Third-Party Ciphertext Retrieval Method Based on File Name
A file name and ciphertext technology, applied in special data processing applications, instruments, electrical digital data processing, etc., can solve problems such as difficulty in adapting to file application scenarios, affecting data security, leaking user privacy, etc., to improve security, Simple operation and user data protection effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] Below in conjunction with accompanying drawing and specific example the present invention will be described in further detail:
[0043] Such as figure 1 As shown, the ciphertext retrieval system network includes the data owner and the third party, the third party is used to store user data, and the user interacts directly with the third party. The data owner encrypts his files and file names and uploads them to a third-party server for storage. When a query is required, the query keywords are encrypted and then sent to the server for query, and the server returns the query results. The data in the entire query process exists in the form of ciphertext, which can protect the security of user data.
[0044] refer to figure 2 , the specific steps of the third party ciphertext retrieval method based on the file name of the present invention include as follows:
[0045] Step 1. User generates key
[0046] The user randomly generates four different keys: the first is the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


