Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Searchable Attribute-Based Encryption Method Against Keyword Guessing Attacks

An attribute-based encryption and keyword technology, applied in the field of cloud computing security, can solve the problem of not being able to resist keyword guessing attacks, and achieve the effect of resisting guessing attacks

Active Publication Date: 2022-05-24
FUJIAN NORMAL UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most ABKS schemes cannot resist keyword guessing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Searchable Attribute-Based Encryption Method Against Keyword Guessing Attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described below with reference to the accompanying drawings and embodiments.

[0038] It should be noted that the following detailed description is exemplary and intended to provide further explanation of the application. Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0039] It should be noted that the terminology used herein is for the purpose of describing specific embodiments only, and is not intended to limit the exemplary embodiments according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural as well, furthermore, it is to be understood that when the terms "comprising" and / or "including" are used in this specification, it indicates that There are features, steps, operations, devices, components and / ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a searchable attribute-based encryption method against keyword guessing attacks, and a cloud storage provider (CSP) is responsible for data storage and providing keyword retrieval for legitimate users in the system. The authorization center is responsible for system initialization, key generation, ciphertext and key update operations. The data owner is responsible for uploading the ciphertext data of its specified access structure. The data user obtains its private key or updated private key from the authorization center, downloads the ciphertext from the cloud storage provider (CSP), and successfully decrypts the ciphertext if and only if its attribute list matches the access structure embedded in the ciphertext. After the receiver decrypts the ciphertext, the data user can retrieve the ciphertext by submitting the encrypted keywords to the cloud storage provider. The invention can not only realize fine-grained access control and ciphertext retrieval in cloud environment, but also can resist keyword guessing attack.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a searchable attribute-based encryption method against keyword guessing attacks. Background technique [0002] Cloud computing allows users to upload encrypted files to a cloud server and then download them locally when needed. In addition, uploaded encrypted files can also be shared with other users. With the increase of uploaded files, users need to search encrypted files to download ciphertexts of interest. Public key encryption with keyword search allows users to search for encrypted keywords without revealing search information. However, most public key encryption schemes for keyword searches are aimed at many-to-one environments, where multiple senders use a single recipient's public key to generate ciphertext. For different receivers, the sender needs to encrypt the file with their public key, and then the receiver uses his private key to generate a tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08G06F16/22G06F16/242
CPCH04L63/1441H04L63/10H04L9/0825G06F16/2291G06F16/242
Inventor 李继国张亦辰王敏章如愿康曌哲
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products