Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-user searchable encryption method and encryption system in Internet of Vehicles environment

An encryption method and multi-user technology, which can be used in services based on specific environments, encryption devices with shift registers/memory, transmission systems, etc., and can solve huge communication problems, scheme calculation overhead and high communication delay requirements, etc. question

Active Publication Date: 2020-08-18
XIDIAN UNIV
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the actual Internet of Vehicles environment, the number of user terminals (vehicles) is relatively large. If the same access strategy is used for all end users (vehicles), it will cause huge communication problems. Latency also has high requirements
[0007] The difficulties in solving the above problems and defects are as follows: (1) So far, there are few technical materials combining SE technology and EI technology. How to apply SE technology on the framework of EI technology to ensure the security and Execution efficiency is an issue that remains to be resolved
(2) For the SE scheme implemented on the EI framework, how to make it have fine-grained management of user permissions and verification of query results in a multi-user environment is still an important issue

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-user searchable encryption method and encryption system in Internet of Vehicles environment
  • Multi-user searchable encryption method and encryption system in Internet of Vehicles environment
  • Multi-user searchable encryption method and encryption system in Internet of Vehicles environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0110] like figure 2 As shown, the multi-user searchable encryption method in the Internet of Vehicles environment provided by the embodiment of the present invention (the multi-user searchable encryption method based on edge intelligence in the Internet of Vehicles environment) specifically includes the following steps:

[0111] Step 1: Domain A trusted authority center TA is initialized.

[0112] 1.1) TA creates a group G whose generator is g and order is p, where p is a prime number. Simultaneously define the bilinear map e:G×G→G T . Randomly choose h 1 ∈G,α∈Z p and calculate g 1 =g α . Set up three hash functions H 1 (·),H 2 (·),H 3 ( ) and two random functions R 1 (×),R 2 (·). TA will give the public parameters in the system pp=(g,g 1 ,h 1 ), msk=α.

[0113] 1.2) TA randomly generates a private key and calculate the public key TA will public-private key pair (SK E , PK E ), (SK DO , PK DO ) are distributed to ES and DO respectively, and the public...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of wireless communication networks. The invention discloses a multi-user searchable encryption method and encryption system in an Internet of Vehicles environment, and the method comprises the steps: a trusted authorization mechanism transfers a calculation burden on a cloud server to an edge server of each edge node, and a data end generates a query trap door through a private key, and transmits the query trap door to the edge server on the edge node; after receiving the request, the edge server matches a corresponding vector according to an indexand a trap door sent by the data end and sends the vector to the cloud server, and the cloud server obtains a matched file label and ciphertext data according to the vector and the hash table, searches for a signature of a keyword and returns the signature to the data end; and after verifying that the signature is correct by using the signature public key, the data end decrypts the ciphertext databy using the attribute key to obtain a data plaintext. Data privacy protection is achieved in the Internet of Vehicles environment with high requirements for communication time delay and calculationoverhead, and fine-grained control over the access permission of multiple users is achieved.

Description

technical field [0001] The invention belongs to the technical field of wireless communication networks, and in particular relates to a multi-user searchable encryption method and an encryption system in an Internet of Vehicles environment, in particular to a multi-user searchable encryption method and encryption based on edge intelligence in an Internet of Vehicles environment system. Background technique [0002] At present, with the continuous growth of the number of motor vehicles in the world, the road carrying capacity of many cities has reached saturation, and issues such as traffic safety, travel efficiency, energy saving and emission reduction have become increasingly prominent. Smart connected vehicles are generally considered to be an important solution to the above-mentioned traffic problems. [0003] With the deep integration of the automotive industry and information and communication technology, smart cars connected through the Internet of Vehicles (IoV) have ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04L9/06H04L9/30H04L29/06H04L29/08H04W4/40
CPCH04W12/02H04W4/40H04L9/0643H04L9/3073H04L63/0435H04L63/0478H04L63/0442H04L67/10H04L67/12H04L9/50
Inventor 樊凯王昊洋金雄海陈琪李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products