Unlock instant, AI-driven research and patent intelligence for your innovation.

A Searchable Public Key Encryption Method

A public key encryption and public key technology, applied in the field of searchable public key encryption, can solve the problems of circular privacy DLP difficulties, and achieve the effect of protecting member privacy and satisfying security.

Inactive Publication Date: 2018-02-13
SHAANXI NORMAL UNIV
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The user's circular privacy problem is based on the difficulty of the DLP problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention is described in further detail below by specific embodiment:

[0035] The searchable public key encryption method of the present invention specifically comprises the following steps:

[0036] (1) The data owner, receiver and cloud server initialize the operating environment respectively, specifically:

[0037] The data owner, receiver and cloud server run the initialization algorithm respectively. The initialization algorithm is GlobalSetup(λ), and GlobalSetup(λ) is:

[0038] After inputting the security parameter λ, GlobalSetup(λ) outputs a global parameter GP={G,G 1 ,e,H 1 ,H 2 ,g,q}; among them, e is a bilinear map, G and G 1 is a multiplicative cyclic group whose order is a prime number q; e:G×G→G 1 is an admissible bilinear map; H 1 and H 2 are two hash functions, H 1 and H 2 as two random oracles, and H 1 :{0,1} * →G,H 2 :G→{0,1} λ (where λ is a security parameter), and g is a generator of the group G.

[0039] (2) The data owne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a searchable public key encryption method. Firstly, a set of receivers is defined, a data owner selects a keyword, an encryption algorithm is used to encrypt a file, and then a searchable public key encryption scheme is used to encrypt the keyword. The data owner uses the information of the designated recipient to generate the keyword ciphertext, and saves the keyword ciphertext and the encrypted data file on the cloud server. If the data owner can confirm that those users can access their data, a special trapdoor is sent for each identified recipient. Only by getting its own trapdoor can the recipient generate the correct keyword trapdoor, and then the server can find out the searched file. The present invention designs a searchable public key encryption scheme supporting multiple receivers in the environment of public key encryption, which not only satisfies the security of keyword ciphertext, but also meets the security of keyword trapdoor; and our scheme can protect designated recipients Membership privacy.

Description

technical field [0001] The invention belongs to the technical field of data encryption, and relates to an encryption method, in particular to a searchable public key encryption method based on a cloud computing environment. Background technique [0002] In cloud computing, users hope to save their data on cloud servers, so as to achieve the purpose of sharing their data with different users, so that users do not need to be burdened by complicated storage management problems. Moreover, cloud storage provides users with many unprecedented conveniences, such as storage without geographical restrictions, acquisition of wireless storage capabilities, and transfer of security risks. However, due to economic interests or political factors, cloud service providers are very interested in user data, so they are likely to be suspected of spying on user privacy. Faced with these untrusted cloud service providers, users prefer to encrypt their data before storing it on the cloud server,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L29/08G06F17/30
Inventor 邵志毅杨波
Owner SHAANXI NORMAL UNIV