Searchable encryption method supporting multiple users in cloud storage
An encryption method, multi-user technology, applied in the intersection of cloud computing and applied cryptography, to achieve the effect of improving efficiency, improving retrieval efficiency, improving efficiency and security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0049] Step 1. System initialization phase
[0050] The data owner initializes system parameters, generates keys and pseudo-random functions.
[0051] The specific process is as follows:
[0052] S11. The data owner generates keys K' and K", pseudo-random functions f and F, block cipher E, and generates a pseudo-random stream S according to the number of keywords 1 ,S 2 ,...,S n (n is the number of keywords to be encrypted), which is used to encrypt and decrypt keywords.
[0053] S12. Generate a block cipher K for encrypting the file.
[0054] S13, using the block cipher K in S12 to generate ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com