A multi-user searchable encryption method and encryption system in the Internet of Vehicles environment

An encryption method, multi-user technology

Active Publication Date: 2022-04-05
XIDIAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the actual Internet of Vehicles environment, the number of user terminals (vehicles) is relatively large. If the same access strategy is used for all end users (vehicles), it will cause huge communication problems. Latency also has high requirements
[0007] The difficulties in solving the above problems and defects are as follows: (1) So far, there are few technical materials combining SE technology and EI technology. How to apply SE technology on the framework of EI technology to ensure the security and Execution efficiency is an issue that remains to be resolved
(2) For the SE scheme implemented on the EI framework, how to make it have fine-grained management of user permissions and verification of query results in a multi-user environment is still an important issue

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-user searchable encryption method and encryption system in the Internet of Vehicles environment
  • A multi-user searchable encryption method and encryption system in the Internet of Vehicles environment
  • A multi-user searchable encryption method and encryption system in the Internet of Vehicles environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0110] Such as figure 2 As shown, the multi-user searchable encryption method in the Internet of Vehicles environment provided by the embodiment of the present invention (the multi-user searchable encryption method based on edge intelligence in the Internet of Vehicles environment) specifically includes the following steps:

[0111] Step 1: Domain A trusted authority center TA is initialized.

[0112] 1.1) TA creates a group G whose generator is g and order is p, where p is a prime number. Simultaneously define the bilinear map e:G×G→G T . Randomly choose h 1 ∈G,α∈Z p and calculate g 1 =g α . Set up three hash functions H 1 (·),H 2 (·),H 3 ( ) and two random functions R 1 (×), R 2 (·). TA will give the public parameters in the system pp=(g,g 1 ,h 1 ), msk=α.

[0113] 1.2) TA randomly generates a private key and calculate the public key TA will public-private key pair (SK E , PK E ), (SK DO , PK DO ) are distributed to ES and DO respectively, and the pu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of wireless communication networks, and discloses a multi-user searchable encryption method and an encryption system in an Internet of Vehicles environment. A trusted authority transfers the computing burden on a cloud server to an edge server of each edge node. And the data end uses the private key to generate a query trapdoor and sends it to the edge server on the edge node; after receiving the request, the edge server matches the corresponding vector according to the index sent by the data end and the trapdoor, and sends the vector to the cloud server. The server obtains the matching file label and ciphertext data according to the vector and the hash table, searches for the signature of the keyword at the same time, and returns it to the data end; after the data end uses the signature public key to verify that the signature is correct, it uses the attribute key to decrypt the Ciphertext data, get data plaintext. The present invention protects data privacy in the Internet of Vehicles environment with high requirements for communication time delay and calculation overhead, and realizes fine-grained control of multi-user access rights.

Description

technical field [0001] The invention belongs to the technical field of wireless communication networks, and in particular relates to a multi-user searchable encryption method and an encryption system in an Internet of Vehicles environment, in particular to a multi-user searchable encryption method and encryption based on edge intelligence in an Internet of Vehicles environment system. Background technique [0002] At present, with the continuous growth of the number of motor vehicles in the world, the road carrying capacity of many cities has reached saturation, and issues such as traffic safety, travel efficiency, energy saving and emission reduction have become increasingly prominent. Smart connected vehicles are generally considered to be an important solution to the above-mentioned traffic problems. [0003] With the deep integration of the automotive industry and information and communication technology, smart cars connected through the Internet of Vehicles (IoV) have ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/03H04L9/06H04L9/30H04L9/40H04L67/10H04L67/12H04W4/40
CPCH04W12/02H04W4/40H04L9/0643H04L9/3073H04L63/0435H04L63/0478H04L63/0442H04L67/10H04L67/12H04L9/50
Inventor 樊凯王昊洋金雄海陈琪李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products