A Searchable Encryption Method Based on Bilinear Pairing
A bilinear pairing and encryption method technology, applied in the field of network information security, can solve the problems that efficiency and security cannot be guaranteed at the same time, and achieve the effects of improving efficiency, ensuring security, and protecting personal privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] A kind of searchable encryption method based on bilinear pairing, is characterized in that, comprises steps:
[0040] Step S100, initialization;
[0041] choose a bilinear pairmap and three one-way collision-resistant hash functions h 2 :G 2 →{0,1} logq , where (G 1 ,+) and (G 2 ,×) are respectively the additive cyclic group and the multiplicative cyclic group whose order is a prime number q, {0,1} * is a collection of binary strings of any length, {0,1} logq is a collection of binary strings of length logq, where logq is the logarithm of q to base 2, and g is G 1 generator of is G 2 generator of
[0042] Step S101, the server generates a server public-private key pair, and sends the server public key to the sending end and the receiving end;
[0043] Among them, the server generates the server public-private key pair specifically includes: selecting a random number Calculate Y=yg and generate the server's public key pk s =Y, and the server's private...
Embodiment 2
[0055] In the mail system, the searchable encryption method based on bilinear pairing designed by the present invention is tested, and the configuration of the simulation platform adopted in the test is as follows: Operating system: Ubuntu 10.10; CPU: Pentium (R) T4400; Internal memory: 2.00GB RAM; hard disk: 250GB / 5400rpm; programming language: C.
[0056] refer to figure 2 After receiving the public key of the mail server and the public key of the mail recipient, the mail sender encrypts the keyword of the mail according to the method of step S103 in the first embodiment, and then sends the encrypted mail to the mail server and attaches the encrypted Keyword: When the mail receiver wants to search for mails containing a certain keyword, based on the server public key received from the mail server and its own private key, the keyword is encrypted according to the mode of step S104 in the first embodiment, and the keyword is generated The threshold of the keyword is sent to ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


