A searchable encryption method and device
An encryption method and equipment technology, applied to the public key and key distribution of secure communication, to achieve the effect of reducing network bandwidth and storage overhead
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0089] refer to figure 1 , figure 1 It is a flow chart of a searchable encryption method provided by Embodiment 1 of the present invention. Such as figure 1 As shown, the method includes the following steps:
[0090] Step 101, acquire the identity information of the searcher and the system parameters of the key management center, the searcher includes a single searcher or a group of multiple searchers, the identity information of the searcher includes the single searcher's Identity information or identity information of the group in which the plurality of searchers belong;
[0091] Wherein, the identity information of the searcher includes but not limited to the searcher's mobile phone number, job number, QQ number, Email and other information. The method of obtaining the identity information of the searcher includes but is not limited to obtaining through telephone inquiry or email inquiry. The identity information of the searcher's group includes, but is not limited to,...
Embodiment 2
[0100] refer to figure 2 , figure 2 It is a flow chart of an identity-based searchable encryption method provided by Embodiment 2 of the present invention. like figure 2 As shown, the method includes the following steps:
[0101] Step 201, obtain the query key from the key management center according to the identity information of the searcher, the searcher includes a single searcher or a group of multiple searchers, the identity information of the searcher includes the single searcher or the identity information of the groups in which the multiple searchers belong;
[0102] Wherein, the query key is a private key corresponding to an encryption key generated by the key management center according to the identity information of the search party and system parameters. The key management center can also calculate the public key, because the key management center stores the public key factor matrix, and the private key only exists in the key management center and is not rel...
Embodiment 3
[0127] refer to Figure 5 , Figure 5 It is a flowchart of an identity-based searchable encryption method provided by Embodiment 3 of the present invention. like Figure 5 As shown, the method includes the following steps:
[0128] Step 501, obtaining the identity of the searcher or the identity of the group to which the searcher belongs, and the system parameters of the key management center;
[0129] Step 502, according to the identity of the searcher or the identity of the searcher's group, and the system parameters to encrypt keywords, and upload the encrypted keyword ciphertext to the storage server;
[0130] Step 503, encrypt the plaintext data according to any encryption method in the prior art, and upload the ciphertext of the encrypted plaintext data to the storage server.
[0131] In this step, the plaintext data corresponding to the keyword is encrypted by any encryption method in the prior art.
[0132] The embodiment of the present invention is applicable to ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


