通信学报 ›› 2020, Vol. 41 ›› Issue (4): 114-122.doi: 10.11959/j.issn.1000-436x.2020070

所属专题: 区块链

• 学术论文 • 上一篇    下一篇

基于区块链的公钥可搜索加密方案

杜瑞忠1,2,谭艾伦1,田俊峰1,2   

  1. 1 河北大学网络空间安全与计算机学院,河北 保定 071002
    2 河北省高可信信息系统重点实验室,河北 保定 071002
  • 修回日期:2020-01-30 出版日期:2020-04-25 发布日期:2020-04-30
  • 作者简介:杜瑞忠(1975- ),男,河北献县人,博士,河北大学教授、硕士生导师,主要研究方向为可信计算与信息安全|谭艾伦(1995- ),男,四川广安人,河北大学硕士生,主要研究方向为可信计算与信息安全|田俊峰(1964- ),河北蠡县人,博士,河北大学教授、博士生导师,主要研究方向为分布计算、可信计算与信息安全
  • 基金资助:
    国家自然科学基金资助项目(61572170);国家自然科学基金资助项目(61170254);河北省自然科学基金重点资助项目(F2019201290);河北省自然科学基金资助项目(F2018201153)

Public key searchable encryption scheme based on blockchain

Ruizhong DU1,2,Ailun TAN1,Junfeng TIAN1,2   

  1. 1 Cyberspace Security and Computer College,Hebei University,Baoding 071002,China
    2 Key Laboratory on High Trusted Information System in Hebei Province,Baoding 071002,China
  • Revised:2020-01-30 Online:2020-04-25 Published:2020-04-30
  • Supported by:
    The National Natural Science Foundation of China(61572170);The National Natural Science Foundation of China(61170254);The Key Projects of Natural Science Foundation of Hebei Province(F2019201290);The Natural Science Foundation of Hebei Province(F2018201153)

摘要:

针对公钥加密方案的陷门安全问题,引入随机数构造陷门与索引,用于抵御来自服务器内部的关键字猜测攻击,避免因服务器好奇行为带来的数据泄露。对第三方的可信问题进行研究,将区块链技术与可搜索加密方案相结合,使用智能合约作为可信第三方进行检索工作,既可以防止服务器内部的关键字猜测攻击,又可以保证检索结果的正确性,从而限制服务器在下发数据时的恶意行为。通过安全性分析,验证了所提方案满足IND-KGA安全性。经过与其他方案进行实验对比,证明了所提方案在时间开销上具有一定的优势。

关键词: 可搜索加密, 区块链, 智能合约, 公钥加密

Abstract:

Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.Research on trusted issues of third parties,the blockchain mechanism with a searchable encryption scheme was combined,and smart contracts as trusted third parties for retrieval was used,which could prevent keyword guessing attacks inside the server and ensure retrieval.The correctness of the results,thereby limiting the malicious behavior of the server when sending data.The solution was analyzed for security and the verification scheme satisfies IND-KGA security.Experiments in real data sets,compared with other programs,prove that the program has certain advantages in time overhead.

Key words: searchable encryption, blockchain, smart contract, public key encryption

中图分类号: 

No Suggested Reading articles found!