Searchable public key encryption method, system employing method and server

A public key encryption and server technology, applied in the field of cryptography and cloud storage security, can solve problems such as high efficiency of ciphertext data, achieve the effect of simple algorithm, guarantee semantic security, and reduce the complex cryptographic operation process

Active Publication Date: 2018-06-22
HUAZHONG UNIV OF SCI & TECH
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing PEKS schemes have great efficiency problems in both the generation of searchable ciphertext and the retrieval of ciphertext data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Searchable public key encryption method, system employing method and server
  • Searchable public key encryption method, system employing method and server
  • Searchable public key encryption method, system employing method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] refer to figure 1 , this embodiment discloses a searchable public key encryption method. In the case of no conflict or contradiction, preferred implementation manners of other embodiments may serve as supplements to this embodiment.

[0056] According to a preferred embodiment, the method of the present invention may include step 100: construct a bilinear map according to preset security parameters, and output a public parameter PK and a private key SK. Preferably, the public parameter PK is public. That is, anyone can obtain the public parameter PK. For example, sender A and / or server B. The private key SK is kept secretly by the receiver C. It should be noted that the public parameter PK may be called the master public key PK in some other documents, and the private key SK is called the master private key SK, or adopt other equivalent names mentioned in the present invention. As long as it is consistent with the idea expressed in the present invention, it should ...

Embodiment 2

[0077] This embodiment is a further improvement on Embodiment 1, and repeated content will not be repeated here. In the case of no conflict or contradiction, preferred implementation manners of other embodiments may serve as supplements to this embodiment.

[0078] According to a preferred embodiment, the method of the present invention may further include: a keyword extraction step.

[0079] Preferably, the keyword extraction step includes: obtaining a file to be encrypted; extracting keywords from the file to be encrypted according to a preset keyword sample set, the keyword sample set includes keywords of different granularities; keyword is used as the keyword of the file to be encrypted. Obtaining keywords in this way is efficient and complete, and avoids the problem that sender A misses mentioning, wrong keywords, or receiver C and sender A have inconsistent understanding of the file, resulting in receiver C being unable to effectively retrieve relevant files. .

[008...

Embodiment 3

[0087] This embodiment is a further improvement on Embodiment 1 or 2 and their combination, and the repeated content will not be repeated. In the case of no conflict or contradiction, preferred implementation manners of other embodiments may serve as supplements to this embodiment.

[0088] refer to Figure 4 , the present invention also discloses a practical searchable public key encryption system, which is suitable for executing each method step described in the present invention, so as to achieve the expected technical effect. In this embodiment, the key distribution center D is set independently. The independent key distribution center can make the system have higher security. Especially in the case where the owners of the key distribution center D and the server B are different, the possibility of the private key being leaked by the server B can be reduced. It can also prevent the server B from checking the specific situation of the keyword W privately and intercepting...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a searchable public key encryption method, a system employing the method and a server. The method comprises the following steps that bilinear mapping is established accordingto a preset security parameter, and a public parameter PK and a private key SK are output; a sender initializes a searchable ciphertext structure according to the public parameter PK, and outputs a public part Pub of the structure and a private part Pri of the structure; the sender inputs a keyword W, the public parameter PK and the private part Pri of the structure, generates a corresponding searchable ciphertext for the keyword W through utilization of an encryption algorithm, and uploads the searchable ciphertext to the server; a receiver inputs the keyword W and the private key SK, outputsa search trap door TW and submits the search trap door TW to the server; and the server inputs the search trap door TW, the public parameter PK and a searchable ciphertext set composed of a pluralityof searchable ciphertext, performs a search algorithm, finds the searchable ciphertext corresponding to the keyword W generated through one-time bilinear mapping operation based on a first encryptionalgorithm, and finds other searchable ciphertexts based on an implication relationship.

Description

technical field [0001] The invention relates to the fields of cryptography and cloud storage security, in particular to a searchable public key encryption method, a system and a server using the method. Background technique [0002] With the rapid development of cloud computing, more and more users choose to save their data on cloud servers in order to save local storage resources and provide multi-point access. In order to ensure the confidentiality of data, users usually encrypt their private data before uploading. If traditional encryption techniques are used, only the owner of the key can decrypt the ciphertext. Therefore, when users want to retrieve outsourced data stored in the cloud by keywords, they have to download the entire ciphertext back, decrypt it locally and then retrieve it. Obviously, this will cause a lot of network overhead, local computing overhead and storage overhead. In order to achieve safe and efficient data access while ensuring the confidential...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/14H04L9/08
CPCH04L9/0863H04L9/0869H04L9/14H04L63/0428G06F16/3331H04L9/3073H04L9/083G06F21/6227H04L9/3006H04L9/0618H04L9/0643H04L9/006
Inventor 徐鹏金海贺双洪邹德清
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products