Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-user encryption data comparable encryption method and encryption data method

A technology for comparing encryption and encrypting data, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve problems such as inability to achieve multi-user tag comparison, and achieve the effect that it is not easy to be attacked

Active Publication Date: 2015-10-07
SICHUAN UNIVERSITY OF SCIENCE AND ENGINEERING
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme uses symmetric encryption, which can only achieve single-user data comparison, and cannot achieve multi-user label comparison

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-user encryption data comparable encryption method and encryption data method
  • Multi-user encryption data comparable encryption method and encryption data method
  • Multi-user encryption data comparable encryption method and encryption data method

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0024] This article specifically takes the whole process from ciphertext encryption to ciphertext comparison as an example, and takes one of the feasible algorithms as an example to give a specific example.

[0025] by figure 1 As shown, in this specific embodiment, user i (using U i ) and user j (indicated by U j Representation) is described in detail as an example of comparing requests and obtaining comparison results through the cloud service platform. Before each user releases the data type of the data that can be used for comparison to the cloud service platform, it will generate a tag for the encrypted data according to the private key of the data type L of the data to be released combined with the specific private key assigned by a trusted third party . Encrypted data and label conversion information that can be used for comparison; the label is used to convert your own label into a new label by using the other party's label conversion information when it needs to be ...

specific Embodiment 2

[0105] The difference from the first embodiment is that the user U i Convert data type L and its corresponding label to information K Li Information binding (L, K Li ) is stored on the cloud server; user U j The data under the data type L needs to be connected with the user U i When comparing data of this type, the user U j Send a comparison request to the cloud server; user U i The comparison request is received by the cloud server, and if the comparison request is agreed, the cloud server converts the tag of the data type into information K Li send to user U j ; j Convert information K using tags Li Convert its label to label T Lj , then by the label T Lj Generate comparable encrypted data M Lj , and label T Lj Comparable encrypted data M Lj sent to the cloud server; the cloud server utilizes the tag T Lj For comparable encrypted data M Li and comparable encrypted data M Lj Make a comparison and send the result of the comparison to the user U j .

[0106] Th...

specific Embodiment 3

[0107] The difference from Embodiments 1 and 2 is that the user U i Convert data type L and its corresponding label to information K Li Bind and publish (L, K Li ); user U j The data under the data type L needs to be connected with the user U i When comparing data of this type, directly obtain the bound label conversion information K Li , U j Convert information K using tags Li Convert its label to label T Lj , then by the label T Lj Generate comparable encrypted data M Lj , and label T Lj Comparable encrypted data M Lj sent to the cloud server; the cloud server utilizes the tag T Lj For comparable encrypted data M Li and comparable encrypted data M Lj Make a comparison and send the result of the comparison to the user U j .

[0108] In this way user U i No need to store label conversion information K Li , and when comparing U j No need to U i send request.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multi-user encryption data comparable encryption method and an encryption data method. When a user Uj needs to compare data of an L type with the data of the L type of a user Ui, the user Uj transmits a comparison request. After the user Ui receives comparison request, the label conversion information KLi of the data of the L type is transmitted to the user Uj of the comparison request is met. The user Uj employs the label conversion information KLi, enables a label to be converted into a label TLj, and generates comparable encryption data MLj for comparison. The comparable encryption data MLi is compared with the comparable encryption data MLj, and the user Uj obtains the comparison results. The methods achieve the comparison of ciphertexts obtained through different encryption keys under the multi-user condition with different mechanisms and a condition that data decryption is not needed.

Description

technical field [0001] The invention relates to a multi-user encrypted data comparable encryption method and encrypted data comparison method, in particular to a multi-user encrypted data comparable encryption method and encrypted data comparison method suitable for the field of data encryption sharing processing. Background technique [0002] At present, Furukawa's comparable encryption solution solves the problem of leaking data information because the ciphertext space is full in order-preserving encryption, but it can only achieve single-key encryption ciphertext comparison. In the era of big data, users encrypt and store data on cloud servers. For example: multiple medical institutions encrypt their own medical data and store them on the cloud server. The data of each medical institution is encrypted with its own private key, and each medical institution does not want other medical institutions to know their own data. private key. However, in many cases, various medica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08
Inventor 叶俊苏跃斌张海燕李柳芬蓝集明唐子蛟谢翘楚
Owner SICHUAN UNIVERSITY OF SCIENCE AND ENGINEERING
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More