Unlock instant, AI-driven research and patent intelligence for your innovation.

Searchable encryption method for identity-based designated testers in cloud storage

A technology for specifying testers and encryption methods, applied in the field of information security, can solve problems such as leakage of user data, and achieve the effect of resisting attacks

Active Publication Date: 2018-07-06
BEIJING ZHONGKE KAIDI SOFTWARE CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a searchable encryption method for designated testers based on identity in cloud storage, which solves the problem in the prior art that malicious cloud storage servers will leak the data searched by users during the search process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Searchable encryption method for identity-based designated testers in cloud storage
  • Searchable encryption method for identity-based designated testers in cloud storage
  • Searchable encryption method for identity-based designated testers in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in detail below in combination with specific embodiments.

[0044] The searchable encryption method of the designated tester based on the identity in the cloud storage of the present invention is specifically implemented according to the following steps:

[0045] Step 1. System parameter initialization:

[0046] Specifically follow the steps below:

[0047] Step (1.1), given the security parameter k, the public key generator PKG first generates a bilinear map e:G 1 ×G 1 →G 2 , where G 1 is a large prime number q>2 k The additive cyclic group of G 2 is a large prime number q>2 k The multiplicative cyclic group of , the public key generator PKG randomly selects the master key here and calculate P pub =s -1 P∈G 1 As the system public key, where P is G 1 generator of

[0048] Step (1.2), PKG selects 3 hash functions:

[0049] h 1 :{0,1} n →G 1 ,

[0050] h 2 :G 2 →{0,1} n ,

[0051]

[0052] Among them, n is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a searchable encryption method for specifying testers based on identity in cloud storage. The steps include: step 1, system parameter initialization; step 2, server private key generation; step 3, data receiver private key Generate; step 4, the data owner encrypts the keyword; step 5, trapdoor generation; step 6, test, the present invention enables only authorized cloud storage servers to perform storage and retrieval work, so as to resist malicious cloud storage Server attack, the data owner can encrypt their own data and the extracted corresponding keywords, and store them in the designated cloud storage server. Only the designated cloud storage server can retrieve the required ciphertext data and pass it to the data Recipients, the present invention solves the problem in the prior art that malicious cloud storage servers may leak data searched by users during the search process.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a searchable encryption method for an identity-based designated tester in cloud storage. Background technique [0002] As a new computing model, cloud computing can provide various advanced computing services with low cost and scalability. In order to save the cost of storing and managing data, enterprises and individuals can outsource data to cloud storage servers. The data provided by the cloud storage service has the advantages of availability and reliability, but it also has an obvious disadvantage, that is, the data is not under the management and control of the user, so how to maintain the confidentiality and integrity of the data becomes an urgent concern of the user. question. [0003] Although enterprises believe in the reliability, availability, fault tolerance, etc. of Cloud Storage Service Provider (CSSP), people cannot be sure that CSSP will...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/00H04L29/08G06F17/30H04L29/06
Inventor 王尚平赵宝华张亚玲
Owner BEIJING ZHONGKE KAIDI SOFTWARE CO LTD