CN103023637A - Encryption and search method for revocable keyword search public keys in cloud storage - Google Patents
Encryption and search method for revocable keyword search public keys in cloud storage Download PDFInfo
- Publication number
- CN103023637A CN103023637A CN2012105679908A CN201210567990A CN103023637A CN 103023637 A CN103023637 A CN 103023637A CN 2012105679908 A CN2012105679908 A CN 2012105679908A CN 201210567990 A CN201210567990 A CN 201210567990A CN 103023637 A CN103023637 A CN 103023637A
- Authority
- CN
- China
- Prior art keywords
- keywords
- ciphertext
- keyword
- server
- trapdoor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000013500 data storage Methods 0.000 claims abstract description 6
- 125000004122 cyclic group Chemical group 0.000 claims description 29
- 238000013507 mapping Methods 0.000 claims description 9
- 150000001875 compounds Chemical class 0.000 claims 2
- 239000000654 additive Substances 0.000 description 11
- 230000000996 additive effect Effects 0.000 description 11
- 238000012795 verification Methods 0.000 description 6
- 238000004364 calculation method Methods 0.000 description 4
- 238000011161 development Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000004904 shortening Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
Description
技术领域technical field
本发明属于网络安全技术领域,具体涉及安全云存储中可撤销的关键字搜索公钥加密方法及搜索方法。The invention belongs to the technical field of network security, and in particular relates to a revocable keyword search public key encryption method and a search method in secure cloud storage.
背景技术Background technique
云存储是在云计算概念上延伸和发展出来的一个新概念。云计算是分布式处理、并行处理和网格计算的发展,通过网络将庞大的计算处理程序自动分拆成无数个较小的子程序,再交由多部服务器所组成的庞大系统经计算分析之后将处理结果回传给用户。通过云计算技术,网络服务提供者可以在数秒之内,处理数以千万计甚至亿计的信息,达到和“超级计算机”同样强大的网络服务。Cloud storage is a new concept extended and developed from the concept of cloud computing. Cloud computing is the development of distributed processing, parallel processing and grid computing. The huge computing processing program is automatically split into countless smaller subroutines through the network, and then submitted to the huge system composed of multiple servers for calculation and analysis. Afterwards, the processing result is passed back to the user. Through cloud computing technology, network service providers can process tens of millions or even billions of information in a few seconds, and achieve network services as powerful as "supercomputers".
云存储是指通过集群应用、网格技术或分布式文件系统等功能,将网络中大量各种不同类型的存储设备通过应用软件集合起来协同工作,共同对外提供数据存储和业务访问功能的一个系统。云存储服务允许用户存储任意规模的数据,由云服务提供商负责保证数据的安全性,可靠性,可访问性。在云存储服务的帮助下,用户不用担心如何防止数据的丢失、如何保证数据的安全、以及需要提前采购多少空间等数据存储的相关问题,从而把更多的精力放在自身业务的发展。Cloud storage refers to a system that integrates a large number of different types of storage devices in the network through application software to work together through functions such as cluster applications, grid technology, or distributed file systems, and jointly provide data storage and business access functions to the outside world. . Cloud storage services allow users to store data of any size, and cloud service providers are responsible for ensuring data security, reliability, and accessibility. With the help of cloud storage services, users don't have to worry about data storage related issues such as how to prevent data loss, how to ensure data security, and how much space needs to be purchased in advance, so that they can focus more on their own business development.
云存储的优势是显而易见的,但安全问题却成为了制约其发展的重要因素,因为用户数据中存在很多的敏感信息,如果用户把自己的数据存储到云服务器上,就会担心数据的泄露问题。加密技术是用来防止消息泄露和保护敏感数据的有效手段,通过对数据的加密,只允许数据的拥有者才能够对数据进行解密,即使存储在云服务器上的数据发生了泄露,也不会外泄数据的任何内容。虽然通过对云数据的加密可以杜绝数据泄露的可能,但同时造成远程数据访问成为一大难题,数据的搜索和查询更是成为了近乎不可达到的目标。在本说明书中谈到的云数据是指云服务器中存储的用户数据。云服务器是指提供云存储服务、用于存储用户数据的服务器。The advantages of cloud storage are obvious, but security issues have become an important factor restricting its development, because there are a lot of sensitive information in user data, if users store their data on cloud servers, they will worry about data leakage . Encryption technology is an effective means to prevent information leakage and protect sensitive data. Through data encryption, only the owner of the data is allowed to decrypt the data. Even if the data stored on the cloud server is leaked, it will not Anything that exfiltrates data. Although the possibility of data leakage can be eliminated by encrypting cloud data, remote data access has become a major problem at the same time, and data search and query has become an almost unattainable goal. The cloud data mentioned in this manual refers to the user data stored in the cloud server. A cloud server refers to a server that provides cloud storage services and stores user data.
关键字搜索公钥加密是公钥密码体制的基础应用之一,利用公钥密码体制,用户可以在不泄漏数据内容的前提下实现加密云数据的搜索和回取功能。Keyword search Public key encryption is one of the basic applications of public key cryptography. Using public key cryptography, users can realize the search and retrieval functions of encrypted cloud data without revealing the data content.
目前,关键字搜索加密主要包括单钥模式和公钥模式。单钥模式以对称密码体制为基础,适用于云数据的拥有者和使用者是相同用户的情形,而对于两者是不同用户的情形,单钥模式需要事先通过安全信道共享会话密钥。所谓安全信道指的是信息以加密形式经过网络传播,网络攻击者虽然可以截获网络上传输的所有数据,但他无法得到数据中包含的真正信息。会话密钥是保证用户跟其它计算机或者两台计算机之间安全通信会话而随机产生的加密和解密密钥。而公钥模式允许数据的拥有者在把数据发送给云服务器前利用数据使用者的公钥来加密数据,实现了数据共享,且避免了协商会话密钥的过程。基于此优点,关键字搜索公钥加密更加适用于安全云存储,不但能够满足云存储用户对加密云数据的搜索和回取需求,而且实现了云数据的隐私保护,搜索过程不会泄漏数据的任何内容。Currently, keyword search encryption mainly includes single-key mode and public-key mode. The single-key mode is based on the symmetric cryptosystem, and is suitable for the case where the owner and user of the cloud data are the same user, but for the case where the two are different users, the single-key mode needs to share the session key through a secure channel in advance. The so-called secure channel means that information is transmitted through the network in an encrypted form. Although a network attacker can intercept all data transmitted on the network, he cannot obtain the real information contained in the data. A session key is an encryption and decryption key randomly generated to ensure a secure communication session between a user and another computer or between two computers. The public key mode allows the data owner to use the data user's public key to encrypt the data before sending the data to the cloud server, realizing data sharing and avoiding the process of negotiating session keys. Based on this advantage, keyword search public key encryption is more suitable for secure cloud storage. It can not only meet the search and retrieval needs of cloud storage users for encrypted cloud data, but also realize the privacy protection of cloud data, and the search process will not leak data. any content.
