Searchable encryption method based on semantic sorting of keywords
An encryption method and keyword technology, applied in the field of cloud security, can solve the problems of inability to search, low efficiency of full-text search, and unsuitable for large-scale data cloud computing environment.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] The present invention will be further elaborated below by describing a preferred specific embodiment in detail in conjunction with the accompanying drawings.
[0039] Such as figure 1 As shown, the searchable encryption method based on keyword semantic ranking of the present invention significantly improves the performance effect in the semantic fuzzy ranking of keywords by constructing a searchable index tree, and the retrieval efficiency of authorized users is greatly improved. The detection method Contains the following steps:
[0040] Step S1, system initialization: the data owner starts from the plaintext document set F=(f 1 ,f 2 ,..., f m ) to extract keywords to get keyword set W=(w 1 ,w 2 ,...,w n ), and then generate a key SK of an encrypted plaintext document set, and send the key SK of the encrypted plaintext document set to the authorized user, where w 1 ,w 2 ,...,w n are the extracted keywords respectively;
[0041] Step S2, the data owner accordi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com