Authorized identity-based search encryption method with a keyword

A technology of keyword search and encryption method, which is applied in the direction of instruments, electronic digital data processing, digital data protection, etc., can solve the problems of not having internal keyword guessing attacks and the characteristics of proxy, so as to reduce computing and storage costs, Strong application flexibility and the effect of ensuring information security

Active Publication Date: 2019-04-12
SOUTHWEST PETROLEUM UNIV
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, although some data searchable methods have emerged, these methods hardly have the char

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorized identity-based search encryption method with a keyword
  • Authorized identity-based search encryption method with a keyword
  • Authorized identity-based search encryption method with a keyword

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0043] The technical solutions of the present invention will be clearly and completely described below in conjunction with embodiments. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative work shall fall within the protection scope of the present invention.

[0044] See figure 1 , The present invention provides an authorizable identity-based search encryption method with keywords:

[0045] Authorizable identity-based keyword search encryption methods include:

[0046] S1. System initialization step: setting and publicizing global parameters, the global parameters including parameters of super singular elliptic curve, hash function and bilinear pair mapping function; the key generation center selects its own private key.

[0047] The system initialization step includes:

[0048] S11...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authorized identity-based search encryption method with a keyword. The method comprises the following steps of: initializing a system; a user private key generation step; anauthorization certificate issuing step; generating public and private keys which can be authorized and encrypted; an encryption step with keyword search; a search trap door generation step; cloud server search test step. The method provided by the invention has an authorization function; the application flexibility is relatively high; the proxy uploading problem of searchable encrypted files canbe solved; an original data owner is supported to authorize an agent to help the agent upload a ciphertext of plaintext information and a ciphertext of a keyword to a cloud server, the characteristicof keyword guessing resistance is provided, the server cannot guess the keyword being queried by a user, and the information security of cloud data is effectively guaranteed.

Description

Technical field [0001] The invention relates to the technical field of cyberspace security, in particular to an authorizable identity-based search encryption method with keywords. Background technique [0002] With the rapid development of cloud computing, a large number of companies, institutions, and organizations choose to encrypt data and store it in the cloud, and retrieve the data when needed. Under this model, encrypted files are always stored on the cloud server, and the cloud administrator cannot see the data content in plaintext, so the expected data cannot be accurately returned. When searching for data that meets a specified keyword, the traditional method is to retrieve all the data that may contain this keyword in the cloud, decrypt it, and find out the required content from the decrypted data. As the amount of data in the cloud increases, retrieving data is an increasingly onerous task, and it also puts a severe test on users’ network access bandwidth; when the am...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/602G06F21/604G06F21/6227G06F21/6245G06F2221/2141
Inventor 张晓均唐尧黄超赵芥周子玉廖文才付红
Owner SOUTHWEST PETROLEUM UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products