Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hybrid searchable encryption method and hybrid searchable encryption system

一种加密方法、混合型的技术,应用在密码学,物联网和云存储安全领域,能够解决边服务器计算与网络资源浪费、使用成本负担、拖慢网络传输时间等问题,达到降低计算量和使用成本、降低使用成本与、提高搜索效率的效果

Active Publication Date: 2018-08-24
HUAZHONG UNIV OF SCI & TECH
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] But deploying SSE on side servers also brings another problem, that is, if a user wants to search for a keyword on all side servers, he has to use the symmetric keys of all side servers to generate SSE search traps. door, and send the trapdoor to the corresponding edge server
If the number of side servers is relatively large, then this will bring four serious problems: 1. The time it takes for the user to generate all the trapdoors will be very long, which will affect the user's search experience; 2. The size of the trapdoors generated by the user will be very large. It is very large, occupying the user's network bandwidth, slowing down the network transmission time, and affecting the user's search efficiency; 3. In order to search, the user has to manage the symmetric keys of all side servers, which causes a huge cost to the user 4. Some side servers may not have the ciphertext that the user wants to search, and in this case have to accept the user's network connection and trapdoor, and use the trapdoor Search through the door, resulting in a waste of edge server computing and network resources
[0004] The purpose of the present invention is to solve the above-mentioned problems of efficient searchable encryption in edge computing scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hybrid searchable encryption method and hybrid searchable encryption system
  • Hybrid searchable encryption method and hybrid searchable encryption system
  • Hybrid searchable encryption method and hybrid searchable encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] refer to figure 1 , this embodiment discloses a hybrid searchable encryption method. In the case of no conflict or contradiction, preferred implementation manners of other embodiments may serve as supplements to this embodiment.

[0066] This embodiment discloses a hybrid searchable encryption method, including at least one first computing device 1, and the first processor 11 of the first computing device 1 may be configured as:

[0067] Encrypting the data using the first symmetric key to obtain the first ciphertext of the data and encrypting the keywords associated with the data using the second symmetric key to obtain a searchable keyword first ciphertext associated with the first ciphertext of the data, and encrypting the first ciphertext of the data A ciphertext and keywords The first ciphertext is stored in the first memory 12 of the first computing device 1 . The first computing device of the present invention encrypts data with a first symmetric key, and encry...

Embodiment 2

[0101] This embodiment is a further improvement on Embodiment 1, and repeated content will not be repeated here. In the case of no conflict or contradiction, preferred implementation manners of other embodiments may serve as supplements to this embodiment.

[0102] refer again figure 1 , the present invention also discloses a hybrid searchable encryption system, which is suitable for executing each method step described in the present invention, so as to achieve the expected technical effect.

[0103] According to a preferred embodiment, the system may include a first computing device 1 , a second computing device 2 and a third computing device 3 . The system may comprise at least one first computing device 1 . The first processor 11 of the first computing device 1 may be configured to:

[0104] Encrypting the data using the first symmetric key to obtain the first ciphertext of the data and encrypting the keywords associated with the data using the second symmetric key to o...

Embodiment 3

[0108]This embodiment is a further improvement on Embodiments 1 and 2 or their combination, and repeated content will not be repeated here. In the case of no conflict or contradiction, preferred implementation manners of other embodiments may serve as supplements to this embodiment.

[0109] This embodiment discloses a hybrid searchable encryption method.

[0110] According to a preferred embodiment, the method of the present invention may include: the side server uses the user public key Pk to encrypt the keyword W, and outputs the PEKS ciphertext C of the keyword W W And upload it to the cloud server in the way it is associated with the side server.

[0111] According to a preferred embodiment, the method of the present invention may also include: the cloud server passes the PEKS ciphertext C when the user uses the keyword W to initiate a search request W Find the corresponding edge server uploading the keyword W and forward the search request to the corresponding edge ser...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a hybrid searchable encryption method and a hybrid searchable encryption system. In the method, at least one first computing device is provided, and a first processor of the first computing device is configured to be used for encrypting data with a first symmetrical secret key to obtain a data first ciphertext and encrypting a keyword associated with the data with a secondsymmetrical secret key to obtain searchable keyword first ciphertext associated with the data first ciphertext, storing the data first ciphertext and the keyword first ciphertext in a first memorizerof the first computing device, encrypting the keyword with the first symmetrical secret key to generate a keyword second ciphertext, encrypting the keyword with a first public key to obtain a searchable keyword third ciphertext associated with the keyword second ciphertext, and sending the keyword second ciphertext and the keyword third ciphertext to a second computing device; and a second processor of the second computing device is configured to be used for receiving the keyword second ciphertext and the keyword third ciphertext sent by the first computing device and storing the keyword second ciphertext and the keyword third ciphertext in a second memorizer of the second computing device in a manner of associating the keyword second ciphertext and the keyword third ciphertext with a identity label of the first computing device.

Description

technical field [0001] The invention relates to the fields of cryptography, Internet of Things and cloud storage security, and in particular to a hybrid searchable encryption method and system. Background technique [0002] With the rapid development of the Internet of Things technology, a large number of Internet of Things devices are increasing, and the amount of data generated per second is increasing, which poses great challenges to the network bandwidth and system processing capabilities of the current cloud computing technology. In response to this, the concept of edge computing emerged. The concept of edge computing is to set up an edge server between the IoT device and the cloud server. The role of the edge server is to store and process the data uploaded by the IoT device and provide feedback for related IoT devices. Since the edge server is closer to the IoT device and serves fewer IoT devices than the traditional cloud server center model, the edge computing tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/045H04L67/10H04L9/14H04L9/0866H04L9/3073
Inventor 金海徐鹏陈天阳陶冶
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products