Journal on Communications ›› 2021, Vol. 42 ›› Issue (10): 140-152.doi: 10.11959/j.issn.1000-436x.2021130

Special Issue: 区块链

• Papers • Previous Articles     Next Articles

Public key searchable encryption scheme in blockchain-enabled multi-user environment

Dong ZHENG, Tianze ZHU, Rui GUO   

  1. College of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
  • Revised:2021-05-18 Online:2021-10-25 Published:2021-10-01
  • Supported by:
    The National Key Research and Development Program of China(2017YFB0802000);The National Nat-ural Science Foundation of China(62072369);The National Nat-ural Science Foundation of China(62072371);The National Nat-ural Science Foundation of China(61802303);The National Nat-ural Science Foundation of China(61772418);The Key Research and Develop-ment Program of Shaanxi Province(2020ZDLGY08-04);The Key Research and Develop-ment Program of Shaanxi Province(2019KW-053);The Innovation Capability Support Plan of Shaanxi Province(2020KJXX-052);The Innovation Capability Support Plan of Shaanxi Province(2017KJXX-47);The Natural Science Foundation of Shaanxi Province(2019JQ-866);The Natural Science Foundation of Shaanxi Province(2018JZ6001);The Scientific Research Project of Shaanxi Provincial Department of Education(19JK0803);The Basic Research Program of Qinghai Province(2020-ZJ-701)

Abstract:

In order to meet the needs of data security sharing in multi-user environment, a public key searchable encryption scheme supporting one-to-many mode was proposed.Specifically, the data owner could specify multiple users to retrieve the ciphertext by executing the encryption algorithm once, so as to achieve more flexible sharing of ciphertext data.In addition, the specific file encryption key transfer algorithm was designed to ensure that the user could decrypt and obtain the plaintext correctly after retrieving the ciphertext.Combined with the blockchain technology, the smart contract execution detection algorithm was used to ensure the correctness of the retrieval results.In terms of security, based on the decisional bilinear Diffie-Hellman hypothesis and the modified bilinear Diffie-Hellman hypothesis, it was proved that the proposed scheme satisfies the security requirements of keyword indistinguishability and trapdoor information indistinguishability under the random oracle model, and could resist the internal keyword guessing attack.Finally, the proposed scheme and the existing related schemes were simulated by using jPBC cryptolibrary, and the test results show that the proposed scheme has high computational efficiency.

Key words: searchable encryption, multi-user environment, ciphertext secure sharing, blockchain, smart contract

CLC Number: 

No Suggested Reading articles found!