Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Keyword or multi-keyword based searchable encryption method and system

An encryption method and keyword technology, applied in the field of information security, can solve problems such as difficult implementation, slow encryption and decryption speed, and complex algorithms

Active Publication Date: 2017-02-15
SOUTH CHINA UNIV OF TECH
View PDF6 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the current research field of searchable encryption, although the searchable encryption scheme based on symmetric encryption has the advantages of low computational overhead, simple algorithm, and fast speed, it is only applicable to the single-user model and does not meet the requirements of various applications today. Requirements; while the searchable encryption scheme based on asymmetric encryption is suitable for multi-user models, but the existing scheme algorithms are usually more complicated, the speed of encryption and decryption is slow, and it is difficult to implement and use in practical applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Keyword or multi-keyword based searchable encryption method and system
  • Keyword or multi-keyword based searchable encryption method and system
  • Keyword or multi-keyword based searchable encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0070] This embodiment discloses a keyword searchable encryption method, the steps are as follows:

[0071] S1. System initialization, generating system disclosure coefficients under input-based security parameters. The details are as follows: the system publicity coefficient is generated under the input-based security parameter k, where the system publicity coefficient includes the multiplicative group G, the multiplicative group generator g and the bilinear map e:G×G→G T .

[0072] S2. Generate the user's public key and private key according to the first parameter randomly selected by the user and the system disclosure coefficient. The specific process is as follows:

[0073] First calculate X and Y according to the first parameters x and y randomly selected by the user, where x, y ∈ Z p ,Z p is a prime number order group, calculated to get X=g x , Y=e(g,g) y ; Then generate the user's public key PK = (X, Y), private key sk = (x, y).

[0074] S3. Encrypt the keywords ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a keyword or multi-keyword based searchable encryption method and system. The keyword based searchable encryption method comprises the following steps: generating a public key in an encryption process according to a random parameter and a system public coefficient, then encrypting a keyword in a file through the public key and a private key to obtain a keyword ciphertext, and searching the keyword ciphertext according to a keyword input by a user to obtain a ciphertext required by the user. The keyword based searchable encryption method has the advantages of low computing expense, simple algorithm, high speed and suitability for multiple user models. The multi-keyword based searchable encryption method comprises the following steps: storing all keywords of each file through a structural tree, generating the public key according to the random parameter and the system public coefficient, establishing relations between all the keywords in the file and ciphertexts of the keywords through a hidden part of the structural tree according to the public key, and encrypting to obtain all keyword ciphertexts in the file, wherein for a plurality of keywords input by the user, a cloud ciphertext required by the user can be searched only if the ciphertexts of all the keywords are searched. The multi-keyword based searchable encryption method has the advantage of higher safety.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a keyword searchable encryption system and method, and a multi-keyword searchable encryption method and system. Background technique [0002] In recent years, with the rapid development of cloud computing technology and cloud service products, cloud technology has been widely concerned, such as cloud network storage tool Dropbox, Amazon simple storage service (Amazon simple storage service) and Microsoft's cloud computing platform Windows Azure, etc. . Because of its convenient and fast features, more and more users choose to migrate local data to cloud servers to save local data management costs and system maintenance costs. However, because the data is stored in the cloud out of the user's physical control, cloud server administrators and illegal users (such as hackers and other users who do not have access rights) can try to obtain the information contained in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62H04L29/08G06F17/30
CPCG06F16/148G06F16/2246G06F21/602G06F21/6218G06F21/6227H04L67/1097
Inventor 钟彩金徐培明唐韶华
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products