End-to-end public key keyword searchable encryption method for cloud data transmission

An encryption method and keyword technology, applied in the field of network security, can solve the problems of low efficiency of search operations and indistinguishable search results returned, and achieve the effects of reducing computational consumption, narrowing the scope of testing, and speeding up

Active Publication Date: 2018-08-10
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to propose an end-to-end public key keyword searchable encryption method in cloud data transmission, so as to solve the problem of the server traversing and accessing the corresponding keywords and keywords of all file data during the execution process of the existing keyword searchable encryption technology. The low efficiency of search operations caused by test retrieval is indistinguishable from the return of retrieval results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end public key keyword searchable encryption method for cloud data transmission
  • End-to-end public key keyword searchable encryption method for cloud data transmission
  • End-to-end public key keyword searchable encryption method for cloud data transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0049] This embodiment provides an end-to-end public key keyword searchable encryption method in cloud data transmission, the flow chart of which is as follows figure 1 shown. The end-to-end public key keyword searchable encryption system in cloud data transmission constructed in this embodiment includes the following modules, system initialization module, key generation module, keyword ciphertext encryption module, file collection management module, query Trapdoor generation module, search matching module.

[0050] 1. System initialization module:

[0051] Select the security parameter λ, and set the system public parameter P;

[0052] Set system public parameters P=T ,e,H,n,v 1 ,v 2 ,h 1,1 ,..., h 1,2n ,h 2,1 ,..., h 2,2n > The specific process is as follows:

[0053] Choose a prime number p, G and G according to the security parameter λ T ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an end-to-end public key keyword searchable encryption method for cloud data transmission, belonging to the technical field of network security. The scheme of the invention aims to solve the traversal matching calculation consumption problem and the return data distinguishing problem when server keyword ciphertext matching is performed in an end-to-end keyword search process. The scheme of the invention is suitable for end-to-end data transmission that needs to ensure the data security and retrieval efficiency, aims to securely and reliably perform searchable encryptionbased on keyword ciphertext exact matching on data of a receiving end stored on a server, and improves the keyword ciphertext search efficiency. Compared with a traditional search scheme that needs to perform matching tests on keyword ciphertexts of all files on the server, by adopting the scheme of the invention, a user holds a file set, the matching range can be narrowed, and thus the consumption of the server caused by performing traversal access on the keyword ciphertexts and the computing consumption caused by performing keyword ciphertext tests can be reduced, and the discrimination ofreturned data can also be achieved by relying on file labels.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to an end-to-end public key keyword searchable encryption method in cloud data transmission, aiming at an accurate search method for encrypted keywords, improving public key searchable encryption on the premise of safety and reliability The server performs ciphertext matching test efficiency. Background technique [0002] Cloud data transmission is one of the earliest cloud storage applications, which allows users to transmit data to other users by outsourcing storage to the cloud platform, and allows authorized users to perform keyword queries and data access operations anytime, anywhere, thereby solving end-to-end The offline problem of users in data transmission and the storage requirements of users on demand can greatly reduce the burden of data storage and data transmission on users, which is welcomed by many users. Although cloud data transmission has man...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L29/08G06F17/30
CPCG06F16/10H04L9/30H04L67/06H04L67/1097
Inventor 张小松周让牛伟纳汪小芬李经纬
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products