Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorizable identity-based encryption method with keyword search

A technology of keyword search and encryption method, which is applied in the fields of instruments, calculations, and electrical digital data processing, etc., can solve problems such as internal keyword guessing attacks and proxyable characteristics, and achieve reduced computing and storage overhead and strong application Flexibility, the effect of ensuring information security

Active Publication Date: 2020-06-05
SOUTHWEST PETROLEUM UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, although some data searchable methods have emerged, these methods hardly have the characteristics of being resistant to internal keyword guessing attacks and being proxyable at the same time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorizable identity-based encryption method with keyword search
  • Authorizable identity-based encryption method with keyword search
  • Authorizable identity-based encryption method with keyword search

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The technical solutions of the present invention will be clearly and completely described below in conjunction with the embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0044] refer to figure 1 , the present invention provides an authorized identity-based search encryption method with keywords:

[0045] Authorizable identity-based search encryption methods with keywords include:

[0046] S1. System initialization step: setting and disclosing global parameters, the global parameters include supersingular elliptic curve parameters, hash function and bilinear pairing mapping function; the key generation center selects its own private key.

[0047] The system initialization steps include:

[0048]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authorized identity-based search encryption method with a keyword. The method comprises the following steps of: initializing a system; a user private key generation step; anauthorization certificate issuing step; generating public and private keys which can be authorized and encrypted; an encryption step with keyword search; a search trap door generation step; cloud server search test step. The method provided by the invention has an authorization function; the application flexibility is relatively high; the proxy uploading problem of searchable encrypted files canbe solved; an original data owner is supported to authorize an agent to help the agent upload a ciphertext of plaintext information and a ciphertext of a keyword to a cloud server, the characteristicof keyword guessing resistance is provided, the server cannot guess the keyword being queried by a user, and the information security of cloud data is effectively guaranteed.

Description

technical field [0001] The invention relates to the technical field of network space security, in particular to an authorizable identity-based search encryption method with keywords. Background technique [0002] With the rapid development of cloud computing, a large number of enterprises, institutions and organizations choose to store encrypted data in the cloud and retrieve the data when needed. Under this model, encrypted files are always stored on the cloud server, and cloud administrators cannot see the plaintext data content, so they cannot accurately return the expected data. When looking for data that matches a specified keyword, the traditional approach is to retrieve all data that may contain the keyword from the cloud, decrypt it, and find out the required content from the decrypted data. As the amount of data stored in the cloud increases, retrieving data is an increasingly arduous task, and at the same time poses a severe test to the user's network access bandw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/602G06F21/604G06F21/6227G06F21/6245G06F2221/2141
Inventor 张晓均唐尧黄超赵芥周子玉廖文才付红
Owner SOUTHWEST PETROLEUM UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products