Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Symmetric searchable encryption method, device, equipment and medium

An encryption method and symmetric technology, applied in the field of data search, can solve the problems of not being able to verify the latest results of the search results, not being able to realize the complete verifiability of forward-safe search results at the same time, and reducing the security of searching data stored in the cloud.

Active Publication Date: 2021-01-05
QINGDAO UNIV
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, the complete verification of the search results is performed through the MAC (Message Authentication Code, message authentication code) verification mechanism, but the MAC cannot resist replay attacks, that is, it cannot verify whether the search results are the latest results; The updated data is updated, or the data before the update is still returned as the search result after the update, which will cause the user to be unable to verify the correctness of the data
In order to solve this problem, in the prior art, the search results are also verified by constructing verification evidence based on multiple hash functions, but this method can only verify whether the files containing the search keywords are returned, and cannot verify the correctness of the returned files
On the other hand, it may be due to some malicious behavior of the cloud server or damage to software and hardware facilities, resulting in incorrect results.
Moreover, in the existing technology, forward security and complete verifiability of search results cannot be achieved at the same time, which reduces the security of searching data stored in the cloud

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetric searchable encryption method, device, equipment and medium
  • Symmetric searchable encryption method, device, equipment and medium
  • Symmetric searchable encryption method, device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In the prior art, the complete verification of the search results through the MAC verification mechanism cannot verify whether the search results are the latest results. In addition, the verification of the search results based on the construction of verification evidence based on multiple hash functions cannot verify the correctness of the returned files. Moreover, forward security and complete verifiability of search results cannot be achieved simultaneously in the prior art. In order to overcome the above problems, this application proposes a fully verifiable forward-secure symmetric searchable encryption method, which can realize complete verification of search results on the basis of ensuring forward security.

[0045]The embodiment of this application discloses a symmetric searchable encryption method, which is applied to the data client, see figure 1 As shown, the method may include the following steps:

[0046] Step S11: Encrypt the target plaintext file to obt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a symmetric searchable encryption method and device, equipment and a medium. The method comprises the following steps: encrypting a target plaintext file to obtain a ciphertextfile; creating a file index table based on the target plaintext file and a hash chain structure, wherein the file index table comprises an accumulative verification label and a continuously updated search trap door; and uploading the ciphertext file and the file index table to a cloud server, so that the cloud server feeds back the ciphertext file and the verification label corresponding to the search trap door to the search client based on the file index table after receiving the search trap door sent by the search client, wherein after the search client receives the ciphertext file and theverification label, the correctness of the ciphertext file is verified based on the verification label. According to the invention, the forward security and the complete verifiability of data search can be realized at the same time by creating the obtained file index table containing the accumulative verification label and the search trap door which is continuously updated.

Description

technical field [0001] The invention relates to the field of data search, in particular to a symmetrical searchable encryption method, device, equipment and medium. Background technique [0002] Currently, in the process of using Symmetric Searchable Encryption (SSE, Symmetric Searchable Encryption) technology to realize data search, the data stored on the cloud server is often updated. When updating the data stored on the cloud server, the file injection Attacks may occur. The cloud server will forge a file collection to induce users to encrypt, and then the cloud server will use the previous search trapdoor to match these files. If the match is successful, it means that these files contain this keyword; further, because The cloud server knows which keywords are contained in these forged files, so it can easily infer which keyword is obtained by encrypting the matching trapdoor. Forward security requires that the newly inserted file cannot match the previous search trap. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F16/13G06F16/14
CPCG06F21/602G06F16/137G06F16/152G06F16/156G06F2221/2107
Inventor 于佳刘亚如郝蓉
Owner QINGDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products