Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity-based encryption method and system supporting multi-keyword search

An identity encryption and multi-keyword technology, which is applied in digital transmission systems, transmission systems, public keys for secure communications, etc., can solve the problems of user data information leakage, support only single keyword search, and increase communication costs, etc.

Inactive Publication Date: 2019-12-20
HOHAI UNIV
View PDF11 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method has the following significant disadvantages: (1) this method only supports single keyword search
Since the word search only allows the user to send a search request for one keyword at a time, this is extremely inconsistent with the application requirements of multi-word search in real life, especially when a single keyword cannot accurately locate the data ciphertext desired by the user. The limitation of word search may require the user to use different keywords to conduct multiple rounds of search, or after a round of ciphertext search, decrypt the returned results, and search for the target file by searching on the plaintext
This not only increases the cost of communication, reduces the efficiency of point search, but also brings extremely poor operating experience to users
(2) Existing studies have shown that using a single-keyword search encryption scheme for multi-word searches may allow the server to infer relevant information about user ciphertexts, resulting in the leakage of user data information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based encryption method and system supporting multi-keyword search
  • Identity-based encryption method and system supporting multi-keyword search
  • Identity-based encryption method and system supporting multi-keyword search

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0075] The identity-based encryption method supporting multi-keyword search in the present invention can be realized based on bilinear pairing. The following first briefly introduces the basic definition of bilinear pairing and the properties it satisfies.

[0076] Let G 1 and G 2 are two prime cyclic groups of order q, where P is the group G 1 generator of . hypothetical group G 1 and G 2 The discrete logarithm problem on is difficult. If group G 1 and G 2 A map on e:G 1 ×G 1 →G 2 Satisfying the following three properties, the mapping is said to be an effective bilinear pairing. Among them, the bilinear pair e:G 1 ×G 1 →G 2 is the Cartesian product G 1 ×G 1 to group G 2 The mapping, that is, the bilinear pair e:G 1 ×G 1 →G 2 Representative function z=e(x,y), where x,y∈G 1 is an independent variable, z∈G 2 as the dependent var...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based encryption method and system supporting multi-keyword search. The method comprises the steps of generating public parameters and a master key of the system, generating a secret key of a server, generating a public key and a private key pair of the server, generating a private key of a user, generating a keyword ciphertext, generating a keyword trap door and testing. The invention further provides an identity-based encryption system supporting multi-keyword search. The identity-based encryption system comprises a system parameter generation module, a server key generation module, a server initialization module, a user key generation module, a keyword ciphertext generation module, a trap door generation module and a test module. According to the technical scheme, the operation efficiency of the system is improved, and the problem of ciphertext information leakage possibly caused by multi-word search based on an identity encryption method by utilizing single keyword search is avoided.

Description

technical field [0001] The invention relates to the technical field of data encryption in information security, in particular to an identity-based encryption method and system supporting multi-keyword search. Background technique [0002] Keyword search encryption technology allows users to search encrypted data without revealing relevant plaintext and keyword information. Boneh et al first proposed a public key encryption with keyword search method in 2003. Public key encryption with keyword search mainly involves three entities, namely sender, receiver and storage server. The sender first uses the traditional public key encryption technology to encrypt the data to be shared, and attaches the keyword ciphertext generated by the public key encryption technology with keyword search to form a searchable data ciphertext, and then encrypts the searchable data The file is sent to the storage server. In order to retrieve the data ciphertext in the storage server, the receiver f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30
CPCH04L63/0442H04L9/3006
Inventor 陆阳魏晶曹永明申琛
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products