目前,对关键字搜索公钥加密的研究主要集中在指定搜索者的关键字搜索公钥加密、多关键字搜索的公钥加密、抗离线关键字猜测攻击的关键字搜索公钥加密等方面,将关键字搜索公钥加密直接应用于安全云存储在功能和性能上还存在以下问题:At present, the research on keyword search public key encryption mainly focuses on the keyword search public key encryption of designated searchers, the public key encryption of multi-keyword search, and the keyword search public key encryption against offline keyword guessing attacks, etc. Applying keyword search public key encryption directly to secure cloud storage still has the following problems in terms of function and performance:
(1)没有解决搜索能力撤销问题;(1) Failure to resolve the issue of revocation of search capabilities;
(2)服务器的搜索能力没有得到限制;(2) The search capability of the server is not limited;
(3)搜索速度慢,搜索请求响应时间长;(3) The search speed is slow, and the search request response time is long;
(4)搜索效率低,双线性对运算多。(4) The search efficiency is low, and there are many bilinear pairing operations.
其中前两个问题对用户云数据的安全存储造成极大的威胁,而后两个问题大大消耗了云服务器的计算资源,使其无法同时响应大量用户的搜索请求,造成用户等待时间过长,因此都是需要极力避免的。Among them, the first two problems pose a great threat to the safe storage of user cloud data, while the latter two problems greatly consume the computing resources of the cloud server, making it impossible to respond to a large number of user search requests at the same time, causing users to wait too long, so All are to be avoided.
发明内容Contents of the invention
本发明的发明目的在于:针对上述存在的问题,提供一种云存储中,可撤销的关键字搜索公钥加密方法,以满足高安全性要求的云存储环境需求,用户在必要时,可撤销云服务器的搜索能力,减小系统计算开销,缩短搜索请求响应时间,并在不泄漏云数据内容的条件下,保证云存储环境中加密云数据的安全搜索和回取。The purpose of the present invention is to: aim at the above existing problems, to provide a revocable keyword search public key encryption method in cloud storage, to meet the requirements of cloud storage environment with high security requirements, the user can revoke the method when necessary The search capability of the cloud server reduces system computing overhead, shortens search request response time, and ensures secure search and retrieval of encrypted cloud data in the cloud storage environment without leaking cloud data content.
本发明的云存储中可撤销的关键字搜索公钥加密方法,包括下列步骤:The revocable keyword search public key encryption method in the cloud storage of the present invention comprises the following steps:
步骤a.系统初始化:Step a. system initialization:
选择安全参数k,设置系统公开参数,并把系统时间划分为整数z个时间片段:t1,t2,…,tz;Select security parameter k, set system public parameters, and divide system time into integer z time segments: t 1 , t 2 ,..., t z ;
步骤b.生成用户公私钥对:Step b. Generate user public-private key pair:
根据用户端选择的私钥s,生成对应的公钥PPub;Generate the corresponding public key P Pub according to the private key s selected by the client;
步骤c.生成文件密文和关键字集合密文:Step c. Generate file ciphertext and keyword set ciphertext:
(c1)当用户有数据存储请求时,用户端选取数据文件M的关键字集合W={wi|i=1,…,n},并对数据文件M进行加密,得到数据文件M的文件密文C;(c1) When the user has a data storage request, the client selects the keyword set W={w i |i=1,...,n} of the data file M, and encrypts the data file M to obtain the file of the data file M ciphertext C;
(c2)用户端基于所述公开参数、公钥PPub、关键字集合W和当前的时间片段ti,生成所述关键字集合W对应的关键字集合密文并把所述文件密文C和关键字集合密文发送给服务器存储;(c2) Based on the public parameters, the public key P Pub , the keyword set W and the current time segment t i , the client generates the keyword set ciphertext corresponding to the keyword set W And put the file ciphertext C and keyword set ciphertext sent to the server for storage;
(c3)当新的时间片段ti+1到达时,用户端基于公开参数、公钥PPub、关键字集合W和当前的时间片段ti+1,生成新的关键字集合密文并把所述关键字集合密文发送给服务器,服务器更新保存的关键字集合密文。(c3) When a new time segment t i+1 arrives, the client generates a new keyword set ciphertext based on public parameters, public key P Pub , keyword set W and the current time segment t i+1 And put the keyword set ciphertext Send it to the server, and the server updates the stored keyword set ciphertext.
进一步的,所述步骤a中,设置系统公开参数p、q、GF(p)、E、G1、G2、P、e、H1、H2、Q具体为:Further, in the step a, setting system public parameters p, q, GF(p), E, G 1 , G 2 , P, e, H 1 , H 2 , Q is specifically:
根据所述安全参数k选择大素数p、q,取GF(p)为p阶有限域,E为GF(p)上的椭圆曲线,E(GF(p))为E上的点构成的q阶加法循环群,记为G1;Select large prime numbers p and q according to the safety parameter k, take GF(p) as a p-order finite field, E is an elliptic curve on GF(p), and E(GF(p)) is q formed by points on E Additive cyclic group of order, denoted as G 1 ;
P是加法循环群G1的生成元;P is the generator of the additive cyclic group G 1 ;
乘法循环群G2是加法循环群G1上的点经过双线性对e映射构成的q阶乘法循环群,双线性对e是从加法循环群G1到乘法循环群G2的映射,e:G1×G1→G2;The multiplicative cyclic group G 2 is a q-factorial cyclic group formed by mapping points on the additive cyclic group G 1 through the bilinear pair e, and the bilinear pair e is the mapping from the additive cyclic group G 1 to the multiplicative cyclic group G 2 , e: G 1 ×G 1 →G 2 ;
H1和H2是抗碰撞的哈希函数,所述H1是从0和1组成的比特序列集合映射到乘法循环群Zq *;H2是从0和1组成的比特序列集合映射到加法循环群G1;H 1 and H 2 are anti-collision hash functions, the H 1 is mapped from a set of bit sequences composed of 0 and 1 to the multiplicative cyclic group Z q * ; H 2 is mapped from a set of bit sequences composed of 0 and 1 to Additive cyclic group G 1 ;
Q是加法循环群G1上的一个随机点。Q is a random point on the additive cyclic group G1 .
基于本发明的加密方法,本发明还提供了一种云存储中可撤销的关键字搜索方法,包括下列步骤:Based on the encryption method of the present invention, the present invention also provides a revocable keyword search method in cloud storage, comprising the following steps:
通过本发明的加密方法对用户预存储的云数据文件M进行加密处理,服务器存储文件密文和关键字集合密文,当收到用户的搜索请求时,启动本发明的搜索过程:The cloud data file M pre-stored by the user is encrypted by the encryption method of the present invention, and the server stores the file ciphertext and the keyword set ciphertext, and when receiving the user's search request, the search process of the present invention is started:
用户端根据公开参数,私钥s,公钥PPub、搜索请求的关键字w和当前的时间片段ti,生成所述关键字w对应的陷门并把所述陷门发送给服务器;According to the public parameters, private key s, public key P Pub , keyword w of the search request and current time segment t i , the client generates a trapdoor corresponding to the keyword w and put the trapdoor send to the server;
服务器收到陷门后,根据公开参数、公钥PPub,陷门和存储的关键字集合密文进行验证,若验证成功,则返回对应的数据文件M的密文C;否则不返回任何数据。server received trapdoor Finally, according to the public parameters and the public key P Pub , the trapdoor and stored keyword set ciphertext Verification is performed, and if the verification is successful, the ciphertext C of the corresponding data file M is returned; otherwise, no data is returned.
综上所述,由于采用了上述技术方案,本发明的有益效果是:In summary, owing to adopting above-mentioned technical scheme, the beneficial effect of the present invention is:
(1)本发明基于公钥密码模式,因此无须通过安全信道传递会话密钥或进行会话密钥协商,从而降低了网络的存储、通信和计算开销,更适合数据共享和高安全性要求的云存储环境;(1) The present invention is based on the public key cryptography mode, so there is no need to transfer the session key or negotiate the session key through a secure channel, thereby reducing the storage, communication and computing overhead of the network, and is more suitable for data sharing and high-security cloud storage environment;
(2)基于本发明划分的z个时间片段,实现了对服务器端存储的关键字集合密文的定时更新,解决了搜索能力的可撤销问题,限制了服务器的搜索能力,为云数据提供了更好的安全保证;(2) Based on the z time segments divided by the present invention, the regular update of the keyword set ciphertext stored on the server side is realized, which solves the problem of revocation of the search ability, limits the search ability of the server, and provides cloud data better security assurance;
(3)本发明中,关键字集合W中的每个关键字wi在固定时间段中,均对应同一个关键字集合密文,从而使得搜索过程中,本发明的服务器无须逐一对关键字集合W中的每个关键字wi的密文进行验证,将搜索时的验证公式的运行次数从n次降低为1次,显著提高了关键字搜索公钥加密的关键字搜索效率;(3) In the present invention, each keyword w i in the keyword set W corresponds to the same keyword set ciphertext in a fixed period of time, so that during the search process, the server of the present invention does not need to pair keywords one by one The ciphertext of each keyword w i in the set W is verified, and the number of operations of the verification formula during the search is reduced from n times to 1 time, which significantly improves the keyword search efficiency of keyword search public key encryption;
(4)本发明中,关键字集合W中的每个关键字wi在固定时间段中,均对应同一个关键字集合密文,从而使得本发明在搜索验证过程中所需的双线性对运算少,加快了服务器的搜索速度,大大缩短了用户搜索请求的响应时间。(4) In the present invention, each keyword w i in the keyword set W corresponds to the same keyword set ciphertext in a fixed period of time, so that the bilinearity required in the search verification process of the present invention Fewer calculations speed up the search speed of the server and greatly shorten the response time of user search requests.
附图说明Description of drawings
本发明将通过例子并参照附图的方式说明,其中:The invention will be illustrated by way of example with reference to the accompanying drawings, in which:
图1是本发明具体实施方式的公钥加密过程示意图;Fig. 1 is a schematic diagram of a public key encryption process of a specific embodiment of the present invention;
图2是本发明具体实施方式的文件密文和关键字集合密文生成过程示意图;Fig. 2 is a schematic diagram of the file ciphertext and keyword set ciphertext generation process of the specific embodiment of the present invention;
图3是本发明具体实施方式的搜索过程示意图。Fig. 3 is a schematic diagram of a search process in a specific embodiment of the present invention.
具体实施方式Detailed ways
本说明书中公开的所有特征,或公开的所有方法或过程中的步骤,除了互相排斥的特征和/或步骤以外,均可以以任何方式组合。All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and/or steps.
本说明书(包括任何附加权利要求、摘要和附图)中公开的任一特征,除非特别叙述,均可被其他等效或具有类似目的的替代特征加以替换。即,除非特别叙述,每个特征只是一系列等效或类似特征中的一个例子而已。Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.
本发明是以椭圆曲线密码理论为基础,提出一种安全云存储中可撤销的关键字搜索公钥加密方法,应用于高安全性要求的云存储环境,必要时用户可撤销云服务器的搜索能力,减小计算开销,缩短搜索请求响应时间,并在不泄漏云数据内容的条件下,实现云存储环境中加密云数据的安全搜索和回取。The present invention is based on the theory of elliptic curve cryptography, and proposes a revocable keyword search public key encryption method in secure cloud storage, which is applied to the cloud storage environment with high security requirements, and the user can revoke the search ability of the cloud server when necessary , reducing computing overhead, shortening the response time of search requests, and realizing secure search and retrieval of encrypted cloud data in cloud storage environments without leaking cloud data content.
首先对本发明所应用的数学理论进行简单介绍:At first the applied mathematical theory of the present invention is briefly introduced:
(1)椭圆曲线密码体制ECC(1) Elliptic Curve Cryptosystem ECC
设p和q为大素数,GF(p)为p阶有限域,E为GF(p)上的椭圆曲线,E(GF(p))为E上的点构成的q阶循环群,P∈E(GF(p))是生成元。关于椭圆曲线的定义及其安全参数的选取可以参阅文献:Don Johnson,Alfred Menezes and Scott Vanstone,The Elliptic Curve Digital SignatureAlgorithm(ECDSA),IJLS,vol.1issue1(2001),36-63。Let p and q be large prime numbers, GF(p) is a p-order finite field, E is an elliptic curve on GF(p), E(GF(p)) is a q-order cyclic group composed of points on E, P∈ E(GF(p)) is the generator. For the definition of elliptic curve and the selection of security parameters, please refer to the literature: Don Johnson, Alfred Menezes and Scott Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA), IJLS, vol.1issue1(2001), 36-63.
