Ciphertext retrieval method

A ciphertext and indexing technology, applied in the field of information security, can solve problems such as increasing query processing time, reducing query efficiency, and reducing user experience, achieving the effects of reducing calculation, improving efficiency, and protecting data privacy

Inactive Publication Date: 2014-07-16
INST OF INFORMATION ENG CAS
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 1) Low efficiency of ciphertext query
Since the current multi-keyword sortable ciphertext retrieval schemes all need to scan the ciphertext index sequentially, when the amount of data is large, the query processing time will be increased and the query efficiency will be significantly reduced.
[0010] 2) Multi-keyword search is not possible
Multiple single-keyword searches are required to achieve the search purpose, which will increase data transmission and server burden, and reduce user experience at the same time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext retrieval method
  • Ciphertext retrieval method
  • Ciphertext retrieval method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific implementation, but the scope of the present invention will not be limited in any way.

[0040] This embodiment adopts as figure 1 In the application scenario based on the data outsourcing model shown, there are three users in the setting system, namely admin, tom and jerry, where admin is the data owner, jerry is the cloud service provider, and tom is the data user.

[0041] This embodiment shows that admin uploads documents to the cloud server provided by jerry, and authorizes tom to search for these documents on the cloud server and tom's query process. The whole process is as follows figure 2 shown.

[0042] Assume that the admin has 7 documents, the contents and keywords of which are shown in Table 1, and the keywords are extracted from the contents.

[0043] Table 1: Document content and keywords

[0044] Document number

[0045]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a ciphertext retrieval method. Hierarchical clustering creation and index encryption are performed in a client; a receiver receives a ciphertext query vector; scores of correlation between document vectors and the query vector can be calculated through the ciphertext index based on hierarchical clustering; a document ranking function is achieved according to the scores of correlation; ciphertext document vectors are not all queried in the querying process, instead document vectors in specific clusters are retrieved, and accordingly, query time is greatly shortened and ciphertext retrieval efficiency is improved. The ciphertext retrieval method supports retrieving multi-keyword rankable ciphertext and supports retrieving ciphertext with big data, and data privacy is protected effectively.

Description

technical field [0001] The invention relates to the field of information security, in particular to a ciphertext retrieval method. Background technique [0002] With the popularization and development of cloud computing, cloud security is getting more and more attention. Due to the large scale of the cloud computing system, which carries a lot of user privacy data and enterprise privacy data, as well as unprecedented openness and complexity, its security faces severe challenges. In order to protect the security of data, more and more enterprises and individuals choose to encrypt the data before uploading to the cloud server. This makes the ciphertext data in the public cloud face explosive growth, and how to retrieve encrypted data has become a difficult problem. The rapid development of ciphertext retrieval technology has promoted the solution of cloud security issues. [0003] Currently, existing schemes for ciphertext retrieval are mainly divided into two categories: s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30H04L9/00
CPCG06F16/334G06F16/35G06F16/374G06F16/93
Inventor 陈驰朱晓杰申培松田雪于晶王朝刚杨腾飞李丹
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products