Secure search processing system and secure search processing method

A processing system and security technology, applied in the field of security search processing system, can solve cumbersome problems and achieve the effect of reducing risk, reducing time and energy

Inactive Publication Date: 2014-06-18
HITACHI LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the conventional technology, keys for encrypting search target data need to be separately managed, which is cumbersome
Furthermore, the problem of not being able to completely avoid the risk of information leakage when these keys are compromised remains

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure search processing system and secure search processing method
  • Secure search processing system and secure search processing method
  • Secure search processing system and secure search processing method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0028] 1. System configuration

[0029] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0030] figure 1 It is a network configuration diagram showing the secure search processing system 10 of this embodiment. figure 1 The secure search processing system 10 (hereinafter, system 10) in the secure search technology is a computer system that can reduce the time and effort required to manage user keys and reduce the risk of information management when key leaks occur, including customer end 100 and server 200. Such a system 10 is based on the searchable encryption processing technique disclosed by the present inventor in Japanese Laid-Open No. 2012-123614, and is further configured to reduce management burden and prevent Risk and achieve exceptionally good results.

[0031] Next, functions provided by each of the client 100 and the server 200 constituting the system 10 of the present embodiment will be desc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A secure search processing system includes an information processing apparatus that calculates an exclusive OR of second information obtained by applying a one-way function to a search keyword and a second random number obtained with a random number generator, calculates an exclusive OR of a search value that is the calculation result and registration values in a database, and calculates an exclusive OR of a value obtained by applying the homomorphic function to a calculation result of an exclusive OR of a search value and registration values and a value obtained by applying a homomorphic function to a second random number, searches for an output value of the one-way function with which registration values in the database are associated using as a key a value obtained by applying the one-way function to a calculation result, and outputs a search result to an output interface.

Description

technical field [0001] The present invention relates to a secure search processing system and a secure search processing method, and more specifically refers to reducing the time and effort required to manage user keys in the secure search technology, and reducing the risk of information management when key leaks occur technology. Background technique [0002] With rapid developments such as electronic commerce, opportunities to store personally identifiable information in networked systems are proliferating. Therefore, new information management risks such as information leakage through the network have emerged, but in the future such as genetic information and various highly sensitive information related to personal medical and health are likely to be managed through the above-mentioned network system. [0003] A searchable encryption technology such as a searchable encryption technique that can perform a keyword search on encrypted information has been proposed as a solu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/62
CPCG06F17/30H04L9/008G06F17/30979G06F21/6218G06F21/6227G06F21/6245H04L9/3236G06F16/90335G06F16/00
Inventor 吉野雅之佐藤惠一佐藤尚宜佐藤嘉则
Owner HITACHI LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products