Searchable public key encryption method

A public key encryption, public key technology, applied in the field of searchable public key encryption, can solve problems such as the difficulty of circular privacy DLP

Inactive Publication Date: 2015-08-19
SHAANXI NORMAL UNIV
View PDF5 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The user's circular privacy problem is b

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Searchable public key encryption method
  • Searchable public key encryption method
  • Searchable public key encryption method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0034] The present invention will be further described in detail below through specific embodiments:

[0035] The searchable public key encryption method of the present invention specifically includes the following steps:

[0036] (1) The data owner, receiver and cloud server respectively initialize the operating environment, specifically:

[0037] The data owner, receiver and cloud server run the initialization algorithm respectively, the initialization algorithm is GlobalSetup(λ), GlobalSetup(λ) is:

[0038] After entering the safety parameter λ, GlobalSetup(λ) outputs a global parameter GP={G,G 1 ,e,H 1 ,H 2 ,g,q}; where e is a bilinear mapping, G and G 1 Is the multiplicative cyclic group of prime q; e: G×G→G 1 Is an admissible bilinear map; H 1 And H 2 Are two hash functions, and H 1 And H 2 Treated as two random fable machines, and H 1 :{0,1} * →G, H 2 :G→{0,1} λ (Where λ is a safety parameter), g is a generator of group G.

[0039] (2) The owner of the data first defines a recei...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a searchable public key encryption method. Firstly, a receiver set is defined, a data owner selects keywords, a file is encrypted by the adoption of an encryption algorithm, the keywords are encrypted by the adoption of a searchable public key encryption scheme, the data owner employs information of the to-be-assigned receiver to generate keyword ciphertext, and the keyword ciphertext and the encrypted data file are stored in a cloud server. If the data owner can confirm that those users can access their own data, a special trap door is sent to each confirmed receiver. As long as the receiver obtains his own trap door, the receiver can generate the correct keyword trap door, and the server can find out the searched file. According to the method, the searchable public key encryption scheme for supporting a plurality of receivers is designed in a public key encryption environment, the security of the keyword ciphertext and the keyword trap door can both be satisfied, and the membership privacy of the assigned receivers can be protected by the scheme.

Description

technical field [0001] The invention belongs to the technical field of data encryption, and relates to an encryption method, in particular to a searchable public key encryption method based on a cloud computing environment. Background technique [0002] In cloud computing, users hope to save their data on cloud servers, so as to achieve the purpose of sharing their data with different users, so that users do not need to be burdened by complicated storage management problems. Moreover, cloud storage provides users with many unprecedented conveniences, such as storage without geographical restrictions, acquisition of wireless storage capabilities, and transfer of security risks. However, due to economic interests or political factors, cloud service providers are very interested in user data, so they are likely to be suspected of spying on user privacy. Faced with these untrusted cloud service providers, users prefer to encrypt their data before storing it on the cloud server,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L29/08G06F17/30
Inventor 邵志毅杨波
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products