An ElGamal-based highly efficient searchable public key encryption scheme
A technology of public key encryption and scheme, which is applied to the public key and key distribution of secure communication, which can solve the problems of inability to resist offline keyword guessing attacks and low computing efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0011] The implementation of the present invention includes the following probabilistic polynomial time algorithms.
[0012] (1) Public parameter generation algorithm: The algorithm uses safety parameters As input, generate group The order is q≥2 k To generate a hash function Output common parameters Where d W It is a clear text keyword set space.
[0013] (2) Server key generation algorithm: This algorithm takes the public parameter cp as input, and is randomly selected Calculate X=g x , Output server's public key pk s = X and private key sk s =x.
[0014] (3) Recipient key generation algorithm: This algorithm takes the public parameter cp as input, randomly selected Calculate Y=g y , Output the recipient's public key pk r = Y and private key sk r = (Y, β).
[0015] (4) Keyword registration algorithm: The algorithm uses the public parameter cp and the recipient's private key sk r And keyword w as input, output registered keyword tag S w =H(w||β).
[0016] (5) Keyword encryption a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 