Supercharge Your Innovation With Domain-Expert AI Agents!

A Verifiable Encrypted Search Method

A search method and search result technology, applied in the field of verifiable encrypted search, to achieve the effect of less communication rounds and less overhead

Active Publication Date: 2020-10-30
SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (2) Privacy
This problem is a serious one, but few studies have considered it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Verifiable Encrypted Search Method
  • A Verifiable Encrypted Search Method
  • A Verifiable Encrypted Search Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in further detail below in combination with specific embodiments and with reference to the accompanying drawings.

[0030] The system framework of the verifiable encrypted search scheme includes two entities, client and server, where the client uploads the verification index (index) corresponding to its data to the cloud; the cloud server (server) provides storage, search and verification services for the client; after the client searches Verify the search results returned by the cloud server. As follows, before describing the working process of the system, the symbols and the meanings of some concepts that will be used in this specific implementation are given first.

[0031]

[0032] The workflow of the system is defined as follows:

[0033] KGen C (1 k )→{K 1 ,K 2}: It is a probability calculation operation performed by the Client. Its input is a security parameter, and its output is a symmetric key set K 1 ,K 2 .

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a verifiable searchable encryption method. The verifiable searchable encryption method comprises the steps that: U1, a client calculates a reverse index according to a file set, and calculates a set of key value pairs for each keyword in the reverse index; each set of key value pairs is inserted into an MPT tree structure; and the root hash of the MPT tree structure is calculated and stored; U2, the client uploads an initialized MPT tree to a server, and uploads updated key value pairs to the server when the file set is updated; U3, the client sends a challenge token tothe server, and receives a searching result and reference information used for verification returned by the server; U4, the client matches the sent challenge token with the reference information, andreconstructs the root hash of the MPT tree structure according to a matching result; and U5, the reconstructed root hash is compared with the root hash stored by the client. According to the searchable encryption method disclosed by the invention, the freshness attack and the integrity attack due to the fact that the server is dishonest can be verified at the same time; the application range is relatively wide; and the overhead is low.

Description

【Technical field】 [0001] The invention relates to the field of encrypted search, in particular to a verifiable encrypted search method. 【Background technique】 [0002] Cloud storage enables users to access data anytime and anywhere, and greatly facilitates data sharing among users. But at the same time, cloud storage brings many security problems, which can be generally divided into the following two categories: [0003] (1) Availability. The cloud server is required to ensure that data is not lost, and users can use the cloud as a data center for data backup and synchronization. At present, general cloud service providers use multiple copies to ensure the availability of data, that is, write multiple copies of data to other storage nodes. When a node fails, the data on other nodes continues to provide services, and at the same time Quickly restore lost data on a failed node with a copy of the data in other nodes. At present, relevant academic research on data availabili...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/06H04L9/08H04L9/32H04L29/08G06F16/245
CPCG06F16/245H04L9/00H04L9/0643H04L9/0894H04L9/3236H04L67/1097
Inventor 李琦朱洁王骞
Owner SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More