Unlock instant, AI-driven research and patent intelligence for your innovation.

Two-factor Authentication Symmetric Searchable Encryption Method Based on Password and Anonymous Signcryption

A technology of two-factor authentication and encryption method, which is applied in the field of encryption, can solve problems such as unsatisfactory efficiency and no consideration of ID hiding.

Active Publication Date: 2022-06-17
FUDAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Zheng's signcryption and onepass HMQV (HOMQV) are potential solutions to our problem, but they do not consider the ID hiding problem, and their efficiency is still not satisfactory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-factor Authentication Symmetric Searchable Encryption Method Based on Password and Anonymous Signcryption
  • Two-factor Authentication Symmetric Searchable Encryption Method Based on Password and Anonymous Signcryption
  • Two-factor Authentication Symmetric Searchable Encryption Method Based on Password and Anonymous Signcryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] First, all algorithm participants should call Setup(1 λ ): Algorithm that starts with a security parameter of 1 λ For input, generate a long-term key to generate public parameters par L =(G' 1 , N, G 1 , g', q')←ɡ'(1 λ ), each participant of the algorithm saves this set of parameters and applies them to participate in subsequent operations.

[0051] Then, a long-term key generation center LK-KGC should be established, and LK-KGC calls LKeyGen(par L ,id U ) function, when LK-KGC is called, the long-term key will generate the public parameter par L and user id U ∈{0, 1} * As input, and output the user's long-term public key, private key pair (pk U , sk U ). The algorithm sets and outputs a key pair (pk U , sk U ). User ID U The binding between U and its public key U is authenticated by the certificate certA issued by the CA, which is public to all. LK-KGC sends each public key, private key pair to its corresponding user. Users save the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of encryption, in particular to a double authentication symmetrical searchable encryption algorithm based on password and hidden sign encryption. Searchable encryption technology is a cryptographic primitive that allows users to retrieve ciphertext data, using the powerful computing resources of the cloud server to search for keywords without disclosing any information that protects the data to the server. The invention provides a symmetric searchable encryption algorithm which is oriented to multiple data owners and has the properties of access control, authentication and anonymity. This algorithm enhances the function and security of the existing searchable encryption scheme, and provides the functions of user identity hiding and identity authentication, but the increase in calculation time is not obvious. Compared with the current international advanced symmetric searchable scheme, it achieves comprehensive performance advantages. This solution is suitable for most data communication systems between clients and servers.

Description

technical field [0001] The invention belongs to the technical field of cryptography, in particular to a double-authentication symmetric searchable encryption method based on a password and an anonymous signcryption. Background technique [0002] In ESORICS 2016, Sun et al. proposed an efficient non-interactive multi-client symmetric searchable encryption, which improved the CCS2013 by S. Jarecki et al by reducing the communication overhead between data owners and data users. Program. Specifically, the scheme in S. Jarecki et al.'s CCS2013 requires the data user to interact with the data owner every time a search is performed on an encrypted database, while in Sun et al.'s ESORICS 2016, no matter how many times the data user , data users must interact with data owners. Execute a query, as long as the query key is in the set of authorized keys determined by the data owner, he interacts with the owner only once. However, despite the many advantages of the scheme in Sun et al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/31
CPCG06F21/602G06F21/6227G06F21/6254G06F21/31
Inventor 王会歌赵运磊隋光烨
Owner FUDAN UNIV