Unlock instant, AI-driven research and patent intelligence for your innovation.

A Searchable Encryption Method Based on Bilinear Pairing

A bilinear pairing and encryption method technology, applied in the field of network information security, can solve the problems that efficiency and security cannot be guaranteed at the same time, and achieve the effects of improving efficiency, ensuring security, and protecting personal privacy

Active Publication Date: 2020-08-04
FUJIAN NORMAL UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a searchable encryption method based on bilinear pairing to solve the problem that the efficiency and security cannot be guaranteed simultaneously in the public key searchable encryption scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Searchable Encryption Method Based on Bilinear Pairing
  • A Searchable Encryption Method Based on Bilinear Pairing
  • A Searchable Encryption Method Based on Bilinear Pairing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] A kind of searchable encryption method based on bilinear pairing, is characterized in that, comprises steps:

[0040] Step S100, initialization;

[0041] choose a bilinear pairmap and three one-way collision-resistant hash functions h 2 :G 2 →{0,1} logq , where (G 1 ,+) and (G 2 ,×) are respectively the additive cyclic group and the multiplicative cyclic group whose order is a prime number q, {0,1} * is a collection of binary strings of any length, {0,1} logq is a collection of binary strings of length logq, where logq is the logarithm of q to base 2, and g is G 1 generator of is G 2 generator of

[0042] Step S101, the server generates a server public-private key pair, and sends the server public key to the sending end and the receiving end;

[0043] Among them, the server generates the server public-private key pair specifically includes: selecting a random number Calculate Y=yg and generate the server's public key pk s =Y, and the server's private...

Embodiment 2

[0055] In the mail system, the searchable encryption method based on bilinear pairing designed by the present invention is tested, and the configuration of the simulation platform adopted in the test is as follows: Operating system: Ubuntu 10.10; CPU: Pentium (R) T4400; Internal memory: 2.00GB RAM; hard disk: 250GB / 5400rpm; programming language: C.

[0056] refer to figure 2 After receiving the public key of the mail server and the public key of the mail recipient, the mail sender encrypts the keyword of the mail according to the method of step S103 in the first embodiment, and then sends the encrypted mail to the mail server and attaches the encrypted Keyword: When the mail receiver wants to search for mails containing a certain keyword, based on the server public key received from the mail server and its own private key, the keyword is encrypted according to the mode of step S104 in the first embodiment, and the keyword is generated The threshold of the keyword is sent to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a searchable encryption method based on the bilinear pairing. The method includes that a sending end encrypts keywords using a public key of a receiving end and a public key of a server based on the bilinear pairing; the receiving end generates, when in need of searching a message including a certain keyword, a threshold of the keyword using the public key of the server and a private key of the receiving end based on the bilinear pairing, and then sends the threshold to the server through a common channel; and the server searches the encrypted message using a private key of the server and the received threshold, and returns the corresponding message back to the receiving end. The method can allow a user to search encrypted data from a third party, without the need of establishing a secure channel between the server and the receiver since an attack cannot attack after the theft of the threshold, thereby ensuring the security of both the ciphertext and the threshold, the efficiency of the method in the practical application is effectively increased, and the personal privacy of the user is well protected.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a searchable encryption method based on bilinear pairs. Background technique [0002] With the rapid development of cloud computing, more and more enterprises and individuals choose to store data on cloud servers to achieve more optimized resource allocation and more efficient management. In order to protect the privacy and security of data, users usually encrypt the data before uploading it to the cloud server. However, when the user needs to search for these encrypted data, the user will download all stored data from the server to the local, and then decrypt all the encrypted data, and then further find the desired data. This will consume huge computing and communication costs, and it is also a great burden for users with limited local storage space. [0003] In order to solve the problem of directly retrieving encrypted data without disclosing any user data inform...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L29/06
CPCH04L9/3073H04L63/062
Inventor 伍玮王亭亭周赵斌
Owner FUJIAN NORMAL UNIV