Searchable encryption method for identity-based designated testers in cloud storage
A technology for specifying testers and encryption methods, applied in the field of information security, can solve problems such as leakage of user data, and achieve the effect of resisting attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] The present invention will be described in detail below in combination with specific embodiments.
[0044] The searchable encryption method of the designated tester based on the identity in the cloud storage of the present invention is specifically implemented according to the following steps:
[0045] Step 1. System parameter initialization:
[0046] Specifically follow the steps below:
[0047] Step (1.1), given the security parameter k, the public key generator PKG first generates a bilinear map e:G 1 ×G 1 →G 2 , where G 1 is a large prime number q>2 k The additive cyclic group of G 2 is a large prime number q>2 k The multiplicative cyclic group of , the public key generator PKG randomly selects the master key here and calculate P pub =s -1 P∈G 1 As the system public key, where P is G 1 generator of
[0048] Step (1.2), PKG selects 3 hash functions:
[0049] h 1 :{0,1} n →G 1 ,
[0050] h 2 :G 2 →{0,1} n ,
[0051]
[0052] Among them, n is ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


