Attribute-based connection keyword search method in multi-data owner environment

A technology for data owners and owners, applied in the field of keyword search, can solve problems such as reducing the computing cost of the client and increasing the number of keywords linearly

Active Publication Date: 2020-05-19
NORTHWESTERN POLYTECHNICAL UNIV
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problem that the size of the trapdoor grows linearly with the number of keywords and reduce the computing cost of the client, the present invention provides an attribute-based connection keyword search method in a multi-owner environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-based connection keyword search method in multi-data owner environment
  • Attribute-based connection keyword search method in multi-data owner environment
  • Attribute-based connection keyword search method in multi-data owner environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Now in conjunction with embodiment, accompanying drawing, the present invention will be further described:

[0050] Consider a cloud storage system that implements join keyword search and fine-grained access control. The system includes multiple data owners, multiple query users, cloud servers and trusted authorization centers. The trusted authorization center is responsible for system initialization, generating system public parameters and master keys, and at the same time generating attribute private keys for query users. Data owners manage files and generate indexes. Query users to generate trapdoors for searching. The cloud server stores file ciphertext and file index, and uses powerful computing power to help users search.

[0051] The parameters involved in this method are defined as:

[0052] Table 1 Parameter definition

[0053]

[0054] The following are the specific implementation steps:

[0055] 1. System initialization.

[0056] Let H: {0, 1) * → ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an attribute-based connection keyword search method in a multi-owner environment, which comprises the following steps of keeping the length of a trap door unchanged when the number of keywords is linearly increased by using an aggregation technology; encrypting a keyword set by adopting a linear secret sharing matrix (LSSSS) type access structure, so that the calculation efficiency is relatively high on the premise of ensuring the expressive force; and meanwhile, the search results are sorted by utilizing the correlation scores, so that the search accuracy is improved.

Description

technical field [0001] The invention relates to a keyword search method, in particular to an attribute-based connection keyword search method in a multi-data owner environment. Background technique [0002] The document "Attribute Encryption Scheme Supporting Keyword Arbitrary Link Search, Journal of Communications, 2016 (8): 77-85" discloses an attribute-based keyword arbitrary link search method. This method uses polynomial equations to realize the keyword arbitrary connection query without fixing the keyword position, which makes the keyword connection search more flexible; at the same time, combined with attribute-based encryption technology, it realizes fine-grained access control, and each index is used by multiple query users. Search reduces the network bandwidth and processing overhead of sending nodes brought about by fine-grained access control. However, in this method, the size of the trapdoor increases linearly with the number of keywords, and it is difficult to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F16/14G06F16/13
CPCG06F21/6227G06F21/602G06F16/148G06F16/156G06F16/13G06F2221/2107
Inventor 李慧贤杨葆哲马勇庞辽军穆群英刘黎明
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products