An Efficient Searchable Public Key Encryption Scheme Based on Elgamal
A public key encryption and scheme technology, which is applied to the public key and key distribution of secure communication, and can solve the problems of inability to resist offline keyword guessing attacks and low computing efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0011] The embodiment of the present invention includes the following probabilistic polynomial time algorithms in total.
[0012] (1) Public parameter generation algorithm: the algorithm uses security parameters As input, generate the group The order is q≥2 k , generating a hash function output public parameters where d W is the plaintext keyword set space.
[0013] (2) Server key generation algorithm: This algorithm takes the public parameter cp as input and randomly selects Calculate X = g x , output the server's public key pk s = X and private key sk s =x.
[0014] (3) Receiver key generation algorithm: the algorithm takes the public parameter cp as input and randomly selects Calculate Y=g y , output the recipient's public key pk r = Y and private key sk r =(y,β).
[0015] (4) Keyword Registration Algorithm: This algorithm uses the public parameter cp and the receiver's private key sk r And keyword w as input, output registered keyword label S w =H(w||...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