(2)Hash函数(2) Hash function
Hash函数就是把任意长的输入消息变换成固定长的输出消息的一种函数,这个输出称为该消息的Hash值。一个安全的Hash函数应该至少满足以下几个条件;①输入长度是任意的;②输出长度是固定的,至少取128bits长,以便抵抗生日攻击;③对每一个给定的输入,能够很容易地计算其输出,即Hash值;④给定Hash函数的描述,找到两个不同的输入消息Hash到同一个值是计算上不可行的,或给定Hash函数的描述和一个随机选择的消息,找到另一个与该消息不同的消息,使得它们Hash到同一个值是计算上不可行的。Hash函数主要用于完整性校验和提高数字签名的有效性。The Hash function is a function that transforms an input message of arbitrary length into an output message of fixed length, and this output is called the Hash value of the message. A secure Hash function should at least meet the following conditions: ①The input length is arbitrary; ②The output length is fixed, at least 128 bits long, so as to resist birthday attacks; ③For each given input, it can be easily Calculate its output, that is, the Hash value; ④Given the description of the Hash function, it is computationally infeasible to find two different input messages Hash to the same value, or given the description of the Hash function and a randomly selected message, find Another message that is different from this message, making it computationally infeasible for them to hash to the same value. The Hash function is mainly used for integrity verification and improving the validity of digital signatures.
本发明中Hash函数H1:{0,1}*→Zq *,是从0和1组成的比特序列集合映射到乘法循环群Zq *。H2:{0,1}*→G1,是从0和1组成的比特序列集合映射到椭圆曲线上的加法循环群G1。In the present invention, the Hash function H 1 : {0,1} * →Z q * is mapped from the bit sequence set composed of 0 and 1 to the multiplicative cyclic group Z q * . H 2 :{0,1} * →G 1 is an additive cyclic group G 1 mapped from a bit sequence set composed of 0 and 1 to an elliptic curve.
(3)有限域(3) Finite fields
有限域是一个包含有限个元素的集合,满足对加法和乘法封闭等性质,有限域的阶是域中元素的个数,阶为素数p的有限域一般记为GF(p)。在有限域中,有两个群,一个是GF(p)对加法构成的群,一个是GF(p)-0对乘法构成的群。在乘法循环群中,生成元的所有幂给出群中的所有元素。本发明中Zq *表示群Zq中去掉零元构成的群,G1是椭圆曲线上的加法循环群,G2是椭圆曲线上的乘法循环群。A finite field is a set containing a finite number of elements, which satisfies the properties of being closed to addition and multiplication. The order of a finite field is the number of elements in the field. A finite field whose order is a prime number p is generally denoted as GF(p). In finite fields, there are two groups, one is the group formed by GF(p) for addition, and the other is the group formed by GF(p)-0 for multiplication. In a multiplicative cyclic group, all powers of the generators give all elements of the group. In the present invention, Z q * represents the group formed by removing zero elements in the group Z q , G 1 is the additive cyclic group on the elliptic curve, and G 2 is the multiplicative cyclic group on the elliptic curve.
(4)素数和互素(4) Prime numbers and mutual primes
所谓素数,是指任意一大于1的整数p,若它只能被±1和±p整除,就称其为素数;The so-called prime number refers to any integer p greater than 1, if it can only be divisible by ±1 and ±p, it is called a prime number;
所谓互素,是指两个整数,若它们的最大公约数为1,则称它们互素。The so-called mutual prime refers to two integers, if their greatest common divisor is 1, then they are called mutual prime.
(5)点标量乘运算(5) point scalar multiplication operation
令E是一个定义在域GF(p)上的椭圆曲线,根据“弦和切线”法则,E(GF(p))上的两个点P和Q相加得到E(GF(p))上的第三个点R。点集合E(GF(p))及其这种加法运算构成一个加法交换群,并且O为其无穷远点。Let E be an elliptic curve defined on the field GF(p). According to the "chord and tangent" law, two points P and Q on E(GF(p)) are added to obtain E(GF(p)) The third point R of . The point set E(GF(p)) and its addition operation constitute an additive commutative group, and O is its point at infinity.
令P=(x1,y1)和Q=(x2,y2)是椭圆曲线E上的两个不同的点,则P与Q之和R=(x3,y3)如下定义:首先画一条连接P和Q的直线,这条直线与椭圆曲线相交于第三点,则这个交点关于x轴的对称点就是R点。Let P=(x 1 , y 1 ) and Q=(x 2 , y 2 ) be two different points on the elliptic curve E, then the sum of P and Q R=(x 3 , y 3 ) is defined as follows: First draw a straight line connecting P and Q, and this straight line intersects the elliptic curve at the third point, then the symmetric point of this intersection point with respect to the x-axis is point R.
若P=(x1,y1)和Q=(x2,y2)是椭圆曲线E上的两个相同的点,则求P与Q之和相当于求点P的倍点R=(x3,y3):首先在P点画椭圆曲线的切线,这条切线与椭圆曲线相交于第二点,这个交点关于x轴的对称点就是倍点。If P=(x 1 , y 1 ) and Q=(x 2 , y 2 ) are two identical points on the elliptic curve E, then finding the sum of P and Q is equivalent to finding the double point R=( x 3 , y 3 ): First, draw the tangent line of the elliptic curve at point P. This tangent line intersects the elliptic curve at the second point. The symmetric point of this intersection point with respect to the x-axis is the doubling point.
点标量乘运算是椭圆曲线公钥密码体制中最基本也是最重要的环节。椭圆曲线上的点标量乘运算Q=kP定义如下:给定一条椭圆曲线E和曲线上的一个点P,曲线E上的P点的点乘kP,定义为点P与自身相加k次之和,kP=P+P+…+P共k个P相加。点标量乘运算又称为点乘运算,它是在椭圆曲线上进行的基本的相同点的多次点加运算,其运行时间决定着椭圆曲线密码体制的实现时间,故决定着椭圆曲线密码体制的运算速度。关于点标量乘运算的具体计算方法可以参阅文献:Stinson A.R.著,冯登国等译.密码学原理与实践.第三版,北京:电子工业出版社,2009.201-208。Point scalar multiplication is the most basic and important link in elliptic curve public key cryptosystem. The point scalar multiplication operation Q=kP on the elliptic curve is defined as follows: Given an elliptic curve E and a point P on the curve, the point multiplication kP of point P on the curve E is defined as adding k times to the point P and itself And, kP=P+P+...+P, a total of k Ps are added. The point scalar multiplication operation is also called the point multiplication operation. It is a multiple point addition operation of the same basic point on the elliptic curve. Its running time determines the realization time of the elliptic curve cryptosystem, so it determines the elliptic curve cryptosystem. operating speed. For the specific calculation method of point-scalar multiplication, please refer to the literature: Stinson A.R., translated by Feng Dengguo, etc. Cryptography Principles and Practice. Third Edition, Beijing: Electronic Industry Press, 2009.201-208.
