Searchable encryption method and equipment thereof

An encryption method and equipment technology, applied to the public key and key distribution of secure communication, to achieve the effect of reducing network bandwidth and storage overhead

Active Publication Date: 2014-06-18
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the embodiments of the present invention is to provide a searchable encryption method and device, which solves the need for online public key database or certificate library infrastructure support in the prior art based on public key searchable encryption technology, while the sender Need to query and download the public keys of all members of the group

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Searchable encryption method and equipment thereof
  • Searchable encryption method and equipment thereof
  • Searchable encryption method and equipment thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] reference figure 1 , figure 1 It is a flowchart of a searchable encryption method provided in the first embodiment of the present invention. Such as figure 1 As shown, the method includes the following steps:

[0090] Step 101: Obtain the identity information of the searcher and the system parameters of the key management center. The searcher includes a single searcher or a group of multiple searchers. The identity information of the searcher includes the information of the single searcher. Identity information or identity information of the group where the multiple searchers are located;

[0091] Wherein, the identity information of the searcher includes but is not limited to the searcher's mobile phone number, work number, QQ number, Email and other information. The method of obtaining the identity information of the searching party includes, but is not limited to, obtaining by telephone query or email query. The identity information of the group where the searcher is lo...

Embodiment 2

[0100] reference figure 2 , figure 2 It is a flowchart of an identity-based searchable encryption method provided in the second embodiment of the present invention. Such as figure 2 As shown, the method includes the following steps:

[0101] Step 201: Obtain a query key from the key management center according to the identity information of the searcher, the searcher includes a single searcher or a group of multiple searchers, and the identity information of the searcher includes the single searcher. The identity information of or the identity information of the group where the multiple searchers are located;

[0102] Wherein, the query key is a private key corresponding to an encryption key generated by the key management center according to the identity information of the searcher and system parameters. The key management center can also calculate the public key, because the key management center stores a public key factor matrix, and the private key only exists in the key ma...

Embodiment 3

[0127] reference Figure 5 , Figure 5 It is a flowchart of an identity-based searchable encryption method provided in the third embodiment of the present invention. Such as Figure 5 As shown, the method includes the following steps:

[0128] Step 501: Obtain the identity of the searcher or the identity of the group where the searcher is located, and the system parameters of the key management center;

[0129] Step 502, encrypt keywords according to the identity of the searcher or the identity of the group where the searcher is located, and the system parameters, and upload the encrypted keyword ciphertext to the storage server;

[0130] Step 503: Encrypt the plaintext data according to any encryption method in the prior art, and upload the ciphertext of the encrypted plaintext data to the storage server.

[0131] In this step, the plaintext data corresponding to the keyword is encrypted by any encryption method in the prior art.

[0132] The embodiments of the present invention are a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a searchable encryption method and equipment thereof. According to the method, a sender obtains identity of a searcher or identity of a group to which the searcher belongs and system parameters of a key management center; the sender encrypts a keyword according to the identity of the searcher or the identity of the group to which the searcher belongs and the system parameters and uploads the encrypted keyword ciphertext to a storage server; simultaneously, the searcher obtains a query key from the key management center according to the identity of the searcher or the identity of the group to which the searcher belongs, a query token is generated according to the keyword and the obtained enquiry key, the encrypted keyword ciphertext is queried from the storage server through the query token, and data returned back from the storage server is received. By the above method, a searchable encryption technology can be realized without the support of expensive public key infrastructure and without downloading of public keys by the sender.

Description

Technical field [0001] The invention is applied to the field of encryption technology, and particularly relates to a searchable encryption method and equipment. Background technique [0002] In order to ensure semantic security, encryption schemes often require that the ciphertext distribution generated by the encryption algorithm and the uniform distribution in the ciphertext space are indistinguishable in calculation (calculation indistinguishability means that for two probability distributions, there is no polynomial time algorithm that can distinguish them. ). Therefore, for any effective algorithm, it is impossible to obtain any meaningful semantic information from the encrypted ciphertext, and the loss of semantic information makes it impossible to retrieve the ciphertext data with the help of ordinary retrieval algorithms. In order to solve the problem of ciphertext retrieval, searchable encryption technology has emerged. [0003] Searchable encryption, no need to decrypt ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08
Inventor 高云超邹继富董秋香关志
Owner HUAWEI CLOUD COMPUTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products