Unlock instant, AI-driven research and patent intelligence for your innovation.

A searchable encryption method and device

An encryption method and equipment technology, applied to the public key and key distribution of secure communication, to achieve the effect of reducing network bandwidth and storage overhead

Active Publication Date: 2017-03-08
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the embodiments of the present invention is to provide a searchable encryption method and device, which solves the need for online public key database or certificate library infrastructure support in the prior art based on public key searchable encryption technology, while the sender Need to query and download the public keys of all members of the group

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A searchable encryption method and device
  • A searchable encryption method and device
  • A searchable encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] refer to figure 1 , figure 1 It is a flow chart of a searchable encryption method provided by Embodiment 1 of the present invention. Such as figure 1 As shown, the method includes the following steps:

[0090] Step 101, acquire the identity information of the searcher and the system parameters of the key management center, the searcher includes a single searcher or a group of multiple searchers, the identity information of the searcher includes the single searcher's Identity information or identity information of the group in which the plurality of searchers belong;

[0091] Wherein, the identity information of the searcher includes but not limited to the searcher's mobile phone number, job number, QQ number, Email and other information. The method of obtaining the identity information of the searcher includes but is not limited to obtaining through telephone inquiry or email inquiry. The identity information of the searcher's group includes, but is not limited to,...

Embodiment 2

[0100] refer to figure 2 , figure 2 It is a flow chart of an identity-based searchable encryption method provided by Embodiment 2 of the present invention. like figure 2 As shown, the method includes the following steps:

[0101] Step 201, obtain the query key from the key management center according to the identity information of the searcher, the searcher includes a single searcher or a group of multiple searchers, the identity information of the searcher includes the single searcher or the identity information of the groups in which the multiple searchers belong;

[0102] Wherein, the query key is a private key corresponding to an encryption key generated by the key management center according to the identity information of the search party and system parameters. The key management center can also calculate the public key, because the key management center stores the public key factor matrix, and the private key only exists in the key management center and is not rel...

Embodiment 3

[0127] refer to Figure 5 , Figure 5 It is a flowchart of an identity-based searchable encryption method provided by Embodiment 3 of the present invention. like Figure 5 As shown, the method includes the following steps:

[0128] Step 501, obtaining the identity of the searcher or the identity of the group to which the searcher belongs, and the system parameters of the key management center;

[0129] Step 502, according to the identity of the searcher or the identity of the searcher's group, and the system parameters to encrypt keywords, and upload the encrypted keyword ciphertext to the storage server;

[0130] Step 503, encrypt the plaintext data according to any encryption method in the prior art, and upload the ciphertext of the encrypted plaintext data to the storage server.

[0131] In this step, the plaintext data corresponding to the keyword is encrypted by any encryption method in the prior art.

[0132] The embodiment of the present invention is applicable to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a searchable encryption method and equipment thereof. According to the method, a sender obtains identity of a searcher or identity of a group to which the searcher belongs and system parameters of a key management center; the sender encrypts a keyword according to the identity of the searcher or the identity of the group to which the searcher belongs and the system parameters and uploads the encrypted keyword ciphertext to a storage server; simultaneously, the searcher obtains a query key from the key management center according to the identity of the searcher or the identity of the group to which the searcher belongs, a query token is generated according to the keyword and the obtained enquiry key, the encrypted keyword ciphertext is queried from the storage server through the query token, and data returned back from the storage server is received. By the above method, a searchable encryption technology can be realized without the support of expensive public key infrastructure and without downloading of public keys by the sender.

Description

technical field [0001] The invention is applied in the field of encryption technology, and in particular relates to a searchable encryption method and device. Background technique [0002] In order to ensure semantic security, the encryption scheme often requires that the ciphertext distribution generated by the encryption algorithm and the uniform distribution on the ciphertext space are computationally indistinguishable (computationally indistinguishable means that for two probability distributions, there is no polynomial time algorithm that can distinguish them ). Therefore, for any effective algorithm, no meaningful semantic information can be obtained from the encrypted ciphertext, and the loss of semantic information makes it impossible to retrieve ciphertext data with the help of ordinary retrieval algorithms. In order to solve the problem of ciphertext retrieval, searchable encryption technology appears. [0003] Searchable encryption does not need to decrypt the e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08
Inventor 高云超邹继富董秋香关志
Owner HUAWEI CLOUD COMPUTING TECH CO LTD