Searchable encryption method based on wildcard identity

An encryption method and wildcard technology, which is applied to secure communication devices and key distribution, can solve the problems of high requirements for public key encryption, and achieve the effect of resisting malicious damage, data security and privacy leaks, and resisting quantum computing attacks

Active Publication Date: 2022-08-09
SOUTHWEST PETROLEUM UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, complex quantum computing technology will endanger the cryptographic schemes designed based on the assumption of traditional cryptographic difficulty; recent breakthrough research results show that quantum computers are likely to be realized in the near future, leading to the need for post-quantum security based on keyword search. Public key encryption is more demanding

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Searchable encryption method based on wildcard identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The technical solutions of the present invention will be clearly and completely described below with reference to the embodiments. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts shall fall within the protection scope of the present invention.

[0055] see figure 1 , this embodiment provides a searchable encryption method based on wildcard identity:

[0056] A searchable encryption method based on wildcard identity, applied to a cryptographic system, the cryptographic system includes a trusted center, a cloud server, a data owner and a user, and the cloud server communicates with the trusted center, the data owner and the user respectively connect.

[0057] The searchable encryption method includes:

[0058] S100. The key generation center sets public p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wildcard identity-based searchable encryption method, which comprises the following steps that: a key generation center sets public parameters, allocates a private key to a cloud server and stores a main private key; the user derives a private key of the user identity with the hierarchical depth of YES according to the user identity with the hierarchical depth of YES and the private key of the user identity with the hierarchical depth of YES; the data owner selects a keyword, generates a security index corresponding to the keyword by using the public parameter, the wildcard character identity mode and the identity of the cloud server, and sends the security index to the cloud server; the user uses the private key of the user identity to generate a search trap door and sends the search trap door to the cloud server; and the cloud server executes a search test according to the private key of the cloud server, the search trap door and the security index, and returns the ciphertext of the sensitive data file corresponding to the keyword to the user if the test is successful. According to the method, the trusted private key generator can generate the private key according to the wildcard identity, so that complex certificate management is eliminated.

Description

technical field [0001] The invention relates to the field of cloud storage system data security and privacy protection, in particular to a searchable encryption method based on wildcard identity. Background technique [0002] With the development of wireless communication, Internet of Things, and artificial intelligence technologies, massive amounts of user data are being generated all the time. With cloud storage services, users can remotely upload their massive data to the cloud and flexibly access it anytime, anywhere via the Internet, and such services eliminate the need for local storage management and maintenance. Although the cloud brings great advantages in maintaining massive amounts of data, concurrent security and privacy issues may hinder users from enjoying cloud storage and computing services. It is widely believed that data confidentiality is one of the most important security issues, in fact, from the user's point of view, the content of some outsourced data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/00H04L9/40
CPCH04L9/083H04L9/0861H04L9/085H04L9/002H04L63/0442
Inventor 张晓均刘庆张豪李兴鹏唐浩宇唐伟王鑫王文琛薛婧婷
Owner SOUTHWEST PETROLEUM UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products