Ciphertext retrieval system and method for supporting proxy re-encryption in combination with identity and attribute

A proxy re-encryption and retrieval system technology, applied in the field of ciphertext retrieval system, can solve the problem of inability to effectively realize the granting of search permissions to multiple users, and achieve the effect of improving system efficiency

Active Publication Date: 2018-08-14
NANJING UNIV OF POSTS & TELECOMM
View PDF9 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the problem of multi-user granting of search authority that cannot be effectively implemented in the identity-based searchable encryption scheme in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext retrieval system and method for supporting proxy re-encryption in combination with identity and attribute
  • Ciphertext retrieval system and method for supporting proxy re-encryption in combination with identity and attribute
  • Ciphertext retrieval system and method for supporting proxy re-encryption in combination with identity and attribute

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0060] Aiming at the problem that the existing identity-based searchable encryption method cannot realize the effective sharing of search authority, the invention introduces proxy re-encryption into the identity-based searchable encryption. And considering the fact that the authorizer needs to grant the search authority to multiple users in practical applications, an attribute-based encryption method is used in the re-encryption stage, and a ciphertext retrieval that combines identity and attributes and supports proxy re-encryption is proposed. method. When the authorized user is not online, the search authority can be safely and efficiently shared with other users through the agent, thereby improving the processing efficiency of the system.

[0061] A ciphertext retrieval system that supports proxy re-encryption in cloud computing according to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a ciphertext retrieval system and method for supporting proxy re-encryption in combination with identity and attribute. The method realizes sharing of a secure and efficient one-to-many user search authority in a cloud environment. The previous identity-based searchable encryption and proxy scheme combines identity-based proxy re-encryption with a searchable encryption scheme to implement agency for a one-to-one search authority. The scheme uses an identity-based encryption method in the initial ciphertext encryption, and adopts an LSSS linear secret shared matrix access structure in the re-encryption phase, which can authorize the ciphertext retrieval authority to other users who conform to the access structure. Therefore, the scheme supports the sharing of a moregranular user search authority and has higher computational efficiency. In the re-encryption threshold generation phase, the user key is blinded by the random value and submitted to a cloud server, ensuring the confidentiality and security of the user key.

Description

technical field [0001] The invention relates to a ciphertext retrieval system and method that combines identity and attributes and supports proxy re-encryption, and belongs to the technical field of cloud computing. Background technique [0002] Cloud computing technology is an important technology in the development of social informatization, and cloud storage technology is a new type of storage technology based on cloud computing technology. Cloud storage technology provides users with storage services through pay-as-you-go and other methods, saving users a lot of local resources. After entering the era of big data, more and more users choose to store data in the cloud. Although cloud storage has brought so many benefits, it also brings many security problems, because uploading data to the cloud deprives the data owner of direct control over private data, while cloud service providers and illegal users (such as hackers) Users who do not have access rights) can try to obt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30G06F21/62H04L29/06
Inventor 陈燕俐朱敏惠胡媛媛
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products