An attribute-based system and decryption method for keyword searchable outsourced key generation and decryption

A key generation, keyword technology, applied in the field of information security

Active Publication Date: 2019-07-12
HOHAI UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the order of magnitude of data stored in the cloud increasing, how to efficiently find user-specified data from a large amount of data stored in the cloud has become a difficult problem that has to be faced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An attribute-based system and decryption method for keyword searchable outsourced key generation and decryption
  • An attribute-based system and decryption method for keyword searchable outsourced key generation and decryption
  • An attribute-based system and decryption method for keyword searchable outsourced key generation and decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0061] The attribute-based system of keyword searchable outsourced key generation and decryption in the present invention can be realized based on bilinear pairings. The following briefly introduces the related concepts of bilinear pairings and the properties to be satisfied:

[0062] Order G 1 , G 2 is a multiplicative cyclic group of order p, where p is a prime number and g is G 1 generator of . Suppose G 1 and G 2 The discrete logarithm problem on both groups is hard. Define the bilinear map on the group as: e:G 1 ×G 1 →G 2 , and satisfy the following properties:

[0063] 1. Bilinear.e(u a ,v b )=e(u,v) ab , for all u,v∈G 1 ,a,b∈Z p * and g∈G 1 are established.

[0064] 2. Non-degenerate. e(u,v)≠1, where 1 is G T The identity element of , there exists u,v∈G 1 .

[0065] 3. Computability. Efficient algorithms exist to compute ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an outsourced key generation and decryption property-based system capable of realizing keyword search. The outsourced key generation and decryption property-based system capable of realizing the keyword search comprises a public parameter setting server, a user private key generation server, an outsourced user private key generation server, a trap door generation server, an encryption server, an outsourced decryption server and a decryption server, wherein the public parameter setting server is in charge of generating a system master key and public parameters; the user private key generation server is in charge of generating a private key pair and a local user private key; the outsourced user private key generation server is in charge of generating an outsourced user private key; the trap door generation server is in charge of assisting a user to generate an inquiry password and a trap door; the encryption server is in charge of encrypting a message and generating corresponding ciphertext and keyword indexes; the outsourced decryption server is in charge of decrypting an outsourced part of the ciphertext according with user right and searching for matching ciphertext by adopting the trap door submitted by the user; and the decryption server decrypts partially decrypted ciphertext, so that the message is restored. The invention provides a method for searching ciphertext matched with keywords.

Description

technical field [0001] The invention belongs to the field of information security, relates to network security data encryption technology, in particular to an attribute-based system and a decryption method capable of keyword searchable outsourced key generation and decryption. Background technique [0002] Attribute-based encryption methods enable fine-grained access and control over encrypted data. Attribute-based encryption methods mainly include two types, namely policy attribute-based encryption method and ciphertext policy attribute-based encryption method. In the key policy attribute-based encryption method, the user's private key is associated with an access structure, and the ciphertext is associated with an attribute set, if and only if the attribute set associated with the ciphertext satisfies the access structure of the user's private key , the user can decrypt to obtain the plaintext. The association relationship between the access structure and the attribute s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/18H04L9/30
Inventor 李继国林啸楠张亦辰李非非王瑶
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products