Multi-user supported searchable encryption system and method

An encryption system, multi-user technology, applied in the field of network information security, can solve the problems of wasting resources, consuming a lot of time and bandwidth, and achieving the effects of improving security, saving matching time, and improving retrieval efficiency

Inactive Publication Date: 2014-04-16
西安电子科技大学昆山创新研究院 +1
View PDF2 Cites 56 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, this traditional retrieval method has many unavoidable defects: first, the cloud server returns all files that the user can decrypt to the user, which consumes a lot of time and bandwidth; second, after the user obtains the file, All files need to be decrypted, and the files you need can only be found after obtaining the plain text. The file decryption operation brings a lot of calculations to the user, and the decryption of a large number of unnecessary files wastes a lot of user resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-user supported searchable encryption system and method
  • Multi-user supported searchable encryption system and method
  • Multi-user supported searchable encryption system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0047] refer to figure 1 , a searchable encryption system supporting multiple users of the present invention includes a trusted authority center TA, service providers and users. in:

[0048] The trusted authorization center TA is composed of a system initialization module, a key generation and management module, and a user information management module: the system initialization module is used to initialize the system, generate public parameters and master keys for the system, and public parameters are disclosed and sent to the encryption key. The key generation and management module, the master key is stored confidentially by the system initialization module; the key generation and management module is used to manage the user's attribute private key, query key and supplementary key in the system, and store the attribute private key and query key Distribute...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-user supported searchable encryption system and method and accordingly the problem that specific encrypted files cannot be searched accurately in the prior art is mainly solved. The multi-user supported searchable encryption system comprises a credible authorization center TA, service providers and users; the credible authorization center TA is formed by a system initialization module, a secret key generation and management module and a user information management module; the service providers comprise a file server and a management server; the users comprise data providers and data receivers. The multi-user supported searchable encryption method comprises the steps of system initialization, secret key distribution, file encryption, business outsourcing, file retrieval, user decryption and user logout and adding. According to the multi-user supported searchable encryption system and method, the file retrieval time of the users is shortened due to the establishment of a key word index on files, the storage and computational overhead of the users is reduced due to the accurate file retrieval, the file retrieval is accurate, meanwhile the forward and backward security of the files is ensured, and meanwhile the multi-user simultaneous decryption is supported.

Description

technical field [0001] The invention belongs to the technical field of network information security, and in particular relates to a security scheme for efficient searching of computer encrypted files, which can be used for efficient searching of encrypted files in environments such as information security systems. Background technique [0002] With the rapid development of the Internet, more and more data are shared on the network. While providing us with convenience, it also makes us face problems such as high data processing overhead and difficult security guarantees. In order to solve the above problems, first of all, we can outsource data processing to cloud servers with unlimited computing power. The advantages of outsourcing services such as low cost and simple operation make them more and more popular; second, in order to ensure the confidentiality of data, in Before the user uploads the data to the untrusted cloud server, the data must be encrypted, so that the cloud...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08G06F17/30
Inventor 朱辉李晖雷婉黄容颜荣何晓莺
Owner 西安电子科技大学昆山创新研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products