Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dynamic searchable encryption method supporting multi-keyword and result sorting

A multi-keyword, encryption method technology, applied in the direction of digital data protection, file access structure, other database retrieval, etc. The effect of search efficiency

Pending Publication Date: 2020-03-24
XIDIAN UNIV
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although there are some solutions for forward and backward security, but their overhead is relatively large, how to achieve forward and backward security with a small overhead is a difficult problem
[0009] (3) In actual situations, CSP may be malicious, and CSP may return tampered data or return incomplete data after user query. How to verify the freshness and integrity of the results in time after obtaining the search data? a more difficult question
[0010] The difficulty of solving the above technical problems: (1) The implementation of forward and backward security needs to be implemented on each piece of data and query, which is also an important reason why the current relatively small overhead is relatively difficult
(2) The result verification needs to take both freshness and integrity into consideration, and it cannot generate large overhead, which is also an important reason why the current result verification is not perfect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic searchable encryption method supporting multi-keyword and result sorting
  • Dynamic searchable encryption method supporting multi-keyword and result sorting
  • Dynamic searchable encryption method supporting multi-keyword and result sorting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0070] Aiming at the problems existing in the prior art, the present invention provides a dynamic searchable encryption method supporting multiple keywords and result sorting. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0071] Such as figure 1 As shown, the dynamic searchable encryption method supporting multiple keywords and result sorting provided by the embodiment of the present invention includes the following steps:

[0072] S101: Data owner: The data owner initially selects a security parameter k, generates all corresponding keys and sends them to users thr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of wireless communication network security. The invention discloses a dynamic searchable encryption method supporting multi-keyword and result sorting. A data owner generates a corresponding keyword set according to local data, generates a file vector for each file, generates an encryption index tree, encrypts the data set through a secret key K2, and uploads the data set to a cloud service provider CSP; the data owner generates a corresponding incremental hash value for each file, and obtains an incremental hash value at the same time; the data owner generates an authenticator by using the root node hash value and the current timestamp; the user obtains a returned encrypted file set by sending the query keyword set to the CSP; and the user decrypts the ciphertext by using the key K2 and decrypts the obtained verifier by using the key K3 and the private key ssk so as to verify whether the obtained search result is correct or not. The methodis efficient and safe, can be dynamically updated, can be used for quickly searching to obtain a result, and realizes a searchable encryption function in a cloud computing environment.

Description

technical field [0001] The invention belongs to the technical field of wireless communication network security, in particular to a dynamic searchable encryption method supporting multiple keywords and result sorting. Background technique [0002] At present, the closest existing technology: With the rapid development of the Internet, network users have more and more data in their daily lives, but due to the limited local storage space of users, many users choose to store data on cloud servers. However, as a third-party cloud service provider (CSP), it cannot guarantee the security of user data, which promotes the development of cloud computing security. Users encrypt their local data and upload it to the CSP. When they want some data, they need to download all the ciphertexts before they can search. Although this saves the user's local storage space, the communication overhead of each search is Huge, in order to solve this problem, the present invention needs an encryption ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/13G06F16/901G06F16/14G06F21/62G06F21/60G06F21/64
CPCG06F16/137G06F16/9027G06F16/148G06F21/6227G06F21/602G06F21/64G06F2221/2107
Inventor 樊凯王昊洋李晖杨银堂
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products