Journal of Xidian University ›› 2024, Vol. 51 ›› Issue (4): 151-169.doi: 10.19665/j.issn1001-2400.20240205

• Computer Science and Technology & Cyberspace Security • Previous Articles     Next Articles

Blockchain searchable encryption scheme for multi-user environment

ZHAI Sheping1,2(), ZHANG Ruiting1(), YANG Rui1(), CAO Yongqiang1()   

  1. 1. School of Computer Science and Technology,Xi’an University of Posts and Telecommunications,Xi’an 710121,China
    2. Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing,Xi’an University of Posts and Telecommunications,Xi’an 710121,China
  • Received:2023-11-23 Online:2024-08-20 Published:2024-03-08
  • Contact: ZHANG Ruiting E-mail:zhaisheping@xupt.edu.cn;18691729079@163.com;290934920@qq.com;2310380836@qq.com

Abstract:

How to perform search and realize data sharing on encrypted data that have lost the original features of a plaintext is the key issue in the research on searchable encryption technology.In view of the problems existing in traditional asymmetric searchable encryption schemes,it is difficult to support multi-user multi-keyword search,semi-honest third-party search service,and centralized authorization management,so this paper proposes a searchable encryption scheme for multi-user environment based on blockchain.First,the traditional asymmetric searchable encryption scheme is combined with conditional broadcast proxy re-encryption technology.By encrypting the ciphertext for user groups,verifying user authorization and re-encrypting search results for users meeting the conditions,the secure search and controllable sharing of secret data is realized in multi-user environment.Second,smart contracts are called on the alliance chain to perform multi-keyword ciphertext search,thus reducing the risk of semi-honest third-party false search,and the improved PBFT algorithm is used to elect consensus nodes to rotate as authorization managers,thereby reducing the threat of single point failure or malicious attacks of traditional central authorities.Finally,by analyzing the security and correctness of the scheme,it is shown that the scheme can effectively improve the problems existing in the traditional scheme.Simulation shows that compared with the existing searchable encryption schemes,the proposed scheme has obvious advantages in ensuring the privacy of data search,with the computing cost relatively low.

Key words: searchable encryption, conditional broadcast proxy re-encryption, blockchain, consensus algorithm

CLC Number: 

  • TP309