Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Attribute-based multi-keyword ciphertext retrieval method under background of multiple data owners

A technology for data owners and owners, applied in the field of cryptography, can solve problems such as multiple data owner scenarios that have not been considered, and achieve fine-grained access control, reduce burden, and ensure keyword privacy

Active Publication Date: 2016-08-17
XIDIAN UNIV
View PDF4 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing attribute-based searchable encryption technology can only support single-keyword retrieval, and has not considered the scenario of multiple data owners

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-based multi-keyword ciphertext retrieval method under background of multiple data owners
  • Attribute-based multi-keyword ciphertext retrieval method under background of multiple data owners
  • Attribute-based multi-keyword ciphertext retrieval method under background of multiple data owners

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] refer to figure 1 , the present invention takes the personal health record PHR storage system as an example, the actual scene includes four entities: a trusted third party TTS, a cloud server CSP, multiple data owners DO and data users DU. Trusted third-party TTS generates public key pk, private key sk and symmetric key Φ; cloud server CSP is used to store data ciphertext; multiple data owners DO, such as patients are responsible for encrypting documents and creating indexes; data users DU, such as Physicians can search the ciphertext.

[0027] refer to figure 2 , the present invention is based on attribute-based multi-keyword ciphertext retrieval under the background of multi-data owners, and its implementation steps include the following:

[0028] Step 1, system initialization

[0029] refer to image 3 , the specific implementation of this step is as follows:

[0030] (1a) The third-party trusted server TTS calculates the public key pk=(G 1 ,G 2 ,e,h 1 ,h 2...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attribute-based multi-keyword ciphertext retrieval method under the background of multiple data owners and mainly solves a problem that the existing technology only supports single-keyword ciphertext retrieval. A technical scheme of the method comprises the following steps that a searchable encryption technology and an encryption strategy based on the ciphertext attribute are combined, and a keyword set index is established under the scene of multiple data owners according to access structures of the data owners and a keyword set of the ciphertext; a data user generates a trap door according to a query keyword set; and the data user utilizes the trap door to realize multi-keyword query of the ciphertext. According to the method, the load of local data storage and management of the data owners is relieved, and the method supports the data user to carry out multi-keyword precise query on the ciphertext and can be used for realizing fine-grained access control and safe and efficient retrieval of the ciphertext data under the cloud storage background.

Description

technical field [0001] The invention belongs to the technical field of cryptography, and specifically relates to data encryption, access control and ciphertext retrieval technology, which can be used to realize fine-grained access control, security and efficient retrieval of ciphertext data under the background of cloud storage. Background technique [0002] With the popularity of cloud computing technology, more and more business users and individuals store their local data in "honest but curious" cloud servers in order to enjoy real-time, high-quality applications and Serve. Therefore, data storage services have become one of the most basic services in cloud computing applications. Cloud storage services reduce the burden of local storage management and avoid the overhead of software and hardware facilities and personnel maintenance, but cloud servers cannot prove to cloud tenants It has trusted storage capabilities. Cloud storage brings great convenience to cloud tenant...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0866H04L9/0869H04L63/045
Inventor 苗银宾马建峰李辉伍祈应
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products