Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Searchable public key encryption method

A public key encryption, public key technology, applied in the field of searchable public key encryption, can solve problems such as the difficulty of circular privacy DLP

Inactive Publication Date: 2015-08-19
SHAANXI NORMAL UNIV
View PDF5 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The user's circular privacy problem is based on the difficulty of the DLP problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Searchable public key encryption method
  • Searchable public key encryption method
  • Searchable public key encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention is described in further detail below by specific embodiment:

[0035] The searchable public key encryption method of the present invention specifically comprises the following steps:

[0036] (1) The data owner, receiver and cloud server initialize the operating environment respectively, specifically:

[0037] The data owner, receiver and cloud server run the initialization algorithm respectively. The initialization algorithm is GlobalSetup(λ), and GlobalSetup(λ) is:

[0038] After inputting the security parameter λ, GlobalSetup(λ) outputs a global parameter GP={G,G 1 ,e,H 1 ,H 2 ,g,q}; among them, e is a bilinear map, G and G 1 is a multiplicative cyclic group whose order is a prime number q; e:G×G→G 1 is an admissible bilinear map; H 1 and H 2 are two hash functions, H 1 and H 2 as two random fable machines, and H 1 :{0,1} * →G,H 2 :G→{0,1} λ (where λ is a security parameter), and g is a generator of the group G.

[0039] (2) The da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a searchable public key encryption method. Firstly, a receiver set is defined, a data owner selects keywords, a file is encrypted by the adoption of an encryption algorithm, the keywords are encrypted by the adoption of a searchable public key encryption scheme, the data owner employs information of the to-be-assigned receiver to generate keyword ciphertext, and the keyword ciphertext and the encrypted data file are stored in a cloud server. If the data owner can confirm that those users can access their own data, a special trap door is sent to each confirmed receiver. As long as the receiver obtains his own trap door, the receiver can generate the correct keyword trap door, and the server can find out the searched file. According to the method, the searchable public key encryption scheme for supporting a plurality of receivers is designed in a public key encryption environment, the security of the keyword ciphertext and the keyword trap door can both be satisfied, and the membership privacy of the assigned receivers can be protected by the scheme.

Description

technical field [0001] The invention belongs to the technical field of data encryption, and relates to an encryption method, in particular to a searchable public key encryption method based on a cloud computing environment. Background technique [0002] In cloud computing, users hope to save their data on cloud servers, so as to achieve the purpose of sharing their data with different users, so that users do not need to be burdened by complicated storage management problems. Moreover, cloud storage provides users with many unprecedented conveniences, such as storage without geographical restrictions, acquisition of wireless storage capabilities, and transfer of security risks. However, due to economic interests or political factors, cloud service providers are very interested in user data, so they are likely to be suspected of spying on user privacy. Faced with these untrusted cloud service providers, users prefer to encrypt their data before storing it on the cloud server,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L29/08G06F17/30
Inventor 邵志毅杨波
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products