Unlock instant, AI-driven research and patent intelligence for your innovation.

An Efficient Searchable Public Key Encryption Scheme Based on Elgamal

A public key encryption and scheme technology, which is applied to the public key and key distribution of secure communication, and can solve the problems of inability to resist offline keyword guessing attacks and low computing efficiency.

Active Publication Date: 2019-08-20
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, researchers have proposed a variety of searchable public key encryption schemes, but most of the existing searchable public key encryption schemes are based on bilinear pairings, so there is a problem of low operational efficiency
And because the keyword set space is much smaller than the key space, the existing searchable public key encryption schemes cannot resist offline keyword guessing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Efficient Searchable Public Key Encryption Scheme Based on Elgamal
  • An Efficient Searchable Public Key Encryption Scheme Based on Elgamal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The embodiment of the present invention includes the following probabilistic polynomial time algorithms in total.

[0012] (1) Public parameter generation algorithm: the algorithm uses security parameters As input, generate the group The order is q≥2 k , generating a hash function output public parameters where d W is the plaintext keyword set space.

[0013] (2) Server key generation algorithm: This algorithm takes the public parameter cp as input and randomly selects Calculate X = g x , output the server's public key pk s = X and private key sk s =x.

[0014] (3) Receiver key generation algorithm: the algorithm takes the public parameter cp as input and randomly selects Calculate Y=g y , output the recipient's public key pk r = Y and private key sk r =(y,β).

[0015] (4) Keyword Registration Algorithm: This algorithm uses the public parameter cp and the receiver's private key sk r And keyword w as input, output registered keyword label S w =H(w||...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an ElGamal-based highly efficient searchable public key encryption scheme, and belongs to the technical field of cloud computing and information safety. The ElGamal-based highly efficient searchable public key encryption scheme is characterized in that an encryption technique similar to ElGamal is used to construct a keyword encryption algorithm and a trapdoor generation algorithm to avoid usage of a bilinear pairing, so that the scheme is more efficient. At the same time the scheme also uses a designated tester technique in which the test algorithm can only be correctly carried out with possession of a private key of a server, and uses a registered keyword technique in which an application for registering a keyword must be given to a receiver before the encryption of the keyword, and the keyword can only be correctly encrypted after obtaining of a tag of the registered keyword. Thanks to use of the two techniques, the scheme can resist off-line guessing attacks from external attackers and malicious servers.

Description

technical field [0001] The invention relates to the technical fields of cloud computing and information security, in particular to a scheme for efficiently searching ciphertext keywords in a cloud environment, and at the same time, the scheme can resist off-line keyword guessing attacks. Background technique [0002] In recent years, with the rapid development of cloud computing, cloud storage services have become more and more mature, and have also attracted the attention of academia and industry. More and more enterprises and individual users tend to store their data in public on the cloud server. However, while cloud storage technology provides users with convenient and low-cost mass storage services, there are still many problems to be solved, and the security problem is a problem that needs to be solved urgently. [0003] Although the traditional data encryption technology can protect the security and integrity of the data, but in this way, the existing plaintext-based...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/30
Inventor 聂旭云徐骏孙剑飞秦志光钟婷闫东杰
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA