

2.本发明可以不利用关键词域作为辅助信息;2. The present invention may not use the keyword field as auxiliary information;

3.本发明空间和时间复杂度为O(n2)。这里n为一个文档的关键词列表中关键词的个数。3. The space and time complexity of the present invention is O(n 2 ). Here n is the number of keywords in the keyword list of a document.

附图说明 Description of drawings

图1是本发明公钥加密系统中析取范式的查询方法的流程图。Fig. 1 is a flow chart of the query method of the disjunctive paradigm in the public key encryption system of the present invention.

图2是本发明查询方法中步骤(3)的细化流程图。Fig. 2 is a detailed flowchart of step (3) in the query method of the present invention.

图3是本发明查询方法中步骤(4)的细化流程图。Fig. 3 is a detailed flowchart of step (4) in the query method of the present invention.

具体实施方式 Detailed ways

以下结合附图对本发明进行具体描述。The present invention will be specifically described below in conjunction with the accompanying drawings.

如图1所示,本发明公钥加密系统中析取范式的查询方法包括以下步骤:As shown in Figure 1, the query method of the disjunction paradigm in the public key encryption system of the present invention comprises the following steps:

(1)随机选取安全参数,并选择2n+3个随机数α0,α1,...,αn,β0,β1,...,βn其中n为整数,q为素数,Zq *是在q上的乘法群;(1) Randomly select security parameters, and select 2n+3 random numbers α 0 , α 1 , ..., α n , β 0 , β 1 , ..., β n , Wherein n is an integer, q is a prime number, and Z q * is a multiplicative group on q;

(2)根据以下公式对安全参数和随机数进行计算,以得到公共密钥pk和秘密密钥sk:(2) Calculate the security parameters and random numbers according to the following formula to obtain the public key pk and secret key sk:

pk = { X 0 = g α 0 , X 1 = g α 1 , . . . , X n = g α n , Y 0 = g β 0 , Y 1 = g β 1 , . . . , Y n = g β n , Z = g θ , μ = e ^ ( g , g ) } , sk = { α 0 , α 1 , . . . , α n , β 0 , β 1 , . . . , β n , θ ∈ Z q * } , 其中G1,G2为两个循环群,q是循环群的阶数且为素数,g为G1的任一生成元,

Figure BDA0000106452880000044
为双线性配对函数,且 e ^ : G 1 × G 1 → G 2 ; pk = { x 0 = g α 0 , x 1 = g α 1 , . . . , x no = g α no , Y 0 = g β 0 , Y 1 = g β 1 , . . . , Y no = g β no , Z = g θ , μ = e ^ ( g , g ) } , sk = { α 0 , α 1 , . . . , α no , β 0 , β 1 , . . . , β no , θ ∈ Z q * } , Among them, G 1 and G 2 are two cyclic groups, q is the order of the cyclic group and is a prime number, g is any generator of G 1 ,
Figure BDA0000106452880000044
is a bilinear pairing function, and e ^ : G 1 × G 1 &Right Arrow; G 2 ;

(3)对公共密钥pk和一组关键词集合W={W1,W2,...,Wn}进行计算,以得到索引Iw,并对秘密密钥sk和另一组关键词集合Q={Q1,Q2,...,Qm}进行计算,以得到陷门TQ(3) Calculate the public key pk and a set of keywords W={W 1 , W 2 ,...,W n } to obtain the index I w , and calculate the secret key sk and another set of keys Word set Q={Q 1 , Q 2 ,..., Q m } is calculated to obtain trapdoor T Q ;

(4)根据索引Iw、陷门TQ和公共密钥pk确定关键词集合W={W1,W2,...,Wn}是否与关键词集合Q={Q1,Q2,...,Qm}匹配。(4) Determine whether the keyword set W={W 1 , W 2 ,...,W n } is consistent with the keyword set Q={Q 1 , Q 2 according to the index I w , the trapdoor T Q and the public key pk ,...,Q m } matches.

