Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity-based dual-server authorization ciphertext equivalence judgment method

A dual-server, determination method technology, applied in the field of information security cryptography, can solve problems such as difficulty in resisting keyword guessing attacks, and achieve the effect of solving the burden of public key certificate management and resisting keyword guessing attacks

Pending Publication Date: 2021-12-10
GUILIN UNIV OF ELECTRONIC TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an identity-based dual-server authorized ciphertext equivalence determination method, which aims to solve the public key certificate management burden faced by the existing related public key encryption methods, and the related methods based on the single server model are difficult to resist the key word guessing attack problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based dual-server authorization ciphertext equivalence judgment method
  • Identity-based dual-server authorization ciphertext equivalence judgment method
  • Identity-based dual-server authorization ciphertext equivalence judgment method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0030] see figure 1 , the present invention proposes an identity-based dual-server authorization ciphertext equivalence determination method. The system architecture and technical terms are described as follows:

[0031] (1) Key Generate Center (KGC): As a system trusted entity, it is responsible for initializing the system, generating system public parameters, system master private key, user private key, and master and slave server private keys.

[0032] (2) Data Sender: According to the public parameters of the system and the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based double-server authorization ciphertext equivalence judgment method, which takes a unique identity identifier of a user as a public key, stores user data and executes ciphertext equivalence judgment in a non-conspired double-server mode, and can effectively resist single-server keyword guessing attack. Before the double servers are not authorized, the double servers do not have the right to execute any operation on the outsourcing ciphertext of the user. After the authorization generated by the user is obtained, the master server and the slave server can only execute the ciphertext equivalence judgment process in succession, that is, the master server generates intermediate parameters for ciphertext judgment, and the slave server completes ciphertext equivalence judgment according to the intermediate parameters and returns a final judgment result to the user. The problems that an existing related public key encryption method faces public key certificate management burden, and a related method based on a single server model is difficult to resist keyword guessing attacks are solved.

Description

technical field [0001] The invention relates to the technical field of information security encryption, in particular to an identity-based double-server authorization ciphertext equivalence determination method. Background technique [0002] With the development of cloud computing technology, massive data is encrypted and stored in the cloud server, which not only saves the user's local storage space, but also ensures the privacy of the user's outsourced data. It is a routine operation to perform equivalence determination or classification of encrypted data in the cloud, but data obtained by ordinary encryption methods does not support ciphertext equivalence determination. In response to the above problems, researchers have proposed many ciphertext equivalence determination methods based on the single-server model, but these methods cannot resist keyword guessing attacks on user ciphertexts. [0003] In order to resist keyword guessing attacks and improve the security of ci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6218G06F21/64G06F2221/2107
Inventor 赵萌丁勇唐士杰梁海王会勇
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products