Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security-enhanced connection keyword search method based on public key encryption

A technology of keyword search and public key encryption, which is applied to the public key of secure communication, secure communication device, and key distribution. question

Pending Publication Date: 2020-12-22
中国人民解放军31008部队
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the PEKS scheme only implements single-keyword search, which limits the wide application of the scheme
However, the currently proposed public key encryption scheme (Public Encryption with Conjunctive KeywordSearch, PECKS) that can realize connection keyword search may need to build a secure communication channel in advance, causing inconvenience and waste of resources, or failing to achieve provable security under the standard model Sex and resistance to keyword guessing attacks (Keyword Guessing Attack, KGA), low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security-enhanced connection keyword search method based on public key encryption
  • Security-enhanced connection keyword search method based on public key encryption
  • Security-enhanced connection keyword search method based on public key encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, content and advantages of the present invention clearer, the specific embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.

[0036] The core idea of ​​the specific structure of the SCF-PECKS scheme of the present invention comes from the IBE scheme proposed by Water [1]. In order to realize the receiver anonymity of the scheme, the present invention uses the characteristics of the asymmetric bidirectional group to improve the scheme, and based on the The anonymous IBE scheme further constructs a SCF-PECKS scheme, which has achieved better results in terms of functionality, performance and security.

[0037] as attached figure 1 and figure 2 As shown, the scheme mainly includes four components: key management authority, data owner, data visitor and search server, in which the key management authority is responsible for generating global parameters, search server key and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security-enhanced connection keyword search system based on public key encryption, which mainly comprises a key management mechanism, a data owner, a data visitor and a search server, wherein the key management mechanism is responsible for generating and publishing global public parameters, generating public and private keys of the search server and generating public andprivate keys of the data visitor; and the search server is responsible for storing the encrypted ciphertext and the search ciphertext of the data owner, receiving the search key of the data visitor and then performing data search. According to the method, the characteristics of asymmetric bilinear pairs are utilized, a safe communication channel does not need to be constructed in advance, a largenumber of calculation and communication resources are saved, and keyword guessing attacks can be effectively resisted. According to the method, safety certification is performed on a proposed scheme based on deterministic DBDH hypothesis under a standard model. Finally, the correctness and the calculation consistency of the scheme are verified, and specific functionality and performance analysis is carried out.

Description

technical field [0001] The invention belongs to the technical field of data encryption search processing, and relates to a method for searching connection keywords based on public key encryption with enhanced security. Background technique [0002] Currently, we are in an information age with rapid economic and technological development, in which more and more people choose to store their private data in cloud storage centers that may not be trusted. However, since the data is out of the actual control of the user, its security will not be effectively guaranteed. In order to solve this problem, users often choose to encrypt the data and store it in the form of ciphertext, so that even if the user's data is leaked, the security of the data can still be guaranteed. As the foundation and core technology of information security, cryptography can provide confidentiality, integrity and non-repudiation of data. Therefore, cryptography has become a key technology to solve the curre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08G06F16/903
CPCH04L9/3073H04L9/0861G06F16/903
Inventor 王光波李锋李鸿飞刘海涛王鹏程
Owner 中国人民解放军31008部队
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products