Outsourced key generation and decryption property-based system capable of realizing keyword search and decryption method

A key generation and keyword technology, applied in the field of information security

Active Publication Date: 2016-02-10
HOHAI UNIV
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the order of magnitude of data stored in the cloud increasing, how to efficiently find user-spec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Outsourced key generation and decryption property-based system capable of realizing keyword search and decryption method
  • Outsourced key generation and decryption property-based system capable of realizing keyword search and decryption method
  • Outsourced key generation and decryption property-based system capable of realizing keyword search and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0060] The technical scheme of the present invention will be further described in detail below in conjunction with the accompanying drawings:

[0061] The keyword-searchable outsourced key generation and decryption attribute-based system of the present invention can be implemented based on bilinear pairs. The following briefly introduces the related concepts and required properties of bilinear pairs:

[0062] Let G 1 , G 2 Is a multiplicative cyclic group of order p, where p is a prime number and g is G 1 Generator. Assume G 1 And G 2 The discrete logarithm problems on both groups are difficult problems. Define the bilinear mapping on the group as: e:G 1 ×G 1 →G 2 , And satisfy the following properties:

[0063] 1. Bilinear.e(u a ,v b )=e(u,v) ab , For all u,v∈G 1 ,A,b∈Z p * And g∈G 1 Both are established.

[0064] 2. Non-degeneration.e(u,v)≠1, where 1 is G T The identity element of, exists u,v∈G 1 .

[0065] 3. Computability. There are effective algorithms to calculate e(u,v), for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an outsourced key generation and decryption property-based system capable of realizing keyword search. The outsourced key generation and decryption property-based system capable of realizing the keyword search comprises a public parameter setting server, a user private key generation server, an outsourced user private key generation server, a trap door generation server, an encryption server, an outsourced decryption server and a decryption server, wherein the public parameter setting server is in charge of generating a system master key and public parameters; the user private key generation server is in charge of generating a private key pair and a local user private key; the outsourced user private key generation server is in charge of generating an outsourced user private key; the trap door generation server is in charge of assisting a user to generate an inquiry password and a trap door; the encryption server is in charge of encrypting a message and generating corresponding ciphertext and keyword indexes; the outsourced decryption server is in charge of decrypting an outsourced part of the ciphertext according with user right and searching for matching ciphertext by adopting the trap door submitted by the user; and the decryption server decrypts partially decrypted ciphertext, so that the message is restored. The invention provides a method for searching ciphertext matched with keywords.

Description

Technical field [0001] The invention belongs to the field of information security, and relates to data encryption technology for network security, in particular to an attribute-based system and decryption method for generating and decrypting an outsourcing key capable of keyword search. Background technique [0002] The attribute-based encryption method can realize fine-grained access and control of encrypted data. The attribute-based encryption methods mainly include two types, namely the policy attribute-based encryption method and the ciphertext policy attribute-based encryption method. In the key policy attribute-based encryption method, the user's private key is associated with an access structure, and the ciphertext is associated with an attribute set, if and only if the attribute set associated with the ciphertext meets the access structure of the user's private key , The user can decrypt the plaintext. In the ciphertext strategy attribute-based encryption method, the re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/18H04L9/30
Inventor 李继国林啸楠张亦辰李非非王瑶
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products