Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Searchable attribute-based encryption method for resisting keyword guessing attack

An attribute-based encryption and keyword technology, which is applied in the field of cloud computing security, can solve problems such as inability to resist keyword guessing attacks

Active Publication Date: 2020-05-12
FUJIAN NORMAL UNIV
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most ABKS schemes cannot resist keyword guessing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Searchable attribute-based encryption method for resisting keyword guessing attack
  • Searchable attribute-based encryption method for resisting keyword guessing attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0038] It should be pointed out that the following detailed description is exemplary and is intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0039] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a searchable attribute-based encryption method for resisting keyword guessing attack. A cloud storage provider (CSP) is responsible for storing data and providing keyword retrieval for legal users in a system. The authorization center is responsible for initialization of the system, generation of a secret key and updating operation of a ciphertext and the secret key. And the data owner is responsible for uploading ciphertext data of a specified access structure. The data user obtains the private key or the updated private key from the authorization center; a ciphertextis downloaded from a cloud storage provider (CSP), the ciphertext is successfully decrypted only when an attribute list of the ciphertext is matched with an access structure embedded in the ciphertext, and after a receiver decrypts the ciphertext, a data user can submit encrypted keywords to the cloud storage provider to retrieve the ciphertext. According to the method, fine-grained access control and ciphertext retrieval in a cloud environment can be realized, and keyword guessing attacks can be resisted.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a searchable attribute-based encryption method against keyword guessing attacks. Background technique [0002] Cloud computing allows users to upload encrypted files to cloud servers and then download them locally when needed. In addition, uploaded encrypted files can also be shared with other users. With the increase of uploaded files, users need to search the encrypted files to download the ciphertexts they are interested in. Public key encryption with keyword search allows users to search for encrypted keywords without revealing search information. However, most public-key encryption schemes for keyword search are aimed at a many-to-one environment, that is, multiple senders use a single receiver's public key to generate ciphertext. For different recipients, the senders need to use their public keys to encrypt the files, and then the recipients use their pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08G06F16/22G06F16/242
CPCH04L63/1441H04L63/10H04L9/0825G06F16/2291G06F16/242
Inventor 李继国张亦辰王敏章如愿康曌哲
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products