Multi-key searchable encryption method and system based on attribute access control structure

A technology of access control and encryption method, which is applied in the field of cryptography and secure data sharing, and can solve problems such as data owner attacks

Active Publication Date: 2021-02-19
SOUTH CHINA UNIV OF TECH
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this kind of attack is limited to authorized users who have access to the same file, but cannot attack the data owner. This is because the data owner encrypts with k1, and the authorized user Encrypted with k2, the authority value generated by the data owner when searching his own documents is instead of and only can match the data owner's file

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-key searchable encryption method and system based on attribute access control structure
  • Multi-key searchable encryption method and system based on attribute access control structure
  • Multi-key searchable encryption method and system based on attribute access control structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0077] This embodiment discloses a multi-key searchable encryption method based on an attribute access control structure. The method is applied in a multi-key searchable encryption system based on an attribute access control structure. The system model is as follows figure 1 As shown, there are mainly four types of participants: an authority (Trusted Authority, TA), a cloud server (Cloud Server, CS), multiple data owners (Data Owner, DO) and multiple data users (Data User ,DU).

[0078] Among them, the authoritative organization (TA) is a third-party trusted organization, which is responsible for the generation of system public parameters and user attributes.

[0079] The cloud server (CS) is a designated server, which is honest and curious, that is, it can honestly execute instructions and return correct results, but it may actively collect and analyze user data, such as data owner's files, file indexes, data The attribute set of the user, the keyword of the query, etc.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-key searchable encryption method and system based on an attribute access control structure, and the method comprises the steps: dividing an attribute set through employing a VBTree under the background of cloud storage, binding the attribute set with the access authority of a file, and effectively determining whether a user is a legal user or not and a file set which can be accessed by the user according to an attribute set submitted by the user. Huge expenditure for traversing all files of a data owner once when the user is verified to be the legal user or notis avoided; meanwhile, combined query of multiple keywords is achieved, so that a query result is more flexible and accurate; and the data owner does not need to generate an authorization key for eachauthorized user and each file which can be accessed by the authorized user, and only needs to generate an authorization key for each authorized user.

Description

technical field [0001] The invention relates to the technical field of cryptography and security data sharing, in particular to a multi-key searchable encryption method and system based on an attribute access control structure. Background technique [0002] Due to many advantages such as economy, convenience, and strong scalability, cloud computing has been a research hotspot among scholars in recent years. It provides a good platform for users to share data. In practical applications, in order to protect user privacy and realize secure data sharing, it is necessary to implement security protection measures for the data sharing platform. For example, in a healthcare system, different medical research institutions and hospitals need to share a large amount of medical data to provide treatment plans for patients, obtain medical statistics and promote the development of scientific research. At this time, patient data can be uploaded to Shared on cloud server. However, in suc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F16/176
CPCG06F21/602G06F21/6218G06F16/176
Inventor 李婉华徐玲玲
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products