计算机应用 ›› 2018, Vol. 38 ›› Issue (6): 1640-1643.DOI: 10.11772/j.issn.1001-9081.2017122938

• 网络空间安全 • 上一篇    下一篇

支持用户撤销的可验证密文检索方案

白平1, 张薇1,2, 李聪1, 王绪安1,2   

  1. 1. 武警工程大学 密码工程学院, 西安 710086;
    2. 网络与信息安全武警部队重点实验室, 西安 710086
  • 收稿日期:2017-12-15 修回日期:2018-02-06 出版日期:2018-06-10 发布日期:2018-06-13
  • 通讯作者: 白平
  • 作者简介:白平(1990-),男,内蒙古乌兰察布人,硕士研究生,主要研究方向:密码学;张薇(1976-),女,陕西西安人,教授,博士,主要研究方向:密码学、信息安全;李聪(1990-),男,山东济宁人,硕士研究生,主要研究方向:密码学;王绪安(1981-),男,湖北公安人,副教授,博士,主要研究方向:密码学、信息安全。
  • 基金资助:
    国家密码发展基金资助项目(MMJJ20170112);陕西省自然科学基金资助项目(2016JQ6037)。

Verifiable ciphertext retrieval scheme with user revocation

BAI Ping1, ZHANG Wei1,2, LI Cong1, WANG Xu'an1,2   

  1. 1. College of Cryptographic Engineering, Engineering University of the Chinese Armed Police Force, Xi'an Shaanxi 710086, China;
    2. Key Laboratory of Network and Information Security of the Chinese Armed Police Force, Xi'an Shaanxi 710086, China
  • Received:2017-12-15 Revised:2018-02-06 Online:2018-06-10 Published:2018-06-13
  • Supported by:
    This work is partially supported by the National Cryptography Development Fund of China (MMJJ20170112), the Natural Science Foundation of Shaanxi Province (2016JQ6037). BAI Ping, born in 1990, M. S. candidate. His research interests include cryptology.

摘要: 为解决恶意云服务器可能发送错误或者伪造的查询结果给用户,且授权用户可能在检索完成之后将密钥信息私自发送给非授权用户的问题,构造了一种支持用户撤销的可验证密文检索方案。首先,利用加密算法对用户文档加密、对关键词签名;其次,运用搜索算法对需要检索的文档进行检索;最后,运用验证算法和用户撤销算法对检索结果进行验证,以及对未检索文档进行再一次加密保护。分析结果表明,所提方案能够在保证数据完整性的前提下完成精确检索,且通过重加密机制实现了用户撤销,保证了系统的安全性,该方案满足不可区分性选择关键词攻击(IND-CKA)安全。

关键词: 可搜索加密, 多关键词, 可验证检索, 用户撤销, 数据完整性

Abstract: The malicious cloud server may send incorrect or forged query results to the user, and the authorized user may send the key information privately to a non-authorized user after completing the retrieval. In order to solve the problems, a new verifiable ciphertext retrieval scheme with user revocation was constructed. Firstly, an encryption algorithm was used to encrypt the user documents and sign the keywords. Secondly, a searching algorithm was used to retrieve documents that needed to be retrieved. Finally, a verification algorithm and user revocation algorithm were used to verify the retrieval results and encrypt the unretrieved documents again. The analysis results show that, the proposed scheme can complete the accurate retrieval on the premise of guaranteeing the integrity of data, realize the user revocation through re-encryption scheme, and guarantee the security of system. Moreover, the proposed scheme satisfies the security of Indistinguishability-Chosen Keyword Attack (IND-CKA).

Key words: searchable encryption, multi-keyword, verifiable retrieval, user revocation, data integrity

中图分类号: