Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fuzzy keyword public key searchable encryption scheme achieving unrecognizable trap door

An unidentifiable and encryption scheme technology, applied in the field of cloud computing and cryptography, which can solve the problems of unidentifiable trapdoors and unidentifiable trapdoors.

Inactive Publication Date: 2015-10-28
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to overcome the deficiencies of the above-mentioned existing public key encryption search scheme technology, the present invention provides a public key encryption search scheme for fuzzy keywords that cannot be recognized by trapdoors, which meets three requirements. One is to use the server's public key to encrypt keywords and data files, external attackers cannot get any information from them without the server key, so they can be transmitted without a secure channel; the second is to propose a trapdoor unidentifiable scheme, so that external attackers cannot use keywords to guess The third is that the scheme not only supports precise keyword search encryption, but also supports search when the input keywords have any typos or inconsistent formats.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fuzzy keyword public key searchable encryption scheme achieving unrecognizable trap door
  • Fuzzy keyword public key searchable encryption scheme achieving unrecognizable trap door
  • Fuzzy keyword public key searchable encryption scheme achieving unrecognizable trap door

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] The embodiment of the present invention includes the following algorithms altogether.

[0010] Algorithm 1: Generate prime order q≥2 k a group g of 1 , a g 1 A random generator P for constructing a bilinear map :g 1 × g 1 → g 2 .Specify the hash function h 1 : {0, 1}*→g 1 , h 2 :g2 → {0, 1} k ,return a = ( q , g 1 , g 2 , e ^ , P , h 1 , h 2 ) as a public parameter.

[0011] Algorithm 2: :random selection Then calculate X=xP, choose randomly Return public key PS=(cp, Q, X) and private key SS=(cp, x) as the public-private key pair of the server.

[0012] Algorithm 3: :random se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fuzzy keyword public key searchable encryption scheme achieving an unrecognizable trap door. According to the scheme, the public key of a server is used for encrypting keywords and data files and an external attacker cannot acquire any information if not having the secret key of the server, thereby being incapable of using a safety channel for transmission. The scheme also achieves unrecognizable trap door such that the external attacker cannot attack the trap door by using keyword guessing attack. The scheme not only supports accurate keyword searchable encryption, but also supports search when input keywords have any spelling mistake or inconsistent formats, thereby greatly improving system availability.

Description

technical field [0001] The present invention relates to the field of cloud computing and cryptography, specifically a search scheme for public key encrypted files in a cloud environment, the scheme not only supports the search of fuzzy keywords, but also supports the search of precise keywords, and can Resists keyword guessing attacks and satisfies trapdoor unrecognizability. Background technique [0002] The earliest public key encryption system was proposed by Boneh et al. in 2004. The user can send a key to the server so that the server can identify all the data files containing the searched keywords, and the server cannot identify the relevant data files. Any information, but this search encryption scheme must be established in a secure channel, and this search encryption scheme only allows search encryption of precise keywords. [0003] In 2008, Baek et al. proposed a scheme without a secure channel. The basic idea in this scheme is that the server has its own public a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30
Inventor 秦志光赵洋包文意陈阳任化强岳峰吴世坤王士雨
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products