《计算机应用》唯一官方网站 ›› 2022, Vol. 42 ›› Issue (9): 2772-2779.DOI: 10.11772/j.issn.1001-9081.2021081446

• 网络空间安全 • 上一篇    

支持非单调访问结构的可验证搜索属性加密方案

林素青1(), 张书华2   

  1. 1.天津财经大学 理工学院,天津 300222
    2.天津财经大学 管理可计算建模协同创新中心,天津 300222
  • 收稿日期:2021-08-12 修回日期:2021-11-21 接受日期:2021-11-21 发布日期:2022-01-07 出版日期:2022-09-10
  • 通讯作者: 林素青
  • 作者简介:张书华(1958—),男,天津人,教授,博士,主要研究方向:博弈论、供应链网络。
  • 基金资助:
    天津市教委高等学校科技发展基金计划项目(2017KJ237)

Attribute-based encryption scheme with verifiable search and non-monotonic access structure

Suqing LIN1(), Shuhua ZHANG2   

  1. 1.School of Science and Technology,Tianjin University of Finance and Economics,Tianjin 300222,China
    2.Co?Innovation Center for Computable Modeling in Management Science,Tianjin University of Finance and Economics,Tianjin 300222,China
  • Received:2021-08-12 Revised:2021-11-21 Accepted:2021-11-21 Online:2022-01-07 Published:2022-09-10
  • Contact: Suqing LIN
  • About author:ZHANG Shuhua, born in 1958, Ph. D., professor. His research interests include game theory, supply chain network.
  • Supported by:
    Science and Technology Development Fund of Tianjin Education Commission for Higher Education(2017KJ237)

摘要:

针对属性基密文搜索方案多数只支持单调访问结构,且对搜索结果缺乏有效检验等问题,提出支持非单调访问结构且搜索可验证的密文关键字搜索属性加密方案。首先,由属性值构造多项式,根据多项式整除性质实现密文细粒度搜索的权限设置;然后,在确保不泄露隐私信息的前提下,由云服务器完成密文搜索和外包解密;最后,借助所提承诺方案实现对搜索结果的正确性检验。所提方案支持非单调访问结构且具备密文细粒度搜索、数据共享、外包解密和搜索可验证等多项功能。在随机预言机模型中,基于扩展多指数序列判定Diffie-Hellman (aMSE-DDH)假设,可证明该方案在选择密文攻击和选择关键字攻击情况下均具有选择性的不可区分安全性。实验结果表明,所提方案的终端解密时间与属性个数无关,仅需约12.9 ms。

关键词: 属性加密, 非单调访问结构, 细粒度搜索, 随机预言机模型, 外包解密

Abstract:

Most existing attribute-based keyword search schemes only support monotonic access structure and lack efficient verification for search results. Aiming at these problems, a ciphertext keyword search attribute-based encryption scheme with verifiable search and non-monotonic access structure was proposed. Firstly, the polynomials were constructed by the attribute values, and the fine-grained ciphertext search permission setting was accomplished by divisibility property of the polynomials. Then, both keyword search and outsourced decryption were performed by the cloud servicer without revealing any private information. Finally, the search result verification was realized by utilizing the proposed commitment scheme. The proposed scheme supports multiple functions such as non-monotonic access structure, fine-grained search, data sharing, outsourced decryption, and verifiable search. Under the augmented Multi-Sequence of Exponents Decisional Diffie-Hellman (aMSE-DDH) assumption, it can be proved that this scheme has selective indistinguishability security under chosen ciphertext attacks and under chosen keyword attacks, respectively, in the random oracle model. Experimental results show that the terminal decryption time of the proposed scheme is not related to the attribute number, and is about 12.9 ms.

Key words: attribute-based encryption, non-monotonic access structure, fine-grained search, random oracle model, outsourced decryption

中图分类号: