Certificateless searchable encryption method and system applied to multiple receiving ends

A multi-receiver and encryption method technology, applied in the field of information security, can solve the problems of only considering a single receiver application scenario and large computing overhead

Active Publication Date: 2020-07-14
STATE GRID SHANDONG ELECTRIC POWER +1
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing CLPEKS schemes only consider the application scenario of a single receiver
If the single-receiver scheme is directly applied to the multi-receiver scenario, the sender needs to use the public keys of multiple recipients to encrypt the data multiple times, which obviously requires a large computational overhead.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless searchable encryption method and system applied to multiple receiving ends
  • Certificateless searchable encryption method and system applied to multiple receiving ends

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0069] The symbols of the embodiments of the present invention are described as follows:

[0070] p: a large prime number.

[0071] A set of integers consisting of 1, 2, ..., p-1.

[0072] G 1 , G 2 : A cyclic group of order p.

[0073] g: for group G 1 generator of .

[0074] g u : Group G1 The u power of the element g in .

[0075] e: from G 1 ×G 1 to G 2 The bilinear pairing map of .

[0076] h 0 (·), H 1 (·), H 2 (·), h 3 ( ): Collision-resistant cryptographic hash function

[0077] s: The system master key secretly held by the key generation center (KGC, key generation center).

[0078] g pub : The system master public key published by KGC, the calculation formula is g pub =g s .

[0079] ID j : Distinguished identifier of user j.

[0080] d j : Partial private key of user j.

[0081] x...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a certificateless searchable encryption method and system applied to multiple receiving ends. The system comprises a key generation center, a sending end, a cloud server and the multiple receiving ends. The key generation center is mainly responsible for generating part of private keys of each receiving end; the sending end is responsible for generating ciphertext data; each receiving end can generate a corresponding trap door by using a private key of the receiving end, and submits the trap door to the cloud server; the cloud server is responsible for data storage andretrieval, and therefore a connection keyword retrieval function in a multi-user environment is effectively realized; via the method and the system disclosed in the invention, the data sending end canshare own data with a plurality of data receiving ends at the same time, and the sending end only needs to use the public keys of the plurality of receiving ends to encrypt the data once without encryption for many times, so that the calculation overhead of the sending end can be reduced, and the working pressure of the sending end is reduced; and meanwhile, the cloud server is ensured not to obtain any information of the plaintext from the ciphertext, and the security requirement required by the system is ensured.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a certificateless searchable encryption method and system applied to multiple receivers. Background technique [0002] Searchable encryption (SE, Searchable Encryption) is a cryptographic technology that can retrieve ciphertext data based on keywords. It can effectively realize the retrieval operation of ciphertext data without revealing any information of plaintext data. The implementation steps of SE are as follows: the data sender first extracts the keyword from the file he owns and encrypts the file and the keyword, and then uploads all the ciphertext data to the cloud server; the receiver generates a trapdoor for the keyword to be retrieved ( Encryption, decryption, a formula algorithm of a password key.), and upload the trapdoor to the cloud server; the cloud server tests whether the received trapdoor matches the ciphertext data, and finally returns the result ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06G06F16/953
CPCH04L9/0825H04L9/0866H04L9/0869H04L63/06G06F16/953
Inventor 王勇李磊马强管荑李慧聪田大伟耿玉杰刘勇林琳马米米何德彪罗敏
Owner STATE GRID SHANDONG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products