Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

PEKS (public-key encryption with keyword search) method for lattice-based cloud stored cyphertext data under standard model

A standard model, encryption method technology, applied in the field of cyberspace security, can solve problems such as insecurity

Active Publication Date: 2017-05-31
SOUTHWEST PETROLEUM UNIV
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, for these existing public key searchable encryption algorithms for ciphertext data in cloud storage, they all focus on the equipment with relatively mature applications today, and the consideration of security is also based on traditional mathematical difficulties such as DH problem and CDH problem. These problems are easily cracked by quantum computers, and are not safe in quantum computing environments.
In addition, these public-key searchable encryption algorithms are designed under the standard model, and their security proofs must rely on the random oracle model, which cannot truly reflect the security of the designed public-key searchable encryption algorithms to a certain extent. sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • PEKS (public-key encryption with keyword search) method for lattice-based cloud stored cyphertext data under standard model
  • PEKS (public-key encryption with keyword search) method for lattice-based cloud stored cyphertext data under standard model
  • PEKS (public-key encryption with keyword search) method for lattice-based cloud stored cyphertext data under standard model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Describe technical scheme of the present invention in detail below:

[0037] The initial stage of the system: the system first sets the security parameters required by the lattice cipher algorithm, and runs the trapdoor generation function to generate the public-private key pair of the data receiver and the cloud server. The system then randomly selects two uniform random n×m matrices and two n-dimensional vectors: set a special vector encoding function.

[0038]Keyword ciphertext generation stage: the data owner calculates the public matrix associated with the keyword, and obtains the first component of the keyword ciphertext according to the LWE encryption idea; the data owner selects a random challenge identity, and calculates The public matrix associated with it also obtains the second component of the keyword ciphertext according to the LWE encryption idea.

[0039] Search trapdoor generation stage: the data receiver uses his own private key, and according to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of cyberspace security and particularly relates to a PEKS (public-key encryption with keyword search) method for lattice-based cloud stored cyphertext data under standard model. The method of the invention has no need for a random oracle so that the security of the designed PEKS method can more truly reflected; a designed cryptographic algorithm is based on assumption of LWE (learning with errors) hard problems, quantum computer attacks can be resisted effectively. The method of the invention has a need for specifying a unique cloud server to perform testing and return corresponding search results, so that no malicious servers are able to execute search test operation, and malicious server attacks are partly avoided accordingly. In addition, the algorithm can ensure that cyphertext is undistinguishable. Furthermore, in keyword cyphertext generation phase, the method of the invention needs no computing of high-overhead modular exponentiation and bilinear pairing operation, but the computing of finite linear algebraic operation, and accordingly is highly worthy of practical application in post-quantum communication environments.

Description

technical field [0001] The invention belongs to the technical field of network space security, and in particular relates to a public key searchable encryption method for storing ciphertext data on the cloud under a standard model. Background technique [0002] With the rapid development of cloud storage technology, more and more users now store data in cloud servers. In this way, users enjoy high-quality data storage services, which greatly reduces the user's computing overhead and the cost of maintaining data. In order to securely store outsourced data on untrusted remote cloud servers, users' sensitive data needs to be encrypted before outsourcing. However, how to efficiently search the ciphertext data stored on the cloud server becomes a thorny problem. [0003] It is a very feasible technology to use public key searchable encryption algorithm with keywords. Boneh et al first proposed a public key searchable encryption algorithm with keywords. Afterwards, Baek et al f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06H04L9/32
CPCH04L9/0852H04L9/0866H04L9/0869H04L9/3226H04L63/0435H04L63/0807
Inventor 张晓均张新鹏何小曼张源
Owner SOUTHWEST PETROLEUM UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products