Unlock instant, AI-driven research and patent intelligence for your innovation.

Database ciphertext comparison retrieval method based on leaky-ordering algorithm

A technology for comparing retrieval and databases, applied in the field of information security, can solve problems such as the size of leaked plaintext data

Active Publication Date: 2019-01-01
杭州弗兰科信息安全科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Using this algorithm, data matching, range query, and sorting can be performed on ciphertext data, but this algorithm leaks the size of plaintext data, and more than half of the plaintext data can be recovered after being attacked by reasoning

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database ciphertext comparison retrieval method based on leaky-ordering algorithm
  • Database ciphertext comparison retrieval method based on leaky-ordering algorithm
  • Database ciphertext comparison retrieval method based on leaky-ordering algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0054] figure 1 It is a schematic diagram of the ORE encryption algorithm based on the bits of the plaintext. The operation of each bit of plaintext data is to apply a pseudo-random function to all the bits in front of the current bit and the encryption key. The output of the pseudo-random function is added to the current The value on the bit, and then encrypt the entire plaintext data by analogy, and finally output something like Figure 1 encrypted value.

[0055] figure 2 It is a flowchart of an ORE encryption algorithm, which is explained through specific examples below:

[0056] In step s201, input the encryption key key="heming123456789" and the plaintext data to be encrypted p=1610612739=2 30 +2 29 +2 1 +2 0 , the number of bits of p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a database ciphertext comparison retrieval method based on a leakage sequence algorithm. A database agent is added between the database client and the database server to retrieve the ciphertext of the database, the database agent completes the rewriting of sql statements, Including the sensitive data in sql statement is encrypted and protected by leakage algorithm, the sensitive data comparison part is implemented by user-defined function of database, and the retrieval result is decrypted by leakage algorithm, so the ciphertext comparison and retrieval operation is completed at the server of database This ciphertext retrieval algorithm has the characteristics of high security, high encryption speed and low expansion rate.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a method for comparing and retrieving database ciphertexts based on an Order-Revealing Encryption (ORE). Background technique [0002] With the rapid development of cloud computing technology, many enterprises and individual users store data in cloud servers. In recent years, due to illegal intrusions by hackers and improper operations by cloud server administrators, there have been many leaks of user information and private data. In order to ensure data security, enterprises and individual users will use encryption algorithms to encrypt data and store the data in ciphertext on cloud servers. In this way, searchable encryption (SE) emerges as the times require. [0003] An application scenario of the present invention: a user uses a sql statement containing a WHERE comparison condition to search for records meeting the condition in a database. Since the data is stor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 杨万年牛自宾滕海明李卫明
Owner 杭州弗兰科信息安全科技有限公司