Efficient verifiable multi-keyword sequencing searchable encryption method supporting preference search and logic search

An encryption method, multi-keyword technology, applied in the field of information security, can solve problems such as need for further research, gap, single function, etc.

Active Publication Date: 2018-08-10
SOUTH CHINA UNIV OF TECH
View PDF2 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In symmetric searchable encryption, there are also many searchable encryption schemes and corresponding improvement schemes for single keyword and multiple keywords, but the functionality of these schemes is relatively single, and many of them also have great limitations. efficiency problem
At prese...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient verifiable multi-keyword sequencing searchable encryption method supporting preference search and logic search
  • Efficient verifiable multi-keyword sequencing searchable encryption method supporting preference search and logic search
  • Efficient verifiable multi-keyword sequencing searchable encryption method supporting preference search and logic search

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] This embodiment discloses an efficient and verifiable multi-keyword sorting and searchable encryption method that supports preference search and logical search, including the following three parts:

[0073] a) Data owner

[0074] The data owner is the owner of the data. It mainly performs searchable encryption preprocessing, including several steps such as key generation, document encryption, index generation, and summary generation. In order to ensure the confidentiality of the data held, the data owner needs to encrypt the document data held to obtain the ciphertext document set E. In order to make the encrypted documents searchable and ensure the efficiency of the search, the data owner needs to base on the document Set FS to build a security index At the same time, the data owner will also generate a message digest to facilitate the data user to verify the integrity and accuracy of the search results. Then, the data owner will send the encrypted ciphertext documen...

Embodiment 2

[0147] The following uses a specific example to illustrate the specific process of multi-keyword preference search. The scheme of logical search is basically similar. The formal proof of its search correctness is also given above, so I won’t go into details here. The diagonal matrix is ​​mainly used to reduce the amount of calculation, and the calculation steps are basically the same, so I won't go into details here.

[0148] (1) The content of each document in the document collection FS is as follows. It is convenient to explain the flow of the program here, and each document is very small. The entire dictionary has only 6 keywords, and 2 redundant keywords are introduced. So the entire generated dictionary size is 8.

[0149] f1.txt: python java

[0150] f2.txt: java go

[0151] f3.txt:python go

[0152] f4.txt:cpp

[0153] f5.txt:c

[0154] f6.txt:javascript

[0155] f7.txt: python cpp c

[0156] f8.txt: python go java

[0157] (2) After the generated dictionary is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an efficient verifiable multi-keyword sequencing searchable encryption method supporting a preference search and a logic search. The encryption method comprises the following steps that a data owner encrypts a document, constructs a cryptogram index based on a document collection, generates summary information of the document by utilizing a secret key and the content of thedocument, and then sends a cryptogram document, an encrypted index and the summary information to a cloud server; a data user shares the information of the secret key, which is generated by the dataowner, generates a query trap door according to a query, and sends an encrypted query trap door and the number K of to-be-obtained documents to the cloud server; the cloud server can execute safe inner product operation after receiving the cryptogram index and the query trap door, searches for K documents most relevant to the query of the user, sequences according to relevant values among the K documents and the query, then generates verification objects, and finally returns the most relevant K documents and the verification objects to the data user, and the data user verifies the correctnessand completeness of a return result through a verification algorithm.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an efficient and verifiable multi-keyword sorting and searchable encryption method supporting preference search and logic search. Background technique [0002] With the increasing popularity of cloud computing, in order to reduce the overhead of data management, storage and computing, data owners will outsource a large amount of data they own to cloud servers for storage or processing. But in this way, data ownership loses strong control over the data, so the data may be obtained and accessed by cloud servers or intruders, but these data may be confidential and private data such as medical records, government documents, etc. Although cloud servers generally claim to be safe, users generally have doubts about the security mechanisms provided by cloud servers. This concern is also an obstacle to the further development and popularization of cloud computing. [0003] A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F17/30H04L29/06
CPCG06F16/9535G06F21/602H04L63/0435H04L2463/101
Inventor 何志强唐韶华
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products