Electronic Science and Technology ›› 2021, Vol. 34 ›› Issue (4): 1-5.doi: 10.16180/j.cnki.issn1007-7820.2021.04.001

    Next Articles

Anonymous Interaction Algorithm of Access Control in Searchable Voice Encryption Mechanism

HE Shaofang,ZHOU Li   

  1. College of Information and Intelligence,Hunan Agricultural University,Changsha 410128,China
  • Received:2019-12-23 Online:2021-04-15 Published:2021-04-16
  • Supported by:
    National Natural Science Funds of China(11871208);Educational Reform Project of Educational Committee of Hunan Province (Xiang Jiao Tong)(2019291);Educational Reform Project of Educational Committee of Hunan Province Xiang Jiao Tong(2018436)


In view of one-to-many and multi-user single server model of searchable voice encryption mechanism in cloud environment, a public key anonymous interaction algorithm of access control is proposed. Based on the difficulty of discrete logarithm problem, this algorithm constructes a new polynomial using the binary random sequence to generate the user private key information, and realizes the anonymous authentication and symmetric key transfer through the interaction between the user and the cloud server. The analysis shows that the proposed method not only realizes the anonymous authentication of users, symmetric key transfer and dynamic addition and deletion of user safely and effectively, but also has the advantages of complete collusion resistance, fully revoke and recoverability.

Key words: searchable voice encryption, access control, discrete logarithm problem, symmetric key, anonymous authentication, filter function

CLC Number: 

  • TP309.2