Unlock instant, AI-driven research and patent intelligence for your innovation.

A fine-grained searchable encryption method for fog computing

An encryption method and fine-grained technology, applied in the field of information security, to achieve the effect of lightweight searchable encryption and broad application prospects

Active Publication Date: 2020-10-27
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The computational and storage overhead of existing searchable encryption techniques for ciphertext policies is proportional to the complexity of access policies, which brings great limitations to IoT devices with limited computing resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A fine-grained searchable encryption method for fog computing
  • A fine-grained searchable encryption method for fog computing
  • A fine-grained searchable encryption method for fog computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0057] like figure 1 As shown, the present invention provides a fine-grained searchable encryption method for fog computing, comprising the following steps:

[0058] Step 1, system initialization: the key generation center KGC generates the public parameter pm and the master key msk according to the security parameter k, where:

[0059] public parameter

[0060] Master key msk=(x,y,{t i} i∈[1,n] );

[0061] where G is the additive cyclic group of order p, g 0 , g 1 are two different generators of G, G T is the p factorial cyclic group, e is the bilinear map G×G→G T , H 1 Indicates that the collection {0,1} * Mapped to the integer ring Z of order p p Hash function, x represents the first random number: x∈Z p , y represents the second random number: y∈Z p , t i Indicates the third random number: t i ∈ Z p , i∈[1,n] represents th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fine-grained searchable encryption method for fog computing, using the attribute encryption technology of the ciphertext strategy and the searchable encryption technology to establish a cloud-fog-end user architecture, and using the attribute encryption of the ciphertext strategy technology and searchable encryption technology, allowing fog nodes to act as agents to share the computing burden of end users. End users can quickly generate trapdoors and decrypt ciphertexts, thereby realizing lightweight searchable encryption and supporting fine-grained access control. Only legitimate data users can perform ciphertext retrieval, which has broad application prospects in actual scenarios, and realizes fine-grained access control. Only legitimate data users can perform ciphertext retrieval, and has broad prospects in practical scenarios.

Description

technical field [0001] The invention belongs to the field of information security technology, and specifically relates to attribute encryption technology of ciphertext policy and searchable encryption technology, which can be used to realize fine-grained searchable encryption under the background of fog computing. Background technique [0002] The Internet of Things is a technology that can connect objects to the Internet to make them more intelligent. With the continuous increase of networked devices, the massive data generated can be stored and calculated through cloud computing, which relieves end users from heavy equipment maintenance and data management. liberated from. However, traditional cloud computing has problems such as poor network architecture mobility and high latency, which pose great challenges to the development of the Internet of Things. Fog computing extends cloud computing to the edge of the network. Fog nodes, as the intermediary between the Internet o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/083H04L9/0861H04L9/0869H04L63/0435H04L63/06H04L63/065H04L67/10H04L67/01
Inventor 苗银宾马建峰伍祈应王祥宇
Owner XIDIAN UNIV