Unlock instant, AI-driven research and patent intelligence for your innovation.

An ElGamal-based highly efficient searchable public key encryption scheme

A technology of public key encryption and scheme, which is applied to the public key and key distribution of secure communication, which can solve the problems of inability to resist offline keyword guessing attacks and low computing efficiency

Active Publication Date: 2016-11-23
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, researchers have proposed a variety of searchable public key encryption schemes, but most of the existing searchable public key encryption schemes are based on bilinear pairings, so there is a problem of low operational efficiency
And because the keyword set space is much smaller than the key space, the existing searchable public key encryption schemes cannot resist offline keyword guessing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An ElGamal-based highly efficient searchable public key encryption scheme
  • An ElGamal-based highly efficient searchable public key encryption scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The implementation of the present invention includes the following probabilistic polynomial time algorithms.

[0012] (1) Public parameter generation algorithm: The algorithm uses safety parameters As input, generate group The order is q≥2 k To generate a hash function Output common parameters Where d W It is a clear text keyword set space.

[0013] (2) Server key generation algorithm: This algorithm takes the public parameter cp as input, and is randomly selected Calculate X=g x , Output server's public key pk s = X and private key sk s =x.

[0014] (3) Recipient key generation algorithm: This algorithm takes the public parameter cp as input, randomly selected Calculate Y=g y , Output the recipient's public key pk r = Y and private key sk r = (Y, β).

[0015] (4) Keyword registration algorithm: The algorithm uses the public parameter cp and the recipient's private key sk r And keyword w as input, output registered keyword tag S w =H(w||β).

[0016] (5) Keyword encryption a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an ElGamal-based highly efficient searchable public key encryption scheme, and belongs to the technical field of cloud computing and information safety. The ElGamal-based highly efficient searchable public key encryption scheme is characterized in that an encryption technique similar to ElGamal is used to construct a keyword encryption algorithm and a trapdoor generation algorithm to avoid usage of a bilinear pairing, so that the scheme is more efficient. At the same time the scheme also uses a designated tester technique in which the test algorithm can only be correctly carried out with possession of a private key of a server, and uses a registered keyword technique in which an application for registering a keyword must be given to a receiver before the encryption of the keyword, and the keyword can only be correctly encrypted after obtaining of a tag of the registered keyword. Thanks to use of the two techniques, the scheme can resist off-line guessing attacks from external attackers and malicious servers.

Description

Technical field [0001] The present invention relates to the technical fields of cloud computing and information security, and specifically is a scheme for performing efficient ciphertext keyword search in a cloud environment, and at the same time, the scheme can resist offline keyword guessing attacks. Background technique [0002] In recent years, with the rapid development of cloud computing, cloud storage services have become more and more mature. At the same time, they have attracted the attention of academia and industry. More and more enterprises and individual users tend to store their data in public On the cloud server. However, while cloud storage technology provides users with convenient and low-cost mass storage services, there are still many problems to be solved, of which the security problem is an urgent problem. [0003] Although the traditional data encryption technology can protect the security and integrity of the data, in this way, the existing keyword search te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08H04L9/30
Inventor 聂旭云徐骏孙剑飞秦志光钟婷闫东杰
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA