Phrase-based searchable symmetric encryption method

A symmetric encryption and phrase technology, applied in the field of searchable encryption of phrases, can solve problems such as increasing network overhead

Active Publication Date: 2015-09-09
SHAANXI NORMAL UNIV
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage is that the client and the cloud server need to interact twice

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Phrase-based searchable symmetric encryption method
  • Phrase-based searchable symmetric encryption method
  • Phrase-based searchable symmetric encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] The content of file 1 to be encrypted is: w 1 ,w 2 ,w 3 ,w 4 ;The contents of file 2 to be encrypted are: w 2 ,w 1 ,w 4 ,w 3 ,w 4 ,w 3 As an example, the phrase-based searchable symmetric encryption method consists of the following steps:

[0053] 1. Client initialization

[0054] Generate global keys x, y, z; select three pseudo-random permutations ω, θ, ρ; select two pseudo-random functions g, The three pseudo-random permutations ω, θ, ρ are:

[0055] ω:{0,1} k ×{0,1} p →{0,1} p

[0056] θ:{0,1} k ×{0,1} lg(m|Δ|) →{0,1} lg(m|Δ|)

[0057] ρ : { 0,1 } k × { 0,1 } log ( m | Δ | max i { ...

Embodiment 2

[0090] The content of file 1 to be encrypted is: w 1 ,w 2 ,w 3 ,w 4 ;The contents of file 2 to be encrypted are: w 2 ,w 1 ,w 4 ,w 3 ,w 4 ,w 3 As an example, the phrase-based searchable symmetric encryption method consists of the following steps:

[0091] exist image 3 In this embodiment, steps 1 to 4 are the same as those in Embodiment 1. In step 5, when the cloud server executes the query and returns the result, after the cloud server receives the query trapdoor, it uses the set of triples in the query trapdoor to traverse the above security index. word query.

[0092] The double keyword query phrase of the present embodiment is {w 1 ,w 2}, the generated query trapdoor is The method of double keyword query is: use Find the corresponding node in the secure head node linked list, use g y (w 1 ) and the found node XOR operation to obtain θ r (s 1 ) and key k 1,0 , get θ r (s 1 ) to find the corresponding node in the secure successor list, and use the key...

Embodiment 3

[0094] The content of file 1 to be encrypted is: w 1 ,w 2 ,w 3 ,w 4 ;The contents of file 2 to be encrypted are: w 2 ,w 1 ,w 4 ,w 3 ,w 4 ,w 3 As an example, the phrase-based searchable symmetric encryption method consists of the following steps:

[0095] exist Figure 4 In this embodiment, steps 1 to 4 are the same as those in Embodiment 1. In step 5, when the cloud server executes the query and returns the result, after the cloud server receives the query trapdoor, it traverses the above-mentioned security index with the set of triples in the query trapdoor. The length of the query trapdoor is 3 triples, and three Keyword search.

[0096] The 3 keyword query phrases of the present embodiment are {w 1 ,w 2 ,w 3}, the generated query trapdoor is The method of querying 3 keywords is: use the first triple in the query trapdoor and the second triplet Perform a double-keyword query, and subtract 0 from all the position information obtained, and the result is ((i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A phrase-based searchable symmetric encryption method comprises steps of initializing a client end, generating a keyword index, generating a safety index and uploading to a cloud end server, generating an inquiry trapdoor and uploading to the clod end server, and executing inquiry and returning a result by the cloud end server. An encrypted ciphertext and the encrypted safety index are stored in the cloud end server, only file numbers and trapdoor information are mastered, during storage and inquiry operation of a cloud end, information of user storage data and information of inquired sentences are not leaked, confidentiality of the user data and an inquiry mode are ensured, the inquiry process has only one interaction, the trapdoor is uploaded, the file numbers containing the inquiry sentences are returned, a user downloads specific files to local for decryption as required, transmission of unnecessary files in a network is avoided and network expenditure is saved. The invention has the advantages of good security, less network expenditure and the like and is suitable for use in a low wideband environment.

Description

technical field [0001] The invention belongs to the technical field of data encryption, and in particular relates to a searchable encryption method for phrases. Background technique [0002] In recent years, with the rapid development of cloud computing technology, a large number of cloud service products have emerged and been widely used. For example, the cloud network storage tool Dropbox, Amazon simple storage service (Amazon simple storage service) and Microsoft's cloud computing platform Windows Azure and so on. They store data and set up a virtual system environment for users on cloud servers, and users can operate data and use hardware resources through the network anytime and anywhere. [0003] Due to its convenient and quick features, more and more users choose to migrate local data to cloud servers, so as to reduce the overhead of local management data. Since data is stored on third-party servers out of user control, user data can be accessed by third-party serve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62G06F17/30
CPCG06F16/313G06F16/3334G06F21/602G06F21/6227
Inventor 王涛杨波李晨张瑞文
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products