Symmetrical searchable encryption method based on PBFT consensus mechanism

An encryption method and consensus technology, applied in computer security devices, instruments, platform integrity maintenance, etc., can solve the problems of unfair transactions between users and servers, users' inability to distinguish the authenticity and reliability of search results, and the lack of a verification mechanism for search results, etc.

Active Publication Date: 2021-05-28
SHIJIAZHUANG TIEDAO UNIV
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The original SSE scheme lacks a verification mechanism for retrieval results, resulting in a large degree of unfair transactions between users and servers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetrical searchable encryption method based on PBFT consensus mechanism
  • Symmetrical searchable encryption method based on PBFT consensus mechanism
  • Symmetrical searchable encryption method based on PBFT consensus mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The technical applications in the embodiments of the present invention are clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0063] In the following description, a lot of specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways different from those described here, and those skilled in the art can do it without departing from the meaning of the present invention. By analogy, the present invention is therefore not limited to the specific examples disclosed below.

[0064]Aiming at the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a symmetric searchable encryption method based on a PBFT consensus mechanism, and relates to the technical field of data processing methods. The method comprises the following steps: a preparation stage, a retrieval stage, a consensus stage and an updating stage. According to the method, a block chain technology and a searchable encryption technology are combined, so that the disclosure, transparency and traceability of a data retrieval process can be ensured; a symmetric searchable encryption method including data verification, data updating and node behavior supervision is established through an improved PBFT consensus, so that the transaction fairness between the user and the server can be ensured, the one-to-one correspondence between the user retrieval request and the retrieval result provided by the cloud server is ensured, and the method is real and reliable. And the credibility between the user and the cloud server can be effectively improved.

Description

technical field [0001] The invention relates to the technical field of data processing methods, in particular to a symmetric searchable encryption method based on a PBFT consensus mechanism. Background technique [0002] The advent of the information age has made data storage and sharing a hot topic for many scholars, and the emergence of cloud storage provides people with a more convenient and economical data storage method. Computing resources and storage resources on the cloud have become a kind of Internet infrastructure. Through cloud computing technology, manufacturers establish network server clusters to provide online software services, hardware rental, data storage, computing analysis and other services to different types of customers. The well-known foreign cloud service providers include Dropbox, a cloud network storage tool, Amazon simple storage service (Amazon simple storage service), and Microsoft's cloud computing platform Windows Azure. In recent years, do...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/56G06F21/60
CPCG06F21/6245G06F21/602G06F21/56
Inventor 郑丽娟吴朋钢叶绍兴周文峰史合君陈孜洋徐向东李敦岳
Owner SHIJIAZHUANG TIEDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products