Verifiable searchable encryption method

A search method and search path technology, applied in the field of verifiable encrypted search, to achieve the effect of low overhead and fewer communication rounds

Active Publication Date: 2018-05-15
SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (2) Privacy
This problem is a serious one, but few studies have considered it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable searchable encryption method
  • Verifiable searchable encryption method
  • Verifiable searchable encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described in detail below in conjunction with specific embodiments and with reference to the drawings.

[0030] The system framework of the verifiable encrypted search scheme includes two entities: client and server. The client uploads the verification index (index) corresponding to its data to the cloud; the cloud server (server) provides storage, search and verification services for the client; after the client searches Verify the search results returned by the cloud server. As follows, before describing the working process of the system, the signs and meanings of some concepts that will be used in this specific implementation are given.

[0031]

[0032] The workflow of the system is defined as follows:

[0033] KGen C (1 k )→(K 1 ,K 2 }: is the probability calculation operation performed by the Client. Its input is a security parameter, and its output is a symmetric key set K 1 ,K 2 .

[0034] Init C (K 1 ,K 2 ,D)→{λ}: is the initiali...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verifiable searchable encryption method. The verifiable searchable encryption method comprises the steps that: U1, a client calculates a reverse index according to a file set, and calculates a set of key value pairs for each keyword in the reverse index; each set of key value pairs is inserted into an MPT tree structure; and the root hash of the MPT tree structure is calculated and stored; U2, the client uploads an initialized MPT tree to a server, and uploads updated key value pairs to the server when the file set is updated; U3, the client sends a challenge token tothe server, and receives a searching result and reference information used for verification returned by the server; U4, the client matches the sent challenge token with the reference information, andreconstructs the root hash of the MPT tree structure according to a matching result; and U5, the reconstructed root hash is compared with the root hash stored by the client. According to the searchable encryption method disclosed by the invention, the freshness attack and the integrity attack due to the fact that the server is dishonest can be verified at the same time; the application range is relatively wide; and the overhead is low.

Description

【Technical Field】 [0001] The present invention relates to the field of encrypted search, in particular to a verifiable encrypted search method. 【Background technique】 [0002] Cloud storage allows users to access data anytime and anywhere, and greatly facilitates data sharing between users. But at the same time, cloud storage brings many security issues, which can be divided into the following two categories in general: [0003] (1) Availability (availability). The cloud server is required to ensure that data is not lost, and users can use the cloud as a data hub for data backup and synchronization. At present, general cloud service providers use multiple copies to ensure data availability, that is, multiple copies of data are written to other storage nodes. When one node fails, data on other nodes continue to provide services, and at the same time Through the data copy in other nodes, the data lost on the failed node can be quickly recovered. At present, related academic resea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/06H04L9/08H04L9/32H04L29/08G06F17/30
CPCG06F16/245H04L9/00H04L9/0643H04L9/0894H04L9/3236H04L67/1097
Inventor 李琦朱洁王骞
Owner SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products