Keyword Searchable Encryption Method Based on Bloom Filter with Storage Structure

A storage structure and encryption method technology, applied in the field of information security, can solve the problem of low efficiency of ciphertext retrieval

Inactive Publication Date: 2018-09-04
杭州共享汇信息技术有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of this invention is to provide a kind of keyword searchable encryption method based on the Bloom filter with storage structure, which solves the problem that the ciphertext retrieval efficiency of the existing encryption method existing in the prior art is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Keyword Searchable Encryption Method Based on Bloom Filter with Storage Structure
  • Keyword Searchable Encryption Method Based on Bloom Filter with Storage Structure
  • Keyword Searchable Encryption Method Based on Bloom Filter with Storage Structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0115] Assume that the user wants to store a document D containing 4 keywords: Xi’an, Hangzhou, Beijing, and Shanghai in the database, and then the user will retrieve documents containing 2 keywords: Xi’an and Hangzhou, and set the Bloom filter The size of the array M is n=12, the number of hash functions is m=3,

[0116] First, through step 1 system parameter initialization and step 2 user key generation,

[0117] (1) User upload document stage:

[0118] Use 3 different hash functions to calculate the hash values ​​of the keyword group {Beijing, Shanghai, Hangzhou, Xi'an} as follows:

[0119] Table 1 keyword hash table

[0120]

[0121] Then the ciphertext C corresponding to these 4 keywords 1 , C 2 , C 3 , C 4 added to index M

[0122]

[0123] Generate its corresponding compressed index M according to the index M (size n) * (of size n) is 111110101001,

[0124] Then store the index M of document D in the index table of the database,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a keyword searchable encryption method based on a Bloom filter with a storage structure, which the following steps: step 1, system parameter initialization; step 2, user secret key generation; step 3, retrieval index generation; and step 4, search token generation; step5,cloud storage server search on cryptograph key word. The present invention allows users to use trap door search linking with a key word to encrypt a document, allows data users to encrypt their data and store the data in the cloud storage server, when needed, the needed cryptograph data can be searched by a key word search token, and then is loaded and decoded. The present invention solves the problem of low retrieval efficiency of a conventional encryption method in the prior art.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a keyword searchable encryption method based on a Bloom filter with a storage structure. Background technique [0002] As a new computing model, cloud computing can provide various advanced computing services with low cost and scalability. In order to save the cost of storing and managing data, enterprises and individuals can outsource data to cloud storage servers. The data provided by the cloud storage service has the advantages of availability and reliability, but it also has an obvious disadvantage, that is, the data is not under the management and control of the user, so how to maintain the confidentiality and integrity of the data becomes an urgent concern of the user. question. [0003] Although enterprises believe in the reliability, availability, fault tolerance, etc. of Cloud Storage Service Provider (CSSP), people cannot be sure that CSSP will...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F17/30
CPCG06F16/334G06F21/602G06F2221/2107
Inventor 王尚平龙庚刘丽华
Owner 杭州共享汇信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products