Certificate-based equality test encryption method

An encryption method and encryption algorithm technology, applied in the design of cloud computing and information security, can solve problems such as key escrow, and achieve the effect of solving privacy protection problems and avoiding certificate management and key escrow problems.

Inactive Publication Date: 2019-06-14
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The public key infrastructure-based method will cause huge overhead problems in certificate management, and the identity-based encryption method will cause secret key escrow problems
The certificate-based encryption method can perfectly solve the above two problems. So far, no researchers have proposed a certificate-based equality test encryption method.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] The implementation method of the present invention includes the following several probabilistic polynomial time algorithms.

[0011] 1) Public parameter generation algorithm: the algorithm inputs a security parameter k∈Z * , and choose the group G with order q 1 , G 2 , G T , and a bilinear pair e: G 1 ×G 2 →G T . in, is G 2 →G 1 isomorphism. Randomly selected make pick a random number and calculate P Pub =sP 1 , while calculating g=e(P 1 , P 2 ).Select 4 hash functions h 2 :G T ×G T → {0, 1} n , H 3 : {0, 1} * →G 2 , H 4 :G T ×G T →G 2 , where n>0. The plaintext space is {0, 1} n , the ciphertext space is System parameters The verifier's master key is s.

[0012] 2) Key generation algorithm: random selection SK=(SK 1 ,SK 2 ) as the user's private key, where SK 1 =x 1 ,SK 2 =x 2 .Set the corresponding public key as PK=(PK 1 , PK 2 ),in

[0013] 3) Certificate generation algorithm: input , where τ is a string identify...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a certificate-based equality test encryption method, and belongs to the technical field of cloud computing and information security. The method is characterized in that a certificate-based encryption technology is used in a constructional column to construct the method, and the certificate with a short lifetime is used in the technology, so that the tedious certificate management problem caused by a public key infrastructure encryption technology is avoided to a certain extent, and meanwhile, the key hosting problem of an identity-based encryption technology does not exist. The method is safer. Meanwhile, an equality test technology is used, and compared with a previous searchable encryption technology. The method can only be applied to the ciphertext encrypted by the same public key. In order to be more suitable for cloud servers storing different user encrypted data, the equality test encryption method can support retrieval of ciphertext encrypted by the samepublic key and can also retrieve ciphertext encrypted by different public keys.

Description

technical field [0001] The present invention is designed in the technical field of cloud computing and information security, specifically a method for comparing whether information encrypted under different public keys is consistent in a cloud environment. Background technique [0002] The popularity of cloud servers has brought revolutionary innovations to data sharing. With the help of cloud servers, cloud users can not only easily obtain useful data, but also share their own data with other users or organizations, which greatly saves their cost and time compared with the traditional way of sharing data, and brings significant benefits to society. income. However, while cloud storage technology provides users with convenient and low-cost mass storage services, there are still many problems to be solved, and security is one of them. [0003] Although the traditional data encryption technology can protect the security and integrity of the data, but in this way, the existin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 赵亚楠熊虎吴言
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products