Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Boolean keyword searchable encryption method supporting large-scale user groups

An encryption method and keyword technology, applied in the field of cryptography, to achieve the effects of strong security, good practicability, and flexible access policy expression

Pending Publication Date: 2022-04-15
SOUTH CHINA UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although existing work provides a solution for attribute-based keyword search, there is still no solution that supports flexible access policy matching, flexible expression of user attributes, and flexible Keyword search for these three aspects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Boolean keyword searchable encryption method supporting large-scale user groups
  • Boolean keyword searchable encryption method supporting large-scale user groups
  • Boolean keyword searchable encryption method supporting large-scale user groups

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060]Flexible access policy matching can help data owners to manage data flexibly. Most of the existing work adopts access policies represented by Access Tree or Linear Secret Sharing Schemes (LSSS for short); users The expression of attributes can support more fine-grained access control. Most of the existing work combines user attributes in the form of strings, or combines attributes into a single attribute set or recursive attribute set structure; flexible keyword search It can bring flexible choices to the search of data users. The existing solutions mainly support one of the following three search methods: matching search, connection keyword search and Boolean keyword search. Among them, the flexibility of matching search is the worst, and Boolean keyword search is the most flexible. Keyword search flexibility is the best.

[0061] In actual application scenarios, the attributes of data users are very complex. For example, data user A can be a researcher at university A,...

Embodiment 2

[0122] like image 3 As shown, the present embodiment continues to provide a large-scale user-oriented Boolean keyword ciphertext retrieval system, including the following four parts: the cloud storage subsystem running on the cloud server; the encryption subsystem running on the data owner; The user retrieval token generation and decryption subsystem at the data client end; the initialization and private key generation subsystem running on the trusted authority TA.

[0123] Wherein, the initialization and private key generation subsystem running on the trusted authority TA includes the following modules: an initialization module, a master key storage module and a private key generation module. Among them, the initialization module is used to generate the system public key and the master key, and publish the system public key to the cloud server, save the master key to the master key storage module, and the master key storage module is used to store the master key key, which ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Boolean keyword searchable encryption method supporting a large-scale user group, which realizes flexible access strategy matching and fine-grained access control on the premise of facing large-scale users based on a recursive attribute set structure, an access tree structure and a recursive keyword set structure. Firstly, a more flexible data user attribute organization mode and more flexible access strategy matching are supported, and more efficient access control is achieved. According to the method, the access tree is used for representing the access strategy, and the data user attributes are organized in a recursive collection structure, so that more efficient access strategy matching is realized. In addition, the method also supports a more flexible keyword organization mode and Boolean keyword retrieval. According to the method and the device, the keywords are organized into the recursive set, and flexible keyword organization and Boolean keyword search are realized through a Boolean matching operation method.

Description

technical field [0001] The invention relates to the technical field of cryptography, in particular to a Boolean keyword searchable encryption method supporting a large-scale user group. Background technique [0002] In order to provide users with the ability to search for keywords on ciphertext data, a searchable encryption (Searchable Encryption, SE for short) technology is proposed as a solution. According to different encryption methods, existing searchable encryption schemes can be divided into two types, Symmetric Searchable Encryption (SSE for short) and Public-key Encryption with KeywordSearch (PEKS for short). In the public key searchable encryption scheme, the data owner encrypts the data with the public key of the designated user before uploading the data to the cloud server, and then these users can use their private key to search and decrypt the data. [0003] However, the basic PEKS scheme has limitations in some practical application scenarios. For example, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62G06F16/9532
CPCY02D30/50
Inventor 徐玲玲林宇
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products