Multi-keyword searchable encryption method supporting numerical attribute comparison

A technology of numerical attributes and encryption methods, applied in the field of information security

Active Publication Date: 2018-06-12
XIDIAN UNIV
View PDF5 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] A large number of ciphertext policies are searchable and the access control policies of encryption technology only support the situation that text attributes or numerical attributes are equal, which brings great limitations to practical applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-keyword searchable encryption method supporting numerical attribute comparison
  • Multi-keyword searchable encryption method supporting numerical attribute comparison
  • Multi-keyword searchable encryption method supporting numerical attribute comparison

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0052] Such as figure 1 As shown, the present invention provides a multi-keyword searchable encryption method that supports numerical attribute comparison, comprising the following steps:

[0053] Step 1, system initialization: such as figure 1 As shown in ① in , the third-party trusted entity TTP generates the public parameter pm and the master key msk according to the security parameter k, where:

[0054] Public parameter pm={G,G T ,e,p,g,h 1 ,H 2 , g a , g b , g c}, master key msk={a,b,c};

[0055] where G is the additive cyclic group of order p, g is the generator of G, and G T is the p factorial cyclic group, e is the bilinear map G×G→G T , H 1 Indicates that the collection {0,1} * Hash function mapped to the additive cyclic group G of order p, H 2 Indicates that the collection {0,1} * Mapped to the integer ring Z of order p ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-keyword searchable encryption method supporting numerical attribute comparison, the method is used for realizing multi-keyword searchable encryption of numerical attribute comparison under a cloud storage background, establishing an effective ciphertext index through a searchable encryption technology and realizing multi-keyword ciphertext retrieval; the method notonly can quickly locate a ciphertext document which a user is interested in, but also saves bandwidth resource and improves user experience; through an attribute encryption technology of a ciphertextstrategy, the method realizes fine-grained access control, the user can perform ciphertext retrieval only for legitimate data, and 0 coding and 1 coding are executed for a numerical attribute of an access control strategy; and the method can support numerical attribute comparison and has more wide application scenarios.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to an attribute encryption technology of a ciphertext strategy, in particular to a multi-keyword searchable encryption method supporting numerical attribute comparison. Background technique [0002] With the rapid development of cloud computing, cloud storage is widely used in more and more fields. Data users store a large amount of private information in cloud servers, which greatly reduces the management and maintenance costs of local data. However, there are serious security risks in storing data in the cloud server in the form of plain text. The usual solution is to encrypt the data before uploading to the cloud server. Searchable encryption technology has become a research hotspot in cloud computing. This technology enables data users to perform keyword query operations on ciphertext without decrypting the ciphertext. The data owner builds a ciphertext index based ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/08H04L9/30H04L9/32
CPCH04L9/0643H04L9/0833H04L9/0869H04L9/3026H04L9/3236H04L63/0435H04L63/06H04L63/10H04L63/107
Inventor 苗银宾马建峰伍祈应王祥宇
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products