Semantic searchable encryption method for proxy re-encryption resistant to post quantum attack

A proxy re-encryption and encryption method technology, applied in the field of proxy re-encryption semantic searchable encryption against post-quantum attacks, can solve the problems of limited search authority, inability to resist quantum attacks, low query efficiency, etc., and achieve enhanced flexibility Effect

Active Publication Date: 2017-07-04
FUZHOU UNIV
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to provide a proxy re-encryption semantic searchable encryption method that is resistant to post-quantum attacks. Thi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Semantic searchable encryption method for proxy re-encryption resistant to post quantum attack
  • Semantic searchable encryption method for proxy re-encryption resistant to post quantum attack
  • Semantic searchable encryption method for proxy re-encryption resistant to post quantum attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The technical solution of the present invention will be specifically described below in conjunction with the accompanying drawings.

[0053] Such as Figure 1-3 As shown, a proxy re-encryption semantically searchable encryption method for anti-post-quantum attack of the present invention includes four entities: cloud server, proxy server, delegator and trustee, and the specific implementation of the method is as follows,

[0054] S1. New user registration: When a new user joins the system, the trusted third-party TTP will verify the user's identity; if the identity is false, TTP will reject the request; otherwise, TTP will run the following key generation algorithm to generate the public key and private key pair;

[0055] KeyGen(κ)→(pk,sk): With the security parameter κ as input, execute the TrapGen algorithm to generate a random matrix He case The basis T ∈ Z m×m , the lattice set T satisfies The secret key generation algorithm outputs the user's public key pk=...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a semantic searchable encryption method for proxy re-encryption resistant to a post quantum attack. According to the method, synonym extension is performed on a search keyword input by a user, so that relative keywords semantically similar to the original input keyword can be found, extension query is beneficial to matching more relative documents, and flexibility of search can be effectively enhanced; search permission proxy can be supported via a proxy re-encryption mechanism; a data owner utilizes unidirectional proxy re-encryption to consign own search permission to the other user, the consignee can search encrypted data of the consignor, and the consignor cannot search the data of the consignee; the function of resisting the post quantum attack is achieved by a lattice-based password technology, and security of cloud storage is improved. According to the scheme of the method provided by the invention, the problems that existing searchable schemes are low in query efficiency, limited in search permission and unable to resist quantum attack are effectively solved.

Description

technical field [0001] The invention relates to a proxy re-encryption semantic searchable encryption method against post-quantum attack. Background technique [0002] Cloud computing can provide flexible and on-demand access to shared computing resource services. More and more businesses and individuals are considering outsourcing their information and data to cloud servers. However, the characteristics of the cloud determine that users have no knowledge of the data storage location and processing process. This uncontrollability has caused users to worry about the security of sensitive information. Concerns about the privacy of personal information have become one of the main obstacles to the widespread use of cloud storage. [0003] The "encrypt first and then outsource" mechanism is one of the best ways to protect user data privacy in semi-trusted cloud servers. When data and information are encrypted into unreadable ciphertext, the cloud server cannot recover the corre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/00H04L29/08G06F21/62
CPCG06F21/6218H04L9/002H04L63/0281H04L63/0442H04L63/0478H04L63/062H04L67/10
Inventor 杨旸张煜超郑相涵叶少珍董晨邹剑
Owner FUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products