如图2所示,上述步骤(3)包括以下子步骤:As shown in Figure 2, above-mentioned step (3) comprises following sub-step:

(31)选择n2+2n个随机数r1,r2,...,rn

Figure BDA0000106452880000046
其中i∈[1,n],j∈[0,n];(31) Select n 2 +2n random numbers r 1 , r 2 ,..., r n and
Figure BDA0000106452880000046
where i ∈ [1, n], j ∈ [0, n];

(32)对于每个Wi∈W,计算 A ij = X j r i × g r i H 1 ( W i ) j + u ij = g r i ( α j + H 1 ( W i ) j ) + u ij , B ij = Y j u ij = g β j u ij , C i = Z r i = g θ r i , D i = H 2 ( μ r i ) , 其中i∈[1,n],

Figure BDA0000106452880000049
H 1 : { 0,1 } * → { 0,1 } log 2 q H 2 : G 2 → { 0,1 } log 2 q 为两个哈希函数;(32) For each W i ∈ W, calculate A ij = x j r i × g r i h 1 ( W i ) j + u ij = g r i ( α j + h 1 ( W i ) j ) + u ij , B ij = Y j u ij = g β j u ij , C i = Z r i = g θ r i , D. i = h 2 ( μ r i ) , where i ∈ [1,n],
Figure BDA0000106452880000049
h 1 : { 0,1 } * &Right Arrow; { 0,1 } log 2 q and h 2 : G 2 &Right Arrow; { 0,1 } log 2 q are two hash functions;

(33)根据以上公式得到索引Iw(33) Obtain the index I w according to the above formula:

II ww == AA 1010 AA 1111 ·&Center Dot; ·&Center Dot; ·&Center Dot; AA 11 nno BB 1010 BB 1111 ·&Center Dot; ·&Center Dot; ·· BB 11 nno CC 11 DD. 11 AA 2020 AA 21twenty one ·&Center Dot; ·&Center Dot; ·· AA 22 nno BB 2020 BB 21twenty one ·· ·· ·&Center Dot; BB 22 nno CC 22 DD. 22 ·&Center Dot; ·· ·&Center Dot; ·&Center Dot; ·&Center Dot; ·· ·· ·&Center Dot; ·· ·· ·&Center Dot; ·· ·· ·&Center Dot; ·&Center Dot; ·&Center Dot; ·· ·&Center Dot; ·&Center Dot; ·&Center Dot; ·· ·&Center Dot; ·· ·· ·· ·· ·&Center Dot; ·· ·· ·· AA nno 00 AA nno 11 ·&Center Dot; ·· ·· AA nnn BB nno 00 BB nno 11 ·· ·· ·&Center Dot; BB nnn CC nno DD. nno

(34)选择s-m个随机关键词{w1,w2,...,ws-m},其中m≤s≤n;(34) Select sm random keywords {w 1 , w 2 , ..., w sm }, where m≤s≤n;

(35)构建一个s阶多项式f(x)=asxs+as-1xs-1+...+a1x1+a0,f(x)具有s个根为H1(Q1),H1(Q2),...H1(Qm),H1(w1),H1(w2),...,H1(ws-m);(35) Construct an s-order polynomial f(x)=a s x s +a s-1 x s-1 +...+a 1 x 1 +a 0 , f(x) has s roots as H 1 (Q 1 ), H 1 (Q 2 ), ... H 1 (Q m ), H 1 (w 1 ), H 1 (w 2 ), ..., H 1 (w sm );

(36)选择一个随机数u∈Zq,计算出 T 1 j = g a j Σ j = 0 s a j a j + Σ j = 0 s a j uθ , T 2 j = T 1 j 1 β j , 其中j∈[0,s],并令T3=u,Zq是在q上的整数群;(36) Choose a random number u∈Z q , calculate T 1 j = g a j Σ j = 0 the s a j a j + Σ j = 0 the s a j uθ , T 2 j = T 1 j 1 β j , where j∈[0,s], and let T 3 =u, Z q is the integer group on q;

(37)根据以上公式得到陷门为TQ=(T10,...,T1s,T20,...,T2s,T3)。如图3所示,上述步骤(4)包括以下子步骤:(37) According to the above formula, the trapdoor is obtained as T Q = (T 10 , . . . , T 1s , T 20 , . . . , T 2s , T 3 ). As shown in Figure 3, above-mentioned step (4) comprises following sub-step:

(41)设置计数器v=0;(41) setting counter v=0;

(42)判断v不大于n,若v不大于n,则转入步骤(43),否则转入步骤(46);(42) Judging that v is not greater than n, if v is not greater than n, then proceed to step (43), otherwise proceed to step (46);

(43)检查以下等式是否成立: H 2 ( test i 1 test i 2 ) = D i , 其中i∈[1,n], test i 1 = Π j = 0 s e ^ ( T 1 j , A ij C i T 3 ) , test i 2 = Π j = 0 s e ^ ( T 2 j , B ij ) , w若等式成立,则转入步骤(44),否则转入步骤(45);(43) Check whether the following equation holds: h 2 ( test i 1 test i 2 ) = D. i , where i ∈ [1,n], test i 1 = Π j = 0 the s e ^ ( T 1 j , A ij C i T 3 ) , test i 2 = Π j = 0 the s e ^ ( T 2 j , B ij ) , If w is set up, then proceeds to step (44), otherwise proceeds to step (45);

(44)表示二者匹配,并输出1;(44) represent that both match, and output 1;

(45)设置v=v+1,并返回步骤(42);(45) set v=v+1, and return to step (42);

(46)表示二者不匹配,并输出0。(46) indicates that the two do not match, and outputs 0.

Claims (3)

1.一种公钥加密系统中析取范式的查询方法,包括以下步骤:1. A query method of a disjunctive paradigm in a public key encryption system, comprising the following steps: (1)随机选取安全参数,并选择2n+3个随机数α0,α1,..,αn,β0,β1,...,βn其中n为整数,q为素数,Zq *是在q上的乘法群;(1) Randomly select security parameters, and select 2n+3 random numbers α 0 , α 1 , .., α n , β 0 , β 1 , ..., β n , Wherein n is an integer, q is a prime number, and Z q * is a multiplicative group on q; (2)根据以下公式对所述安全参数和所述随机数进行计算,以得到公共密钥pk和秘密密钥sk:(2) According to the following formula, the security parameter and the random number are calculated to obtain the public key pk and the secret key sk: pkpk == {{ Xx 00 == gg αα 00 ,, Xx 11 == gg αα 11 ,, .. .. .. ,, Xx nno == gg αα nno ,, YY 00 == gg ββ 00 ,, YY 11 == gg ββ 11 ,, .. .. .. ,, YY nno == gg ββ nno ,, ,, ZZ == gg θθ ,, μμ == ee ^^ (( gg ,, gg )) }} sk = { α 0 , α 1 , . . . , α n , β 0 , β 1 , . . . , β n , θ ∈ Z q * } , 其中G1,G2为两个循环群,q是所述循环群的阶数且为素数,g为G1的任一生成元,
Figure FDA0000106452870000014
为双线性配对函数,且 e ^ : G 1 × G 1 → G 2 ;
sk = { α 0 , α 1 , . . . , α no , β 0 , β 1 , . . . , β no , θ ∈ Z q * } , Where G 1 and G 2 are two cyclic groups, q is the order of the cyclic group and is a prime number, g is any generator of G 1 ,
Figure FDA0000106452870000014
is a bilinear pairing function, and e ^ : G 1 × G 1 &Right Arrow; G 2 ;
(3)对所述公共密钥pk和一组关键词集合W={W1,W2,...,Wn}进行计算,以得到索引Iw,并对所述秘密密钥sk和另一组关键词集合Q={Q1,Q2,...,Qm}进行计算,以得到陷门TQ,具体包括以下子步骤:(3) Calculate the public key pk and a set of keywords W={W 1 , W 2 ,...,W n } to obtain the index I w , and calculate the secret key sk and Another set of keywords set Q={Q 1 , Q 2 ,...,Q m } is calculated to obtain the trapdoor T Q , which specifically includes the following sub-steps: (31)选择n2+2n个随机数r1,r2,...,rn
Figure FDA0000106452870000016
其中i∈[1,n],j∈[0,n];
(31) Select n 2 +2n random numbers r 1 , r 2 ,..., r n and
Figure FDA0000106452870000016
where i ∈ [1, n], j ∈ [0, n];
(32)对于每个Wi∈W,计算 A ij = X j r i × g r i H 1 ( W i ) j + u ij = g r i ( α j + H 1 ( W i ) j ) + u ij , B ij = Y j u ij = g β j u ij , C i = Z r i = g θ r i , D i = H 2 ( μ r i ) , 其中i∈[1,n],j∈[0,n], H 1 : { 0,1 } * → { 0,1 } log 2 q H 2 : G 2 → { 0,1 } log 2 q 为两个哈希函数;(32) For each W i ∈ W, calculate A ij = x j r i × g r i h 1 ( W i ) j + u ij = g r i ( α j + h 1 ( W i ) j ) + u ij , B ij = Y j u ij = g β j u ij , C i = Z r i = g θ r i , D. i = h 2 ( μ r i ) , where i ∈ [1, n], j ∈ [0, n], h 1 : { 0,1 } * &Right Arrow; { 0,1 } log 2 q and h 2 : G 2 &Right Arrow; { 0,1 } log 2 q are two hash functions; (33)根据以上公式得到所述索引Iw(33) Obtain the index I w according to the above formula: II ww == AA 1010 AA 1111 ·· ·· ·· AA 11 nno BB 1010 BB 1111 ·· ·· ·· BB 11 nno CC 11 DD. 11 AA 2020 