User identity encryption method based on composite number order group

A technology of user identity and encryption method, which is applied in the field of user identity encryption based on composite order groups, can solve problems such as unsatisfactory application scenarios, and achieve high security and privacy guarantee effects

Active Publication Date: 2021-05-14
CHONGQING COLLEGE OF ELECTRONICS ENG
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the cloud environment, due to the importance of some information, it is necessary to have a higher security guarantee while ensuring the searchable function, and the security algorithm under the random language machine model may not be able to meet such application scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity encryption method based on composite number order group
  • User identity encryption method based on composite number order group
  • User identity encryption method based on composite number order group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0052] figure 1 It is a schematic flow diagram of user identity encryption based on composite order groups in the present invention.

[0053] See figure 1 , the user identity encryption method based on composite number order group provided by the present invention, comprises the following steps:

[0054] (1) Initialization: The key generation center generates composite order groups, and generates public parameters and master keys according to security parameters.

[0055] (2) Key generation stage: the key generation center generates the user's private key related to the user's identity according to the public parameters, the master key and the user's identity.

[0056] (3) Encryption stage: The data sender encrypts the plaintext according to the public parameters and the identity of the receiver, and outputs the corresponding ciphertext.

[0057] (4...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identity encryption method based on a composite number order group. The method comprises an initialization stage, a secret key generation stage, an encryption stage, a decryption stage and a trap door generation stage. In the test stage, the cloud server matches every two ciphertexts according to the ciphertext and the trap door corresponding to the same identity provided by each user, if matching succeeds, '1' is output, and otherwise '0' is output. According to the user identity encryption method based on the composite number order group provided by the invention, the ciphertext of the keyword can be matched, the privacy of user data on the cloud can be ensured while the keyword search function is completed, and the certificate management problem of the user does not need to be worried about, so that the requirement of higher security guarantee of important information in cloud computing is met.

Description

technical field [0001] The invention relates to an identity-based method applied to cloud computing keyword encryption search, in particular to a user identity encryption method based on composite order groups. Background technique [0002] With the development of the Internet, more and more people and organizations begin to use the Internet and store information on the Internet, so technologies such as big data and cloud computing appear in front of people. Users outsource data to cloud services in a cloud computing environment. In order to protect user data from being leaked, it must be encrypted, and in order to effectively extract data statistics for users in the future, some information needs to be searched from encrypted data in the cloud. The proposal of this idea has led to many new security problems, such as auditing, outsourcing computing, encrypted data search, etc. [0003] After being encrypted with traditional encryption technology, it is necessary to decrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0861H04L9/0866H04L9/0825H04L9/0869H04L63/0442H04L67/10
Inventor 汪启航
Owner CHONGQING COLLEGE OF ELECTRONICS ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products