Certificateless public key searchable encryption method and certificateless public key searchable encryption system

An encryption method, certificateless technology, applied in the field of information security

Active Publication Date: 2020-07-28
STATE GRID SHANDONG ELECTRIC POWER +1
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The main purpose of the present invention is to provide a searchable encryption method and system without a certificate public key, aiming to solve how to provide a searchable en

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless public key searchable encryption method and certificateless public key searchable encryption system
  • Certificateless public key searchable encryption method and certificateless public key searchable encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0107] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0108] The symbols of the embodiments of the present invention are described as follows:

[0109] p: a large prime number.

[0110] A collection of integers consisting of 1,2,...,p-1.

[0111] G 1 , G 2 , G T : A cyclic group of order p.

[0112] g, group G 1 and G 2 generator of .

[0113] Group G 2 elements in .

[0114] g u , Group G 1 , G 2 middle element g and to the power of u.

[0115] e: from G 1 ×G 2 to G T The bilinear pairing map of .

[0116] h 0 (·), h 1 (·), h 2 (·), h 3 (·), h 4 (·), h 5 (·), h 6 ( ): One-way hash function.

[0117] s: The system master key secretly held by the key generation center (KGC, key generation center).

[0118] P pub : The system master public key disclosed by KGC, the calculation formula is P pub =g s .

[0119] sig=(KeyGen,Sign,Verify)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a certificateless public key searchable encryption method and a certificateless public key searchable encryption system. The certificateless public key searchable encryption method does not need to be based on a random oracle machine model; the system comprises a secret key generation center, a data sending end, a data receiving end and a cloud server, and the secret key generation center is responsible for generating part of private keys for the data sending end, the data receiving end and the cloud server; the data sending end is responsible for encrypting the data; the data receiving end is responsible for generating a trap door of a keyword to be retrieved; and the cloud server is responsible for storing and retrieving ciphertext data. Public and private key pairs are added to the data sending end and the cloud server, trap door transmission can be conducted through a public channel, attacks of keyword guessing can be resisted, the ciphertext data retrievalfunction is achieved, and meanwhile the indistinguishability of ciphertext data and the indistinguishability of a trap door are guaranteed.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a searchable encryption method and system without a certificate public key. Background technique [0002] Public key searchable encryption is an encryption mechanism that realizes the retrieval function of ciphertext data, and it can realize the function that users can retrieve ciphertext data according to keywords. The data sender first encrypts its own data with the public key of the data receiver, and then uploads the ciphertext data to the cloud server. The data receiver uses its own private key to generate a trapdoor for keywords to be retrieved, and submits the trapdoor to Finally, the cloud server matches the trapdoor with the stored ciphertext data and returns the matched data. [0003] Public key searchable encryption technology was proposed by Boneh et al. in 2004. Compared with symmetric searchable encryption, it does not require the data sender and data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/06H04L9/30H04L29/06
CPCH04L9/0825H04L9/0869H04L9/0643H04L63/0442H04L9/3073
Inventor 王勇李磊马强管荑李慧聪田大伟耿玉杰刘勇林琳马米米何德彪罗敏
Owner STATE GRID SHANDONG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products