End-to-end public key keyword searchable encryption method for cloud data transmission
An encryption method and keyword technology, applied in the field of network security, can solve the problems of low efficiency of search operations and indistinguishable search results returned, and achieve the effects of reducing computational consumption, narrowing the scope of testing, and speeding up
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.
[0049] This embodiment provides an end-to-end public key keyword searchable encryption method in cloud data transmission, the flow chart of which is as follows figure 1 shown. The end-to-end public key keyword searchable encryption system in cloud data transmission constructed in this embodiment includes the following modules, system initialization module, key generation module, keyword ciphertext encryption module, file collection management module, query Trapdoor generation module, search matching module.
[0050] 1. System initialization module:
[0051] Select the security parameter λ, and set the system public parameter P;
[0052] Set system public parameters P=T ,e,H,n,v 1 ,v 2 ,h 1,1 ,..., h 1,2n ,h 2,1 ,..., h 2,2n > The specific process is as follows:
[0053] Choose a prime number p, G and G according to the security parameter λ T ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com