A public key encryption method supporting multi-keyword search against keyword guess attack

A public key encryption and multi-keyword technology, applied in the field of cloud computing security, can solve problems such as lack of

Inactive Publication Date: 2018-12-25
SHANGHAI MARITIME UNIVERSITY
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is a lack of methods for online keyword guessing attacks against secure channel free public key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A public key encryption method supporting multi-keyword search against keyword guess attack
  • A public key encryption method supporting multi-keyword search against keyword guess attack
  • A public key encryption method supporting multi-keyword search against keyword guess attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] The present invention discloses a multi-keyword search public key encryption method that is resistant to keyword guessing attacks. In order to make the present invention more obvious and understandable, the present invention will be further described below in conjunction with the accompanying drawings and specific implementation methods.

[0075] Such as figure 1 with figure 2 As shown in combination, a public key encryption method supporting multi-keyword search and anti-keyword guessing attack of the present invention can be applied to a cloud computing system, which includes a cloud server, a trusted third party, a data owner and a data receiver By.

[0076] Such as figure 1 As shown, a kind of anti-keyword guessing attack of the present invention supports multi-keyword search public key encryption scheme, comprises the following steps:

[0077] S1. Data owners and data receivers register with a trusted third party and become legally authorized users.

[0078] A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a public key encryption method for supporting multi-keyword search to resist the attack of keyword guess. The method comprises the following steps: a data owner and a data receiver are registered as a legal authorized user in a trusted third party; the trusted third party runs the global parameter generation algorithm, outputs the global parameter set and sends it to the cloud server, the authorized data owner and the authorized data receiver. The data owner receives the global parameter set and sends the encrypted document set and the keyword ciphertext to the cloud server. The data receiver receives the global parameter set, constructs the keyword trap according to the query sentence, and sends the keyword trap to the cloud server. The cloud server receives the global parameter set, encrypts the ciphertext document, the keyword ciphertext and the keyword trap, and returns the satisfied ciphertext document to the authorized data recipient by running the test algorithm verification. The invention effectively solves the problem of keyword guess attack, realizes keyword search, and has obvious advantages in computational efficiency and communication cost.

Description

technical field [0001] The invention relates to cloud computing security technology, in particular to a public key encryption method supporting multi-keyword search and anti-keyword guessing attack. Background technique [0002] With the rapid development of cloud storage technology, more and more enterprises and individuals choose to store and share data in the cloud. However, due to the separation of cloud data usage rights and management rights, data owners usually encrypt sensitive data to ensure their security in the cloud. Security, which results in the loss of semantic and statistical characteristics of data that can be retrieved, resulting in the inability of cloud service providers to provide users with data search services, which greatly reduces the efficiency of cloud data sharing. [0003] The emergence of public key encryption with keyword search (PEKS, public key encryption with keyword search) provides a solution to the above problems. This technology enables ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62H04L29/08
CPCG06F21/602G06F21/6245H04L67/02
Inventor 俞云萍韩德志王军路雪毕坤
Owner SHANGHAI MARITIME UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products