Verifiable database encryption retrieval method and system based on secret sharing

A secret sharing and database technology, applied in digital transmission systems, transmission systems, digital data protection, etc., can solve problems such as cumbersome methods, low efficiency, and troublesome inspections

Active Publication Date: 2018-11-06
SOUTH CHINA AGRI UNIV
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method of construction is very cumbersome, and it is also very

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable database encryption retrieval method and system based on secret sharing
  • Verifiable database encryption retrieval method and system based on secret sharing
  • Verifiable database encryption retrieval method and system based on secret sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0193] Using n=3, t=2 secret sharing, process a student information table, as shown in the following table:

[0194]

[0195] Then, the server randomly generates a raw allocation vector table:

[0196]

[0197] At the same time, for the data attr of the same attribute, if attr i >attr j , the coefficient a of the polynomial corresponding to the data must also have a i >a j ; then, generate the following polynomial, as shown in the following table:

[0198]

[0199] Afterwards, according to the original allocation vector table, data encryption on different servers is realized. For example: the allocation vector of server 1 is (2, 3, 3), all, server 1 mainly stores the following contents (the same applies to other servers), as shown in the following table:

[0200]

[0201] The data owner uploads a list of user access rights, encrypts the original assignment, and uploads it to a different server.

[0202] Now there are mainly 3 users, and the access permission ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verifiable database encryption retrieval method based on secret sharing. The method comprises the steps that a database is established; to-be-encrypted data is stored into the database, and encryption is performed through secret sharing; a data accessor permission chart is made, data accessor permissions are determined, and the data accessor permission chart is stored into the database through Chinese remainder theorem processing; modulus solving is performed on the encrypted data, and check codes corresponding to attributes in each column are generated and uploaded to servers; and data accessors access the servers, wherein the data accessors with permissions can solve the data, and the data accessors without permissions cannot solve the data. According to the method, secret sharing and the Chinese remainder theorem are combined, the remainder of modulus solving performed by each piece of data on a corresponding allocation value is used as one check code, andon the basis of not reconstructing f(x), information on the servers is verified separately; and when part of the information has an error, which server has an error can be pointed out in combination with other servers, and error information can be corrected quickly and easily.

Description

technical field [0001] The invention relates to the research field of database encrypted retrieval, in particular to a verifiable database encrypted retrieval method and system based on secret sharing. Background technique [0002] Secret sharing technology is a method of assigning a secret to a group of participants. Under this treatment, a single shared value is meaningless, and the password must be reconstructed using some subset of the participants' shared values. [0003] The (t,n) secret sharing proposed by Shamir is mainly as follows: the secret value s needs to be processed; first, t-1 coefficients are randomly generated, which are: a 0 ,a 1 ...a t-1 ; Then, using these coefficients, construct a polynomial f(x)=a t-1 x t-1 +a t- 2 x t-2 +..+a 1 x 1 +a 0 , where a 0 =s; Next, assign an x ​​to n servers i , put x i Substitute into f(x) to get a f(x i ), and finally put f(x i ) to the server. In fact, such a process is equivalent to storing a point in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62H04L9/08H04L29/06H04L29/08
CPCH04L9/085H04L63/10H04L63/101H04L63/105H04L63/20H04L67/1097G06F21/602G06F21/6227
Inventor 李西明梁晓健郭玉彬胡月明杜治国马莎黄琼
Owner SOUTH CHINA AGRI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products