(6)双线性对(6) Bilinear pairing
假设G1是加法循环群,G2是乘法循环群,群的阶皆为q,P为群G1的生成元。映射e:G1×G1→G2满足下面三个条件,则称之为双线性对。Suppose G 1 is an additive cyclic group, G 2 is a multiplicative cyclic group, the order of the groups is q, and P is the generator of the group G 1 . Mapping e: G 1 ×G 1 →G 2 satisfies the following three conditions, it is called bilinear pairing.
(1)双线性,即对于任意e(aP,bP)=e(P,P)ab成立;(1) Bilinear, that is, for any e(aP, bP)=e(P, P) ab is established;
(2)非退化性,即 (2) Non-degenerate, ie
(3)e可被有效的计算。(3) e can be efficiently calculated.
这样的双线性对可以通过有限域上的超奇异椭圆曲线以及超奇异超椭圆曲线的Tate对或Weil对来构造。关于双线性对运算的构造和应用,可以参考文献:Boneh D.,Franklin M.,2001.Identity-based encryption from the Weil pairings,in:Advances in Cryptology-Crypto,in:LNCS,vol.3494,Springer-Verlag,Berlin,2001:213-229。Such bilinear pairs can be constructed by supersingular elliptic curves over finite fields and Tate pairs or Weil pairs of supersingular hyperelliptic curves. For the construction and application of bilinear pairing operations, refer to: Boneh D., Franklin M., 2001. Identity-based encryption from the Weil pairings, in: Advances in Cryptology-Crypto, in: LNCS, vol.3494, Springer-Verlag, Berlin, 2001:213-229.
参照图1,本发明的具体实现如下:With reference to Fig. 1, concrete realization of the present invention is as follows:
步骤S100.系统初始化:Step S100. System initialization:
步骤S101:选择安全参数k,设置系统公开参数(p,q,GF(p),E,G1,G2,P,e,H1,H2,Q)如下:根据安全参数k选择大素数p和q,GF(p)为p阶有限域,E为GF(p)上的椭圆曲线,E(GF(p))为E上的点构成的q阶加法循环群,记为群G1,P∈G1是生成元。群G2是群G1上的点经过双线性对e映射构成的q阶乘法循环群,双线性对e是从群G1到群G2的映射e:G1×G1→G2。H1和H2是抗碰撞的Hash函数,Q是群G1上的一个随机点。Step S101: Select security parameter k, set system public parameters (p, q, GF(p), E, G 1 , G 2 , P, e, H 1 , H 2 , Q) as follows: select large Prime numbers p and q, GF(p) is a finite field of order p, E is an elliptic curve on GF(p), E(GF(p)) is an additive cyclic group of order q formed by points on E, denoted as group G 1 , P∈G 1 is the generator. Group G 2 is a q-factorial cyclic group formed by mapping points on group G 1 through bilinear pair e, and bilinear pair e is the mapping e from group G 1 to group G 2 : G 1 ×G 1 →G 2 . H 1 and H 2 are anti-collision Hash functions, and Q is a random point on the group G 1 .
步骤S102:根据安全参数k把系统时间划分为z个时间片段t1,t2,...,tz,系统当前的第i个时间片段记为ti。Step S102: Divide the system time into z time segments t 1 , t 2 , ..., t z according to the security parameter k, and denote the current i-th time segment of the system as t i .
步骤S200.生成用户公私钥对:Step S200. Generate user public-private key pair:
用户端随机选择秘密整数作为私钥,计算相应的公钥PPub=sP。The client randomly selects the secret integer As a private key, the corresponding public key P Pub =sP is calculated.
步骤S300.生成文件密文和关键字集合密文:Step S300. Generate file ciphertext and keyword set ciphertext:
当用户有数据文件M的存储请求时,用户端首先选择数据文件M的关键字集合W={w1,…,wn},选取任意一对称加密算法(例如高级加密标准算法AES)加密数据文件M,得到文件密文C。本发明中,对数据文件M的加密既可采用对称加密算法,也可以为非对称加密算法,当采用非对称加密算法时,则利用用户端公钥PPub加密数据,解密时利用私钥s。When the user has a storage request for the data file M, the client first selects the keyword set W={w 1 ,…,w n } of the data file M, and selects any symmetric encryption algorithm (such as the Advanced Encryption Standard Algorithm AES) to encrypt the data File M, get file ciphertext C. In the present invention, the encryption of the data file M can adopt either a symmetric encryption algorithm or an asymmetric encryption algorithm. When an asymmetric encryption algorithm is used, the user terminal public key P Pub is used to encrypt the data, and the private key s is used for decryption. .