AA 21twenty one ·&Center Dot; ·&Center Dot; ·&Center Dot; AA 22 nno BB 2020 BB 21twenty one ·· ·&Center Dot; ·&Center Dot; BB 22 nno CC 22 DD. 22 ·&Center Dot; ·&Center Dot; ·· ·&Center Dot; ·&Center Dot; ·&Center Dot; ·&Center Dot; ·&Center Dot; ·· ·&Center Dot; ·· ·&Center Dot; ·&Center Dot; ·&Center Dot; ·&Center Dot; ·&Center Dot; ·&Center Dot; ·&Center Dot; ·· ·· ·&Center Dot; ·&Center Dot; ·&Center Dot; ·&Center Dot; ·· ·· ·&Center Dot; ·&Center Dot; ·· ·&Center Dot; AA nno 00 AA nno 11 ·&Center Dot; ·&Center Dot; ·&Center Dot; AA nnn BB nno 00 BB nno 11 ·&Center Dot; ·&Center Dot; ·&Center Dot; BB nnn CC nno DD. nno (34)选择s-m个随机关键词{w1,w2,...,ws-m},其中m≤s≤n;(34) Select sm random keywords {w 1 , w 2 , ..., w sm }, where m≤s≤n; (35)构建一个s阶多项式f(x)=asxs+as-1xs-1+...+a1x1+a0,f(x)具有s个根为H1(Q1),H1(Q2),...H1(Qm),H1(w1),H1(w2),...,H1(ws-m);(35) Construct an s-order polynomial f(x)=a s x s +a s-1 x s-1 +...+a 1 x 1 +a 0 , f(x) has s roots as H 1 (Q 1 ), H 1 (Q 2 ), ... H 1 (Q m ), H 1 (w 1 ), H 1 (w 2 ), ..., H 1 (w sm ); (36)选择一个随机数u∈Zq,计算出 T 1 j = g a j Σ j = 0 s a j a j + Σ j = 0 s a j uθ , T 2 j = T 1 j 1 β j , (36) Choose a random number u∈Z q , calculate T 1 j = g a j Σ j = 0 the s a j a j + Σ j = 0 the s a j uθ , T 2 j = T 1 j 1 β j , 其中j∈[0,s],并T3=u,Zq是在q上的整数群;where j∈[0,s], and T 3 =u, Z q is the integer group on q; (37)根据以上公式得到所述陷门为TQ=(T10,...,T1s,T20,...,T2s,T3);(37) According to the above formula, the trapdoor is T Q = (T 10 , ..., T 1s , T 20 , ..., T 2s , T 3 ); (4)根据所述索引Iw、所述陷门TQ和所述公共密钥pk确定关键词集合W={W1,W2,...,Wn}是否与关键词集合Q={Q1,Q2,...,Qm}匹配,具体包括子步骤:(4) According to the index I w , the trapdoor T Q and the public key pk, determine whether the keyword set W={W 1 , W 2 ,...,W n } is the same as the keyword set Q= {Q 1 , Q 2 , ..., Q m } match, specifically including sub-steps: (41)设置计数器v=0;(41) setting counter v=0; (42)判断v不大于n;(42) judging that v is not greater than n; (43)若v不大于n,则检查以下等式是否成立: H 2 ( test i 1 test i 2 ) = D i , 其中i∈[1,n], test i 1 = Π j = 0 s e ^ ( T 1 j , A ij C i T 3 ) , test i 2 = Π j = 0 s e ^ ( T 2 j , B ij ) ; (43) If v is not greater than n, then check whether the following equation holds true: h 2 ( test i 1 test i 2 ) = D. i , where i ∈ [1,n], test i 1 = Π j = 0 the s e ^ ( T 1 j , A ij C i T 3 ) , test i 2 = Π j = 0 the s e ^ ( T 2 j , B ij ) ; (44)若等式成立,则表示二者匹配,并输出1。(44) If the equation is established, it means that the two match, and output 1.
2.根据权利要求1所述的查询方法,其特征在于,所述步骤(4)进一步包括:若v大于n,则表示二者不匹配,并输出0。2. The query method according to claim 1, wherein the step (4) further comprises: if v is greater than n, it means that the two do not match, and 0 is output. 3.根据权利要求1所述的查询方法,其特征在于,所述步骤(4)进一步包括:若等式不成立,则设置v=v+1,并返回所述步骤(42)。3. The inquiry method according to claim 1, characterized in that said step (4) further comprises: if the equation is not established, then setting v=v+1, and returning to said step (42).
CN 201110350085 2011-11-08 2011-11-08 Query method of disjunctive normal form in public key encryption system Expired - Fee Related CN102385627B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110350085 CN102385627B (en) 2011-11-08 2011-11-08 Query method of disjunctive normal form in public key encryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110350085 CN102385627B (en) 2011-11-08 2011-11-08 Query method of disjunctive normal form in public key encryption system

