Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Double-server multi-user searchable encryption method and device capable of resisting keyword guessing attack

A dual-server, encryption method technology, applied in the field of information security, can solve problems such as low security and inability to resist keyword defects, and achieve the effects of reducing burden, reducing search time complexity, and resisting guessing attacks

Active Publication Date: 2022-07-12
GUANGDONG UNIV OF TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the defects of low security and inability to resist keywords in the above-mentioned existing searchable encryption methods, the present invention provides a double-server multi-user searchable encryption method and device that are resistant to keyword guessing attacks without using secure channels and trusted The third party reduces the burden on data owners; while improving search efficiency, it can effectively resist keyword guessing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-server multi-user searchable encryption method and device capable of resisting keyword guessing attack
  • Double-server multi-user searchable encryption method and device capable of resisting keyword guessing attack
  • Double-server multi-user searchable encryption method and device capable of resisting keyword guessing attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] This embodiment provides a dual-server multi-user searchable encryption method that resists keyword guessing attacks, such as figure 1 shown, including:

[0065] S1: The dual-server multi-user system includes users, data owners, storage servers and front-end servers; the system generates public parameters based on the input security parameters and keyword word set space; The server and the front-end server respectively generate the data owner public-private key pair, the user public-private key pair, the storage server public-private key pair, and the front-end server public-private key pair;

[0066]S2: The data owner determines the private part of the data according to the keyword word set space, encrypts the data with the private key of the data owner, the public key of the storage server, the private part of the data and the corresponding keywords, and generates the data ciphertext and its encrypted index ; Send the decryption key for decrypting the data ciphertext...

Embodiment 2

[0074] This embodiment provides a dual-server multi-user searchable encryption method that resists keyword guessing attacks, including:

[0075] S1: The dual-server multi-user system includes users, data owners, storage servers, and front-end servers; the system generates public parameters based on the input security parameters and keyword word set space; The server and the front-end server respectively generate the data owner's public-private key pair, the user's public-private key pair, the storage server's public-private key pair, and the front-end server's public-private key pair; the details are:

[0076] System input-based safety parameters1 λ and keyword vocabulary space Generate public parameters, denoted as in, respectively represent the first, second and third multiplicative cyclic groups, all of which are of order q; g 1 ,g 2 Represent the first and second method cyclic group generators respectively; e represents the bilinear mapping: H 1 ,H 2 ,H 3 repr...

Embodiment 3

[0110] This embodiment provides a dual-server multi-user searchable encryption device that resists keyword guessing attacks, based on the searchable encryption method described in Embodiment 1 or 2, such as image 3 shown, including:

[0111] The public-private key pair generation module, the dual-server multi-user system includes users, data owners, storage servers and front-end servers; the system generates public parameters based on the input security parameters and keyword word set space; and based on the public parameters, it is the data owner. , the user, the storage server and the front-end server respectively generate the data owner's public-private key pair, the user's public-private key pair, the storage server's public-private key pair and the front-end server's public-private key pair;

[0112] Encryption module, the data owner determines the private part of the data according to the keyword word set space, and encrypts the data by using the private key of the data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a keyword guessing attack resistant double-server multi-user searchable encryption method and device, and relates to the technical field of information security. After the data owner determines the keyword, encrypting the data and generating an encryption index, and storing the encryption index in a storage server; after the user purchases the data, the data owner generates authorization information and sends the authorization information to the storage server and the front-end server; a user generates a user search trap door and sends the user search trap door to the front-end server for query, and the front-end server generates a server search trap door and sends the server search trap door to the storage server; and the storage server performs searching after receiving and interacts with the user. According to the method, a secure channel and a trusted third party are not needed, and the user does not need to interact with the data owner after purchasing the data from the data owner, so that the burden of the data owner is relieved; double servers are used for storing and searching encrypted data, and inverted indexes are adopted, so that the search time complexity is reduced, the search efficiency is improved, and keyword guessing attacks are effectively resisted.

Description

technical field [0001] The invention relates to the technical field of information security, and more particularly, to a dual-server multi-user searchable encryption method and device that resists keyword guessing attacks. Background technique [0002] The cloud storage system can upload the user's private data to the remote cloud server, and the cost is much lower than the traditional local storage solution. In recent years, more and more users choose Microsoft's Onedrive, Baidu Cloud, Alibaba Cloud and other cloud storage services to store and manage their private data. However, honest but curious cloud storage servers always make users worry about their data privacy issues. To address data privacy concerns, uploading encrypted data is considered a secure solution. For example, the AES symmetric encryption scheme can protect the privacy of data from being stolen by cloud server spies, but it also prevents users from entrusting keyword searches to cloud storage servers. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/08H04L67/10
CPCH04L63/0442H04L9/0861H04L9/0869H04L67/10Y02D30/50
Inventor 陈家辉李峥明
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products