然后利用系统公开参数,公钥PPub和当前的时间片段ti加密关键字集合{w1,…,wn},生成ti时段的关键字集合密文并把与文件密文C一起发送服务器保存。当下一时间片段ti+1到达时,用户端计算新的关键字集合密文并把服务器存储的更新为参照图2,本过程的具体实现如下:Then use the system public parameters, the public key P Pub and the current time segment t i to encrypt the keyword set {w 1 ,…,w n }, and generate the keyword set ciphertext for the t i period and put Send the server with the file ciphertext C for storage. When the next time segment t i+1 arrives, the client calculates a new key set ciphertext and store the server update to Referring to Figure 2, the specific implementation of this process is as follows:
步骤S301:当用户有数据存储请求时,用户首先选取数据文件M的W={wi|i=1,…,n},然后选取对称加密算法对数据文件进行加密,得到数据文件M的文件密文C;Step S301: When the user has a data storage request, the user first selects W={w i |i=1,...,n} of the data file M, and then selects a symmetric encryption algorithm to encrypt the data file to obtain the file of the data file M ciphertext C;
步骤S302:用户端根据公开参数,公钥PPub对{w1,…,wn}进行加密,生成当前时间片段ti的关键字集合密文 Step S302: The client encrypts {w 1 ,...,w n } according to the public parameters and the public key P Pub to generate the keyword set ciphertext of the current time segment t i
步骤S302-a:随机选择计算C1=γP和C2=e(Ppub,Q)γ;Step S302-a: Random selection Calculate C 1 =γP and C 2 =e(P pub ,Q) γ ;
步骤S302-b:对每个i=1,…,n,计算xi=H1(wi),利用{x1,…,xn}构造拉格朗日差值多项式,得到每n个多项式fi(x),Step S302-b: For each i=1,...,n, calculate x i =H 1 (w i ), use {x 1 ,...,x n } to construct a Lagrangian difference polynomial, and obtain every n polynomial f i (x),
n是选定的关键字集合中元素的个数,多项式fi(x)的系数ai,1,ai,2,…, n is the number of elements in the selected keyword set, the coefficients a i,1 ,a i,2 ,…, of the polynomial f i (x)
步骤S302-c:对每个i=1,…,n,,用户端选择一个随机数根据多项式fi(x)的系数ai,1,ai,2,…,ai,n计算yi=αi -1γ和 Step S302-c: For each i=1,...,n, the UE selects a random number Calculate y i = α i -1 γ and
步骤S302-d:对每个i=1,…,n,计算xi′=H2(wi||ti),ti是当前的时间片段,根据ai,1,ai,2,…,ai,n计算其中符号“||”表示追加操作,即把ti追加在wi之后;Step S302-d: For each i=1,...,n, calculate x i ′=H 2 (w i ||t i ), t i is the current time segment, according to a i,1 , a i,2 ,...,a i,n calculate The symbol "||" represents an additional operation, that is, append t i after w i ;
步骤S302-e:发送文件密文C和关键字集合密文给服务器;Step S302-e: Send file ciphertext C and keyword set ciphertext to the server;
步骤S303:当下一个时间片段ti+1到达,用户端再次利用系统公开参数,公钥PPub和下一个时间片段ti+1重新计算第(S302-c)和(S302-d)步,得到新的关键字集合密文并发送给服务器,服务器收到后,将存储关键字集合密文更新为 Step S303: When the next time segment t i+1 arrives, the client uses the system public parameters, public key P Pub and the next time segment t i+1 to recalculate steps (S302-c) and (S302-d), Get the new keyword set ciphertext and sent to the server, the server receives After that, the key set ciphertext will be stored update to
步骤S303-a:对每个i=1,…,n,,选择一个随机数根据(S302-b)中时间片段ti的多项式系数ai,1,ai,2,…,ai,n,计算和其中γ的值与时间片段ti的值相同;Step S303-a: For each i=1,...,n, select a random number According to the polynomial coefficients a i,1 ,a i,2 ,...,a i,n of the time segment t i in (S302-b), calculate and where the value of γ is the same as the value of time segment t i ;
步骤S303-b:对每个i=1,…,n,计算ti+1是时间片段ti的下一个时间片段,根据多项式fi(x)的系数ai,1,ai,2,…,ai,n计算和 Step S303-b: For each i=1,...,n, calculate t i+1 is the next time segment of time segment t i , calculated according to the coefficients a i, 1 , a i,2 ,...,a i,n of the polynomial f i (x) and
步骤S303-c:生成关键字集合密文其中C1,C2与时间片段ti中计算的值相同。用户端把发送给服务器,服务器收到后,将更新为 Step S303-c: Generate keyword set ciphertext Where C 1 , C 2 are the same as the values calculated in the time segment t i . The client puts sent to the server, the server receives after that will update to
步骤S400.用户进行关键字搜索过程:Step S400. The user conducts a keyword search process:
当用户具有关键字搜索请求时,用户端根据私钥s和当前的时间片段ti生成所述关键字w对应的陷门并发送给服务器,服务器根据陷门判断关键字集合密文与陷门是否满足验证公式,若是,则返回相应的数据文件M的文件密文C,否则不返回任何信息。参照图3,本过程的具体实现如下:When the user has a keyword search request, the client generates a trapdoor corresponding to the keyword w according to the private key s and the current time segment t i And send it to the server, the server judges whether the keyword set ciphertext and the trapdoor satisfy the verification formula according to the trapdoor, and if so, returns the file ciphertext C of the corresponding data file M, otherwise no information is returned. Referring to Figure 3, the specific implementation of this process is as follows:
步骤S401:当用户具有某个关键字w的搜索请求时,用户端根据公开参数,私钥s,搜索请求的关键字w和当前的时间片段ti,生成所述关键字w对应的陷门信息:Step S401: When the user has a search request for a keyword w, the client generates a trapdoor corresponding to the keyword w according to the public parameters, the private key s, the keyword w of the search request and the current time segment t i information:
步骤S401-a:根据Hash函数H1计算信息中的分量T1=H1(w),根据Hash函数H2计算T=H2(w||ti),所述ti是系统当前的时间片段;Step S401-a: Calculate according to the Hash function H 1 The component T 1 =H 1 (w) in the information, calculate T=H 2 (w||t i ) according to the Hash function H 2 , the t i is the current time segment of the system;
步骤S401-b:根据公开参数中的随机点Q和私钥s计算陷门信息中的分量T2s(Q+T);Step S401-b: Calculate the trapdoor according to the random point Q in the public parameters and the private key s The component T 2 s(Q+T) in the message;
关键字w在时间片段ti对应的陷门为用户把关键字陷门发送给服务器;The trapdoor corresponding to keyword w in time segment t i is Keyword trapdoor send to the server;
步骤S402:服务器收到陷门后,根据公开参数,公钥PPub,陷门和存储的关键字集合密文搜索中是否包含陷门对应的关键字,并返回搜索结果。Step S402: The server receives the trapdoor Finally, according to the public parameters, public key P Pub , trapdoor and stored keyword set ciphertext search Is there a trapdoor in corresponding keywords and return the search results.
步骤S402-a:服务器根据陷门中的T1和密文中的(R1,…,Rn,U1,…Un)分别计算λ=R1+R2T1+…+RnT1 n-1(modq),v=U1+U2T1+…+UnT1 n-1(modq);Step S402-a: The server according to the trapdoor T 1 and ciphertext in (R 1 ,…,R n ,U 1 ,…U n ) in the calculation respectively λ=R 1 +R 2 T 1 +…+R n T 1 n-1 (modq), v=U 1 +U 2 T 1 +...+U n T 1 n-1 (modq);
步骤S402-b:服务器根据得到的v和λ的值检验公式C2=e(C1,T2)/e(v,λ)是否成立;若是,则说明关键字w∈{w1,w2,…,wn},服务器把满足条件的数据文件M的文件密文C返回用户;否则,即则不返回任何数据。Step S402-b: The server checks whether the formula C 2 =e(C 1 ,T 2 )/e(v,λ) is established according to the obtained values of v and λ; if so, it indicates that the keyword w∈{w 1 ,w 2 ,...,w n }, the server returns the file ciphertext C of the data file M that satisfies the conditions to the user; otherwise, that is then no data is returned.
