Effective and verifiable public key searching encryption method based on KP-ABE

A technology of KP-ABE, encryption method, applied in the field of public key searchable encryption, which can solve the problems of negligent offline guessing attack, large amount of calculation, etc.

Active Publication Date: 2014-09-10
XIDIAN UNIV
View PDF5 Cites 48 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the operation of this scheme is the same as that of the cloud server when verifying the correctness, but for

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Effective and verifiable public key searching encryption method based on KP-ABE
  • Effective and verifiable public key searching encryption method based on KP-ABE
  • Effective and verifiable public key searching encryption method based on KP-ABE

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0062] The present invention is realized like this, as figure 1 As shown, an effective and verifiable public key searchable encryption method based on KP-ABE includes trusted authority center, data owner, cloud server, data user; trusted authority center generates certificates for all cloud users; data owner Outsourcing data files and keywords to the cloud server; the cloud server provides storage services and performs search operations after receiving the search request sent by the user; the data user generates a search password and sends it to the cloud server to find the target file.

[0063] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an effective and verifiable public key searching encryption method based on the KP-ABE. According to the method, a creditable authority center, a data owner, a cloud server and a data user are included. The creditable authority center generates a certificate for all cloud users; the data owner outsources a data file and a keyword to the cloud server; the cloud server executes searching operation after providing a storage service and receiving a searching request sent by a user; the data user generates a searching password and sends the password to the cloud sever to search for a target file. According to an effective and verifiable public key searching encryption method based on the KP-ABE, a public and private key pair is generated for the data owner and the cloud server, when the ciphertext keyword and the searching command are sent, the public key pair of the cloud sever is used for encrypting the ciphertext keyword and the searching command firstly, the off-line conjecture aggressive behavior of an external attacker is effectively prevented, and the safety of information and data is improved. In addition, complexity is lowered, the calculation amount of the user is largely reduced, and the efficiency is largely improved.

Description

technical field [0001] The invention belongs to the field of data encryption, in particular to an effective and verifiable public key searchable encryption method based on KP-ABE. Background technique [0002] Public-key searchable encryption is a very attractive cryptographic primitive, which implements information retrieval based on ciphertext, and is especially suitable for cloud computing environments. Public Key Searchable Encryption Scheme (PEKS) enables users to search encrypted data by keywords without revealing any information. The concept of PEKS was proposed by Boneh et al. Baek et al. proposed a PEKS that removes the security channel, making the solution more practical. Following this, Hu et al. and Zhao et al. proposed new schemes that are resistant to offline keyword guessing by external attackers. In short, the concept of PEKS is to provide a mechanism for users to search encrypted data by keywords without disclosing any information to other parties includin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30H04L29/06
Inventor 马华刘鹏亮王剑锋聂海新
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products