Rapid ciphertext retrieval method and system capable of resisting statistical analysis attack

A statistical analysis, ciphertext technology, applied in the field of information security, can solve the problem of sensitive information leakage, and achieve the effect of low communication cost, fewer interactions, and high security

Active Publication Date: 2015-05-20
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

By deciphering a large number of keywords, the attacker can guess the ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Rapid ciphertext retrieval method and system capable of resisting statistical analysis attack
  • Rapid ciphertext retrieval method and system capable of resisting statistical analysis attack
  • Rapid ciphertext retrieval method and system capable of resisting statistical analysis attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0085] In this embodiment, the client side selects four hash functions, uses a 20-bit bit string to represent the document index, and has five documents to be uploaded.

[0086] The flow process of this embodiment is as follows:

[0087] 1. The client generates the key and related parameters for the aes256 encryption algorithm, and selects 4 mutually independent hash functions h 1 ,..., h 4 , where h i :{0,1} * →[1,20], i∈[1,4].

[0088] 2. The keyword lists of each document in document set D are:

[0089] D. 1 ={"china","computation","university","science"}

[0090] D. 2 ={"china","computation","university"}

[0091] D. 3 ={"china","computation"}

[0092] D. 4 ={"china","university"}

[0093] D. 5 ={"china","science"}

[0094] to document D 1 The keywords in the list do the following:

[0095] 1) Calculate h 1 ("china")=2,h 2 ("china")=9,

[0096] h 3 ("china")=14,h 4 ("china") = 20;

[0097] 2) Calculate h 1 ("computation")=1,h 2 ("computation")=6,

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a rapid ciphertext retrieval method and system capable of resisting a statistical analysis attack, and belongs to the technical field of information safety. According to the method and system, rapid retrieval of mass of ciphertext documents can be achieved, and the statistical analysis attack can be effectively resisted. The system comprises a cloud storage system and a plurality of client sides, and the client sides are connected with the cloud storage system through a network. On the basis of the principle, after the client sides carry out initial index setting on documents hopefully uploaded by users on client sides, a false index is firstly set up, then, random filling is carried out on a real index and the false index to generate a safety index, and therefore statistical information of the documents can be effectively hidden, and the aim of resisting the statistical analysis attack is achieved. The method specifically comprises (1) system initialization, (2), ciphertext index setting and (3) document retrieval. The system and method have the advantages that the retrieval efficiency is high, accuracy is high, the communication cost is low, the statistical information of the documents can be effectively hidden, and the statistical analysis attack can be resisted.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a fast ciphertext retrieval method and system capable of resisting statistical analysis attacks. Background technique [0002] With the rapid development of cloud computing technology, more and more enterprises and organizations store massive amounts of data that need to be processed in cloud storage systems. Since cloud service providers actually have priority access to data, in order to prevent system vulnerabilities or data leaks caused by insiders, users generally use encryption technology to protect sensitive data, that is, users encrypt data locally and then upload it to the cloud storage system. When the user needs to access the data, the data is downloaded to the local and then decrypted. At present, several cloud service providers such as Lenovo and Wuala have provided ciphertext cloud storage services. [0003] Ciphertext retrieval can help us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30G06F21/60
Inventor 迟佳琳惠榛洪澄张敏冯登国
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products