Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection method based on verifiable symmetric searchable encryption

A privacy protection and symmetric technology, applied in the privacy protection field of symmetric searchable encryption, it can solve problems such as data integrity cannot be guaranteed, and achieve the effect of ensuring freshness, improving efficiency, and preventing replay attacks.

Active Publication Date: 2019-12-20
GUANGXI NORMAL UNIV
View PDF19 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] What the present invention aims to solve is the problem that the traditional searchable encryption method cannot guarantee the integrity of the data returned by the server to the user, and provides a privacy protection method based on verifiable symmetric searchable encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method based on verifiable symmetric searchable encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with specific examples.

[0032] A privacy protection method based on verifiable symmetric searchable encryption implemented based on the above system, which specifically includes the following steps:

[0033] Step 1: Data owner establishment phase

[0034] The data owner generates 3 keys k according to the symmetric encryption key generation algorithm in cryptography 1 、k 2 、k 3 , generate a pair of keys (ssk, spk) (public key and private key) according to the asymmetric encryption key algorithm in cryptography.

[0035] The data owner creates a data reverse list △, that is, establishes the name identification (ID) of the document corresponding to each keyword, for example, word1 exists in document D 1 、D 2 , establish i ,D i > key-value pairs like this.

[0036] Step 2: Data owner initial...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection method based on verifiable symmetric searchable encryption. The privacy protection method is mainly composed of a data owner, a plurality of authorized users and a cloud server. The data owner encrypts the data by using symmetric encryption and stores the data in the cloud; an authorized user authorized by the data owner can initiate a query operation to the cloud server to query the data stored in the cloud; and the cloud server feeds back query results to the user, the user needs to verify the integrity and freshness of the results, the integrityis that the check results do not contain all results which should be contained in all queries, and the freshness is that the detection server does not send data results of historical versions to the user. The method is a universal, verifiable, safe and symmetric searchable technical scheme under a three-party model, and can ensure the integrity and freshness of the search query result returned tothe user by the server, namely prevent the server from initiating a replay attack.

Description

technical field [0001] The invention relates to the technical field of data privacy protection, in particular to a privacy protection method based on verifiable symmetric searchable encryption. Background technique [0002] With the continuous development of Internet technology, there are more and more kinds of data, and the safe storage of data has become the focus of research. If a large amount of data is stored locally, the data cannot be used flexibly, so a large number of cloud services have also emerged. Because of cloud services, more and more users store data in the cloud, so that users can access and manage their own data anytime, anywhere. More and more governments, enterprises, and individuals have begun to use cloud storage systems to store various files. But cloud storage also brings various privacy leakage problems. According to the report of Cloud Storage Alliance (CSA), data leakage is an important problem faced by cloud computing. In the first half of 201...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0861H04L9/3213H04L9/3247H04L63/0407
Inventor 李先贤付雪梅石贞奎
Owner GUANGXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products