Method and system for encrypted retrieval of verifiable database based on secret sharing

A secret sharing and database technology, applied in digital transmission systems, transmission systems, digital data protection, etc., can solve problems such as cumbersome methods, low efficiency, and troublesome inspections

Active Publication Date: 2022-03-25
SOUTH CHINA AGRI UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method of construction is very cumbersome, and it is also very troublesome to check at the same time, and the efficiency is relatively low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for encrypted retrieval of verifiable database based on secret sharing
  • Method and system for encrypted retrieval of verifiable database based on secret sharing
  • Method and system for encrypted retrieval of verifiable database based on secret sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0193] Using secret sharing of n=3, t=2, process a student information table as shown in the following table:

[0194]

[0195] Then, the server randomly generates a table of raw allocation vectors:

[0196]

[0197] At the same time, for the data attr of the same attribute, if attr i >attr j , the coefficient a of the polynomial corresponding to the data must also have a i >a j ; then, the following polynomial is generated, as shown in the following table:

[0198]

[0199] After that, according to the original allocation vector table, data encryption on different servers is implemented. For example: the allocation vector of server 1 is (2, 3, 3), all, the following contents are mainly stored in server 1 (the same is true for other servers), as shown in the following table:

[0200]

[0201] The data owner uploads a list of user access rights, encrypts the original assignment, and uploads it to a different server.

[0202] Now there are mainly 3 users, and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verifiable database encrypted retrieval method based on secret sharing, which comprises the following steps: establishing a database; storing data to be encrypted into the database, and encrypting by secret sharing; formulating a data visitor authority form, and determining the data visitor authority , through the processing of the Chinese remainder theorem, the data accessor authority table is stored in the database; the encrypted data is moduloed, and the check code corresponding to each column attribute is generated and uploaded to the server; the data visitor accesses the server and has authority data access Those who have no authority can solve the data, and those without authority cannot solve the data; the present invention combines secret sharing and the Chinese remainder theorem, and uses the remainder of each data modulo the assigned value as a check code, without reconstructing f(x) On the Internet, the information on the server is checked independently; when some information is wrong, it can also be combined with other servers to point out which server is wrong, and quickly and easily correct the wrong information.

Description

technical field [0001] The invention relates to the research field of database encryption retrieval, in particular to a verifiable database encryption retrieval method and system based on secret sharing. Background technique [0002] Secret sharing is a method of assigning a secret to a group of participants. Under this treatment, a single shared value is meaningless, and some subset of the participants' shared values ​​must be used to reconstruct the password. [0003] The (t,n) secret sharing proposed by Shamir is mainly as follows: the secret value s needs to be processed; first, t-1 coefficients are randomly generated, which are: a 0 ,a 1 ...a t-1 ; then, using these coefficients, construct a polynomial f(x)=a t-1 x t-1 +a t- 2 x t-2 +..+a 1 x 1 +a 0 , where a 0 =s; then, to n servers, assign an x i , put x i Substitute into f(x) to get a f(x i ), and finally f(x i ) on the server. In fact, this processing process is equivalent to storing a point (x) in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62H04L9/08H04L9/40H04L67/1097
CPCH04L9/085H04L63/10H04L63/101H04L63/105H04L63/20H04L67/1097G06F21/602G06F21/6227
Inventor 李西明梁晓健郭玉彬胡月明杜治国马莎黄琼
Owner SOUTH CHINA AGRI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products