Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Connection keyword authentication searchable encryption method based on national cryptographic algorithm

A national secret algorithm and encryption method technology, which is applied in the field of domestic password keyword encryption, can solve the problems of system security impact and search efficiency reduction

Active Publication Date: 2020-11-13
NANJING UNIV OF SCI & TECH
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the public key searchable encryption scheme does not require a private key when generating a secure index, so keyword guessing attacks have a great impact on system security.
In addition, the existing schemes that can resist keyword guessing attacks are rarely able to efficiently support concatenated keyword searches, and often introduce a large number of bilinear pairing operations in the keyword index generation stage, which greatly reduces the search efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Connection keyword authentication searchable encryption method based on national cryptographic algorithm
  • Connection keyword authentication searchable encryption method based on national cryptographic algorithm
  • Connection keyword authentication searchable encryption method based on national cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention is described in further detail now in conjunction with accompanying drawing.

[0041] In order to succinctly express the relationship between the document-keyword set-security index in the present invention, the relationship among the three is listed in Table 1 below.

[0042] Table 1

[0043]

[0044] Concrete steps of the present invention are:

[0045] Step 1: Initialization algorithm: the authorization center inputs security parameters, runs the initialization algorithm, and generates two prime numbers q order cyclic group , and the bilinear map , where e needs to satisfy the following three properties:

[0046] (1) Bilinear: for any element , any element ,Have , in is the group of integers modulo q;

[0047] (2) Non-degenerate: if ,in , then there is ,Right now ;

[0048] (3) Computability: There is an effective algorithm for any element , can be calculated ;

[0049] Step 1.2: Authorization center selects group...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a connection keyword authentication searchable encryption method based on a national cryptographic algorithm. The method comprises the following steps of: (1) initializing analgorithm; (2) generating a public and private key pair; (3) generating an encryption key through key negotiation; (4) encrypting a document; (5) generating a security index; (6) sending a security list to a cloud server; (7) generating a search token; (8) generating search results; (9) comparing the results; (10) circulating; (11) feeding back the search results; and (12) obtaining a plaintext result. Connection keyword search is supported, it is ensured that a security index can only be generated by a data sender, and keyword guessing attacks of the cloud server are resisted. It is ensured that the token is only matched with the security index sent by the data sender, the ciphertext of the data sender is obtained, the method does not involve bilinear pairing operation with large calculation expenditure when the keyword index is generated, and only one-time bilinear pairing operation is needed when the search token is generated.

Description

technical field [0001] The invention relates to a searchable encryption method for connection keyword authentication based on a national secret algorithm, and belongs to the technical field of domestic password keyword encryption methods. Background technique [0002] Since 2020, the novel coronavirus pneumonia has caused more and more companies to shift their working methods to remote work. Remote work requires that enterprise employees can share files and edit documents collaboratively. This function can be realized by cloud storage service providers that support online document editing (such as Dropbox, Tencent Cloud, Google Cloud, etc.). With cloud storage, developers and enterprises can enjoy global highly durable storage services and flexible access mechanisms through the Internet. Any user can upload their work documents to the enterprise's public cloud, and other team members can access the cloud disk to view and edit the documents. Although cloud storage provides ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/31G06F16/953G06F21/60H04L9/08H04L9/30H04L29/06
CPCG06F21/602G06F16/316G06F16/953H04L9/0819H04L9/0838H04L9/0861H04L9/3073H04L63/0435
Inventor 许春根梅琳程晋雪徐磊
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products