Mediated and searchable encryption method

An encryption method and index technology, applied in the field of data security storage and information search, can solve the problems of not considering user revocation and data encryption, not considering outsourcing decryption, and aggravating the computing tasks of data owners.

Active Publication Date: 2017-06-13
CHONGQING UNIV OF POSTS & TELECOMM
View PDF14 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Chinese patent CN103179114A proposes a method for fine-grained data access control in cloud storage, which realizes the revoking of user permissions, but does not consider outsourcing decryption; based on the attribute encryption mechanism, patents CN105592100A and CN104901942A provide effective privacy protection for big data methods, and all take into account outsourcing decryption and user revocation, but cannot implement search functions on encrypted data, and cannot achieve efficient user utilization
However, users need to use different encryption methods for data plaintext and keywords, which increases the calculation tasks of data owners; CN105897419A proposes a multi-user dynamic keyword searchable encryption method, but does not consider user revocation and data encryption; CN104780161A A multi-user based searchable encryption method in cloud storage is proposed, but without fine-grained control over users, and without consideration of data encryption
In addition, the author Wenhai Sun et al. proposed a searchable encryption mechanism based on attribute passwords in the document "Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud", which supports user attribute revocation, but needs to be updated All legitimate user private keys and ciphertexts make the system less efficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mediated and searchable encryption method
  • Mediated and searchable encryption method
  • Mediated and searchable encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0109] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0110] The online and offline searchable encryption mechanism based on the arbitration attribute provided by the present invention includes the following steps, see figure 1 :

[0111] S1: System initialization, generate system public parameters (including the public / private key pair of each attribute) and Mediator's public / private key pair, see figure 2 ;

[0112] Further, the step S1 includes the following steps:

[0113] S11: System initialization, input security parameter λ, generate system public parameters, system master key, where system public parameters include two order p bilinear groups G and G T , the generator g in G and the bilinear map e: G×G→G T , hash function H:{0,1} * → Z p , and the public / private key pair for each attribute, let i denote the attribute, and choose a random number t 1 ,...,t 3n ∈ Z p ,calculate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a mediated and searchable encryption method. The method comprises the following steps: S1, system initialization; S2, keyword encryption; S3, data encryption; S4, user key generation; S5, search Trapdoor generation; S6, data searching; S7, data decryption; and S8, user revocation. The mediated and searchable encryption method provided by the invention has the advantages that online and offline encryption and mediated encryption can be achieved, the method is applicable to a mobile cloud computing environment, and user permissions can be revoked instantly.

Description

technical field [0001] The invention belongs to the fields of safe storage of data and information search, and relates to an arbitration searchable encryption method. Background technique [0002] With the rapid development and wide application of technologies such as big data, cloud computing, and the Internet of Things, massive data generated by a large number of users will be uploaded to the cloud server for storage or calculation, so as to solve the problem of local servers or personal computers and mobile terminals. Insufficient computing and storage resources of other devices. Among them, the Internet of Things technology enables more intelligent terminals to join the Internet, and more data is transmitted to the cloud. However, when user data is uploaded to a third-party server, the user loses direct control over the data, and most of the existing third-party servers are operated by commercial companies, so data security and privacy face great challenges, such as per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0825H04L9/0861H04L9/088H04L63/10H04L63/101
Inventor 周静肖敏蒋明达
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products