本发明并不局限于前述的具体实施方式。本发明扩展到任何在本说明书中披露的新特征或任何新的组合,以及披露的任一新的方法或过程的步骤或任何新的组合。The present invention is not limited to the foregoing specific embodiments. The present invention extends to any new feature or any new combination disclosed in this specification, and any new method or process step or any new combination disclosed.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201210567990.8A CN103023637B (en) | 2012-12-25 | 2012-12-25 | Encryption and search method for revocable keyword search public keys in cloud storage |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201210567990.8A CN103023637B (en) | 2012-12-25 | 2012-12-25 | Encryption and search method for revocable keyword search public keys in cloud storage |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN103023637A true CN103023637A (en) | 2013-04-03 |
| CN103023637B CN103023637B (en) | 2015-07-15 |
Family
ID=47971801
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201210567990.8A Expired - Fee Related CN103023637B (en) | 2012-12-25 | 2012-12-25 | Encryption and search method for revocable keyword search public keys in cloud storage |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN103023637B (en) |
Cited By (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103731432A (en) * | 2014-01-11 | 2014-04-16 | 西安电子科技大学昆山创新研究院 | Multi-user supported searchable encryption system and method |
| CN104852801A (en) * | 2015-02-13 | 2015-08-19 | 陕西师范大学 | Searchable public key encryption method |
| CN105007258A (en) * | 2015-05-22 | 2015-10-28 | 华中科技大学 | Rapid keyword searchable public key encryption method |
| CN105007161A (en) * | 2015-06-12 | 2015-10-28 | 电子科技大学 | Fuzzy keyword public key searchable encryption scheme achieving unrecognizable trap door |
| CN105681280A (en) * | 2015-12-29 | 2016-06-15 | 西安电子科技大学 | Searchable encryption method based on Chinese in cloud environment |
| CN106411999A (en) * | 2016-07-22 | 2017-02-15 | 青岛大学 | Cloud storage key generation method, cloud data storage method and auditing methods |
| CN106789044A (en) * | 2017-02-20 | 2017-05-31 | 西南石油大学 | Cloud storage ciphertext data public key can search for encryption method on lattice under master pattern |
| CN107454059A (en) * | 2017-07-05 | 2017-12-08 | 广东工业大学 | Search encryption method based on stream cipher under a kind of cloud storage condition |
| CN108111587A (en) * | 2017-12-15 | 2018-06-01 | 中山大学 | A kind of cloud storage searching method based on time release |
| CN108200063A (en) * | 2017-12-29 | 2018-06-22 | 华中科技大学 | It is a kind of to can search for public key encryption method, system and server using this method |
| CN108777623A (en) * | 2018-05-03 | 2018-11-09 | 上海海事大学 | A kind of revocable public key encryption method based on fuzzy keyword searching |
| CN109617683A (en) * | 2018-12-15 | 2019-04-12 | 西安邮电大学 | Terminal and cloud server |
| CN109643324A (en) * | 2016-09-12 | 2019-04-16 | 日本电信电话株式会社 | Encrypt message searching method, message sending/receiving system, server, terminal, program |
| CN110337649A (en) * | 2016-12-30 | 2019-10-15 | 罗伯特·博世有限公司 | The dynamic symmetry that do not discover for search pattern can search for the method and system encrypted |
| CN110826098A (en) * | 2019-10-30 | 2020-02-21 | 维沃移动通信有限公司 | Information processing method and electronic equipment |
| CN111162894A (en) * | 2019-12-31 | 2020-05-15 | 西南石油大学 | Statistical analysis method for outsourcing cloud storage medical data aggregation with privacy protection |
| CN112199698A (en) * | 2020-09-30 | 2021-01-08 | 华中科技大学 | Robust searchable symmetric encryption method and system |
| CN112560075A (en) * | 2021-02-22 | 2021-03-26 | 西南石油大学 | Lightweight searchable encryption method and device based on elliptic curve |
| CN112765669A (en) * | 2021-02-01 | 2021-05-07 | 福州大学 | Regular language searchable encryption system based on time authorization |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100299313A1 (en) * | 2009-05-19 | 2010-11-25 | Security First Corp. | Systems and methods for securing data in the cloud |
| CN101931947A (en) * | 2010-07-28 | 2010-12-29 | 南京航空航天大学 | WSN data security processing method based on searchable ciphertext |
-
2012
- 2012-12-25 CN CN201210567990.8A patent/CN103023637B/en not_active Expired - Fee Related
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100299313A1 (en) * | 2009-05-19 | 2010-11-25 | Security First Corp. | Systems and methods for securing data in the cloud |
| CN101931947A (en) * | 2010-07-28 | 2010-12-29 | 南京航空航天大学 | WSN data security processing method based on searchable ciphertext |
Non-Patent Citations (2)
| Title |
|---|
| CONG WANG 等: ""Towards Secure and Effective Utilization over Encrypted Cloud Data"", 《2011 31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS》 * |
| 于瑞琴: ""可撤销的公钥加密方案的形式分析"", 《太原师范学院学报(自然科学版)》 * |
Cited By (35)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103731432B (en) * | 2014-01-11 | 2017-02-08 | 西安电子科技大学昆山创新研究院 | Multi-user supported searchable encryption method |
| CN103731432A (en) * | 2014-01-11 | 2014-04-16 | 西安电子科技大学昆山创新研究院 | Multi-user supported searchable encryption system and method |
| CN104852801B (en) * | 2015-02-13 | 2018-02-13 | 陕西师范大学 | A kind of public key encryption method that can search for |
| CN104852801A (en) * | 2015-02-13 | 2015-08-19 | 陕西师范大学 | Searchable public key encryption method |
| CN105007258A (en) * | 2015-05-22 | 2015-10-28 | 华中科技大学 | Rapid keyword searchable public key encryption method |
| CN105007258B (en) * | 2015-05-22 | 2018-03-27 | 华中科技大学 | A kind of quick keyword can search for public key encryption method |
| CN105007161A (en) * | 2015-06-12 | 2015-10-28 | 电子科技大学 | Fuzzy keyword public key searchable encryption scheme achieving unrecognizable trap door |
| CN105007161B (en) * | 2015-06-12 | 2018-10-12 | 电子科技大学 | A kind of fuzzy keyword public key search encryption method of trapdoor None- identified |
| CN105681280A (en) * | 2015-12-29 | 2016-06-15 | 西安电子科技大学 | Searchable encryption method based on Chinese in cloud environment |
| CN105681280B (en) * | 2015-12-29 | 2019-02-22 | 西安电子科技大学 | A Chinese-based searchable encryption method in cloud environment |
| CN106411999A (en) * | 2016-07-22 | 2017-02-15 | 青岛大学 | Cloud storage key generation method, cloud data storage method and auditing methods |
| CN106411999B (en) * | 2016-07-22 | 2019-05-17 | 青岛大学 | Key generation method, cloud date storage method and the auditing method of cloud storage |
| CN109643324B (en) * | 2016-09-12 | 2023-08-29 | 日本电信电话株式会社 | Encrypted message searching method, message transmitting and receiving system, terminal and medium |
| CN109643324A (en) * | 2016-09-12 | 2019-04-16 | 日本电信电话株式会社 | Encrypt message searching method, message sending/receiving system, server, terminal, program |
| CN110337649B (en) * | 2016-12-30 | 2023-10-31 | 罗伯特·博世有限公司 | Method and system for dynamic symmetric searchable encryption with imperceptible search patterns |
| CN110337649A (en) * | 2016-12-30 | 2019-10-15 | 罗伯特·博世有限公司 | The dynamic symmetry that do not discover for search pattern can search for the method and system encrypted |
| CN106789044A (en) * | 2017-02-20 | 2017-05-31 | 西南石油大学 | Cloud storage ciphertext data public key can search for encryption method on lattice under master pattern |
| CN106789044B (en) * | 2017-02-20 | 2019-12-27 | 西南石油大学 | Searchable encryption method for cipher text data public key stored in cloud on grid under standard model |
| CN107454059B (en) * | 2017-07-05 | 2020-07-17 | 广东工业大学 | A search encryption method based on sequence cipher in cloud storage environment |
| CN107454059A (en) * | 2017-07-05 | 2017-12-08 | 广东工业大学 | Search encryption method based on stream cipher under a kind of cloud storage condition |
| CN108111587B (en) * | 2017-12-15 | 2020-11-06 | 中山大学 | A cloud storage search method based on time release |
| CN108111587A (en) * | 2017-12-15 | 2018-06-01 | 中山大学 | A kind of cloud storage searching method based on time release |
| US10673612B2 (en) | 2017-12-29 | 2020-06-02 | Huazhong University Of Science And Technology | Method of searchable public-key encryption and system and server using the same |
| CN108200063A (en) * | 2017-12-29 | 2018-06-22 | 华中科技大学 | It is a kind of to can search for public key encryption method, system and server using this method |
| CN108777623A (en) * | 2018-05-03 | 2018-11-09 | 上海海事大学 | A kind of revocable public key encryption method based on fuzzy keyword searching |
| CN109617683B (en) * | 2018-12-15 | 2021-09-17 | 西安邮电大学 | Terminal and cloud server |
| CN109617683A (en) * | 2018-12-15 | 2019-04-12 | 西安邮电大学 | Terminal and cloud server |
| CN110826098A (en) * | 2019-10-30 | 2020-02-21 | 维沃移动通信有限公司 | Information processing method and electronic equipment |
| CN111162894A (en) * | 2019-12-31 | 2020-05-15 | 西南石油大学 | Statistical analysis method for outsourcing cloud storage medical data aggregation with privacy protection |
| CN111162894B (en) * | 2019-12-31 | 2020-11-10 | 西南石油大学 | Statistical analysis method for outsourcing cloud storage medical data aggregation with privacy protection |
| CN112199698A (en) * | 2020-09-30 | 2021-01-08 | 华中科技大学 | Robust searchable symmetric encryption method and system |
| CN112199698B (en) * | 2020-09-30 | 2023-12-12 | 华中科技大学 | Robust searchable symmetric encryption method and system |
| CN112765669B (en) * | 2021-02-01 | 2023-04-18 | 福州大学 | Regular language searchable encryption system based on time authorization |
| CN112765669A (en) * | 2021-02-01 | 2021-05-07 | 福州大学 | Regular language searchable encryption system based on time authorization |
| CN112560075A (en) * | 2021-02-22 | 2021-03-26 | 西南石油大学 | Lightweight searchable encryption method and device based on elliptic curve |
Also Published As
| Publication number | Publication date |
|---|---|
| CN103023637B (en) | 2015-07-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN103023637B (en) | Encryption and search method for revocable keyword search public keys in cloud storage | |
| Ge et al. | Revocable identity-based broadcast proxy re-encryption for data sharing in clouds | |
| Wang et al. | Oruta: Privacy-preserving public auditing for shared data in the cloud | |
| Seo et al. | An efficient certificateless encryption for secure data sharing in public clouds | |
| Wu et al. | An efficient key-management scheme for hierarchical access control in e-medicine system | |
| CN110851845A (en) | A Lightweight Single User Multiple Data Encapsulation Method for Fully Homomorphic Data | |
| Lei et al. | NTRU-KE: A lattice-based public key exchange protocol | |
| Rezaei et al. | A lightweight and efficient data sharing scheme for cloud computing | |
| Yang et al. | Certificateless proxy re-encryption without pairings | |
| Alornyo et al. | Identity Based Key-Insulated Encryption with Outsourced Equality Test. | |
| Ruan et al. | An efficient private set intersection protocol for the cloud computing environments | |
| Peng et al. | Efficient distributed decryption scheme for IoT gateway-based applications | |
| CN109756335A (en) | A kind of rank is the public key encryption decryption method of the finite field multiplier group of Mersenne Prime | |
| Huang et al. | Block-Level Message-Locked Encryption with Polynomial Commitment for IoT Data. | |
| Li et al. | A new self-certified signature scheme based on NTRUSing for smart mobile communications | |
| Yao et al. | Efficient data sharing scheme with fine-grained access control and integrity auditing in terminal–edge–cloud network | |
| CN107276759A (en) | A kind of efficient Threshold cryptosystem scheme | |
| Tahat et al. | Hybrid publicly verifiable authenticated encryption scheme based on chaotic maps and factoring problems | |
| Liao et al. | Cryptanalysis of an identity-based encryption scheme with equality test and improvement | |
| Son et al. | A new outsourcing conditional proxy re‐encryption suitable for mobile cloud environment | |
| Wu et al. | A publicly verifiable PCAE scheme for confidential applications with proxy delegation | |
| Chandrasekaran et al. | Efficient pairing computation for attribute based encryption using MBNR for big data in cloud | |
| Li et al. | Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search | |
| Odelu et al. | DMAMA: Dynamic migration access control mechanism for mobile agents in distributed networks | |
| Hajaje et al. | CPC-H2: Convolution Power-based Cryptosystem and Digital Signature |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150715 Termination date: 20181225 |
|
| CF01 | Termination of patent right due to non-payment of annual fee |