Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Dynamic ciphertext retrieval and verification method and system supporting full vector operations

A vector and ciphertext technology, applied in the field of access control ciphertext retrieval, can solve problems such as the inability to support dynamic operations of data addition and deletion, cloud server is not completely trusted, attacks, etc., to achieve storage overhead, resist file injection attacks, Validating the effect of improved efficiency

Active Publication Date: 2022-08-05
WUHAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing scheme based on vector commitment, due to the limitation of the initial dimension of the vector, only data replacement operations are supported, and data addition and deletion dynamic operations cannot be supported.
[0005] Cloud servers are not completely trustworthy and there is always the possibility of malicious attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic ciphertext retrieval and verification method and system supporting full vector operations
  • Dynamic ciphertext retrieval and verification method and system supporting full vector operations
  • Dynamic ciphertext retrieval and verification method and system supporting full vector operations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to facilitate the understanding and implementation of the present invention by those skilled in the art, the present invention will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the embodiments described herein are only used to illustrate and explain the present invention, not The invention is limited.

[0030] see figure 1 and figure 2 , a dynamic ciphertext retrieval method supporting full vector operations provided by the present invention,

[0031] During the system initialization management process, input security parameters , generate the pseudo-random function, hash function, public key PK, private key SK and public parameter PP required by the entire system, and distribute the public key PK and public parameter PP to the participants in the system, including the data owner, cloud Storage server; private key SK data owner saves it;

[0032] In this embodiment, the pseu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dynamic ciphertext retrieval and verification method and system supporting full vector operations, including two parts: dynamic ciphertext retrieval of full vector operations and dynamic ciphertext verification of full vector operations; Text retrieval, which gets rid of the limitation of the initial vector dimension and only supports the replacement operation, the invention realizes that the data can be dynamically inserted, deleted and updated; the counter is embedded in the ciphertext generation process to keep the keyword index update state, and to achieve forward privacy security, Resistant to file injection attacks. In the dynamic ciphertext verification of the full vector operation, since the commitment value will not increase with the increase of the data amount, the client-side constant-level storage overhead is realized. When the verification is finally performed, the invention supports the aggregate verification of sub-vector commitments, and the verification efficiency is significantly improved compared with the one-by-one verification method.

Description

technical field [0001] The invention belongs to the technical field of access control ciphertext retrieval in applied cryptography, relates to a dynamic ciphertext retrieval and verification method and system, in particular to a dynamic ciphertext retrieval and efficient verification method and system supporting full vector operations. Background technique [0002] With the development of cloud storage and cloud computing, cloud storage has become an important force to change production and lifestyle. For example, Alibaba Cloud, Baidu Cloud, Amazon Cloud, etc. The convenience of cloud storage services is self-evident. Users can access data anytime and anywhere without being restricted by physical regions. [0003] However, since it is difficult to realize a fully trusted cloud server in the real world, users' data information cannot be stored in plaintext, which will leak a large amount of private information, which has always been the focus of the academic community. Ther...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/32H04L67/1097
CPCH04L9/0643H04L9/0656H04L9/3213H04L9/3271H04L9/3247H04L67/1097
Inventor 陈晶赵陈斌何琨杜瑞颖熊翘楚王瑞锦吴鸿伟张燕杰郑汉军徐博
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products