Publications (2)

Publication Number Publication Date
CN102385627A CN102385627A (en) 2012-03-21
CN102385627B true CN102385627B (en) 2013-07-24

Family

ID=45825043

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110350085 Expired - Fee Related CN102385627B (en) 2011-11-08 2011-11-08 Query method of disjunctive normal form in public key encryption system

Country Status (1)

Country Link
CN (1) CN102385627B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105099693B (en) * 2014-05-23 2018-10-19 华为技术有限公司 A kind of transmission method and transmitting device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101694672A (en) * 2009-10-16 2010-04-14 华中科技大学 Distributed safe retrieval system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7558970B2 (en) * 2004-01-23 2009-07-07 At&T Corp. Privacy-enhanced searches using encryption

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101694672A (en) * 2009-10-16 2010-04-14 华中科技大学 Distributed safe retrieval system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种基于"陷门收缩"原理的公钥算法;胡坤华;《武汉科技学院学报》;20041231;第17卷(第8期);第77-79页 *
胡坤华.一种基于"陷门收缩"原理的公钥算法.《武汉科技学院学报》.2004,第17卷(第8期),第77-79页.

Also Published As

Publication number Publication date
CN102385627A (en) 2012-03-21

Similar Documents

Publication Publication Date Title
Shao et al. Proxy re-encryption with keyword search
Fang et al. Public key encryption with keyword search secure against keyword guessing attacks without random oracle
Wang et al. Further observation on proxy re-encryption with keyword search
CN105262843A (en) Data anti-leakage protection method for cloud storage environment
CN105282167A (en) Searchable certificateless public key encryption method
JP2014126865A (en) Device and method for encryption processing
US20130268750A1 (en) Encoded database management system, client and server, natural joining method and program
CN106407822A (en) Keyword or multi-keyword based searchable encryption method and system
CN104052740A (en) Verifiable dictionary-based searchable encryption method in cloud storage
CN105635135A (en) Encryption system based on attribute sets and relational predicates and access control method
CN104967693A (en) Document similarity calculation method facing cloud storage based on fully homomorphic password technology
CN105007161A (en) Fuzzy keyword public key searchable encryption scheme achieving unrecognizable trap door
CN101859306B (en) Method and equipment for generating blind index table, and united keyword search method and equipment
Li et al. A biometric identity-based signcryption scheme
Lee et al. Public key encryption with equality test from generic assumptions in the random oracle model
Zhang et al. Secure and efficient searchable public key encryption for resource constrained environment based on pairings under prime order group
KR101217491B1 (en) A method for searching keyword based on public key
Park et al. Fully secure hidden vector encryption under standard assumptions
WO2014030706A1 (en) Encrypted database system, client device and server, method and program for adding encrypted data
Yang et al. Semantic searchable encryption scheme based on lattice in quantum-era
Lim et al. A short redactable signature scheme using pairing
US20170359177A1 (en) Method and System for Cryptographic Decision-making of Set Membership
CN106301776A (en) Many authorization center outsourcing attribute base encryption method of a kind of keyword search and system
CN104980271A (en) Multiplication operation method and system in cloud computing and based on Batch RSA
CN102385627B (en) Query method of disjunctive normal form in public key encryption system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130724

Termination date: 20141108

EXPY Termination of patent right or utility model