Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Encrypted file searching method and device and computer readable medium

A technology for encrypting files and ciphertexts, applied in the server field, can solve problems such as lack of search authority and data leakage, and achieve the effect of reducing the risk of searching and data leakage

Active Publication Date: 2021-06-25
中诚华隆计算机技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the client that makes the search request may not have the search permission, and the search request may be initiated by a malicious attacker who obtained the search token, thus causing data leakage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted file searching method and device and computer readable medium
  • Encrypted file searching method and device and computer readable medium
  • Encrypted file searching method and device and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the following will gather the accompanying drawings in the embodiments of the present invention to clearly and completely describe the technical solutions in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0054] Such as figure 1 As shown, an encrypted file search method provided by an embodiment of the present invention includes the following steps:

[0055] Step 101: Select a first random number from the target set, and generate a public key by using the first random number and the generator in the parameters of the bilinear mappin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encrypted file searching method and device and a computer readable medium, and the method comprises the steps of selecting a first random number from a target set, and generating a public key through the first random number; generating permission verification parameters by using the public key and the public key of the authorized user side; encrypting the keyword of the encrypted file by using the public key and the public key of the authorized user side to obtain a keyword ciphertext; and enabling the cloud server to verify the deformed identity parameter sent by the authorized user side by using the authority verification parameter, and to perform keyword matching on the search trap door sent by the authorized user side by using the keyword ciphertext after the verification is passed. According to the scheme, the risk that other unauthorized user sides counterfeit the identity parameters of the authorized user side to search the encrypted file can be reduced, so that the risk of data leakage is reduced.

Description

technical field [0001] The present invention relates to the technical field of servers, in particular to an encrypted file search method, device and computer-readable medium. Background technique [0002] In the information age, more and more resources are gathered on the Internet. In order to efficiently manage and utilize Internet resources, the data owner can outsource the data and upload it to the cloud server. However, outsourcing data will bring about data security issues. Therefore, the data owner can encrypt the file and then upload it to the cloud server. But this brings up the question of how to perform keyword searches on the ciphertext. In order to solve this problem, a searchable encryption (SE) technology is proposed. In the searchable encryption scheme, it includes: data owner, user and cloud server. Among them, the data owner is used to upload encrypted files to the cloud server; the cloud server is used to store encrypted files; the client is used to sear...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/604G06F21/6227G06F2221/2107G06F2221/2141
Inventor 王嘉诚张少仲
Owner 中诚华隆计算机技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products