Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security-enhanced keyword search method based on public key encryption

A keyword search and public key encryption technology, which is applied in the field of keyword search based on public key encryption, can solve problems such as security doubts and security that need further verification

Active Publication Date: 2020-12-22
中国人民解放军31008部队
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Subsequently, several related SCF-PEKS schemes were proposed one after another, but these schemes were only proved to be safe under the random oracle model, and the random oracle model is an ideal hypothetical model, and its security needs to be further verified
Therefore, Fang et al. continued to improve the SCF-PEKS scheme, and proposed a security-enhanced SCF-PEKS scheme based on Gentry's identity based encryption scheme (IBE) in 2009, which was proved under the standard model is safe, however, the scheme is based on the complex security assumption of Decisional q-Augmented Bilinear Diffie-Hellman Exponent (q-ABDHE), and q-ABDHE is a strong assumption, and its security is still questioned

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security-enhanced keyword search method based on public key encryption
  • Security-enhanced keyword search method based on public key encryption
  • Security-enhanced keyword search method based on public key encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the purpose, content and advantages of the present invention clearer, the specific embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.

[0037] The core idea of ​​the specific structure of the SCF-PEKS scheme of the present invention comes from the IBE scheme proposed by Water. In order to realize the receiver anonymity of the scheme, the present invention uses the characteristics of asymmetric bidirectional groups to improve the scheme, and based on anonymity The IBE scheme further constructs an SCF-PEKS scheme, which achieves better results in terms of functionality, performance and security.

[0038] as attached figure 1 and figure 2 As shown, the scheme mainly includes four components: key management authority, data owner, data visitor and search server, wherein the key management authority is responsible for generating global parameters, search server key and data visitor key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security-enhanced keyword search method based on public key encryption. The invention discloses a security-enhanced keyword search system based on public key encryption, which comprises a key management mechanism, a data owner, a data visitor and a search server, and is characterized in that the key management mechanism is responsible for generating global parameters, a search server key and a data visitor key; and the search server is responsible for storing the encrypted ciphertext and the search ciphertext of the data owner, receiving the search key of the data visitor and then performing data search. By improving an existing identity encryption scheme, the anonymity of an IBE scheme is realized, a public key encryption scheme which does not need a secure channel and can realize keyword search is provided based on the IBE scheme with the anonymity, and the scheme performs security certification based on deterministic bilinear DiffieHellman hypothesis undera standard model. Finally, correctness and calculation consistency verification of a proposed scheme is given, and specific functionality and performance analysis is carried out.

Description

technical field [0001] The invention belongs to the technical field of data encryption processing, and relates to a security-enhanced keyword search method based on public key encryption. Background technique [0002] In cloud storage, log storage and mail processing systems, in order to protect stored data, most systems use encryption algorithms to encrypt and protect data. However, the encrypted data exists in the form of cipher text, and the data cannot be searched. The main technology to solve this problem is to adopt an encryption scheme for realizing keyword search. [0003] Encryption schemes that can realize keyword search can be divided into: Symmetric Encryption Scheme with Keyword Search (SEKS) and public key encryption scheme (Public Key Encryption Scheme with Keyword Search, PEKS) ). In the SEKS technical solution, the data sender and the data visitor need to share the same symmetric key, and the management and distribution of the key is very complicated and n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08G06F16/903H04L9/30
CPCH04L63/0442H04L63/0485H04L9/0861H04L9/0847G06F16/903H04L9/3073Y02D30/50
Inventor 王光波赵杰卿李锋李鸿飞樊理文
Owner 中国人民解放军31008部队
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products