Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-keyword searchable encryption method and system supporting Boolean access control strategy

An access control strategy and multi-keyword technology, applied in the fields of information retrieval and cryptography, can solve problems that cannot be solved at the same time

Active Publication Date: 2020-12-18
SOUTH CHINA UNIV OF TECH
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To sum up, even if some works have proposed excellent solutions to some of the above four problems, they still inevitably make great achievements in other aspects. Compromise, cannot solve these four problems at the same time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-keyword searchable encryption method and system supporting Boolean access control strategy
  • Multi-keyword searchable encryption method and system supporting Boolean access control strategy
  • Multi-keyword searchable encryption method and system supporting Boolean access control strategy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] This embodiment discloses a multi-keyword searchable encryption method that supports Boolean access control policies. In the context of cloud storage, this embodiment is based on searchable encryption technology and attribute encryption technology, and uses LSSS to represent access policies and search policies. It can support Boolean keyword search, and can effectively locate the data that users are interested in; at the same time, it can realize the flexibility and concealment of access policies, support fine-grained Boolean access control; and support constant-level system key length. Such as figure 1 As shown, the method is applied to an application system including a trusted authority, a data client, a data owner, and a cloud server, such as a healthcare system and a school educational administration system. The method steps are as follows:

[0080] S1. The trusted authority TA generates the system public key pk, master key mk and ElGamal private key a′, and publish...

Embodiment 2

[0125] This embodiment discloses a multi-keyword searchable encryption system that supports Boolean access control policies, such as figure 2 As shown, it includes: the initialization and token generation subsystem running on the trusted authority TA, the encryption subsystem running on the data owner side, the cloud storage subsystem running on the cloud server, the user retrieval and token running on the data client side decryption subsystem.

[0126] The trusted authority TA is a fully trusted third-party security organization, and the data owner and data client are terminal devices with computing and processing capabilities, including smart phones, tablets, and computers. The system can implement the multi-keyword searchable encryption method described in Embodiment 1 that supports Boolean access control policies.

[0127] Among them, the initialization and token generation subsystem running on the trusted authority TA includes an initialization module, a master key stor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-keyword searchable encryption method and system supporting a Boolean access control strategy, and the method comprises the steps of firstly enabling a trusted authorityto generate a system public key, a main key and an IlGamal private key, carrying out the cloud disclosure of the system public key, and transmitting the private key to a data user; then enabling thedata owner to generate an index ciphertext and a data ciphertext for the document and upload the index ciphertext and the data ciphertext to the cloud; uploading the attribute set and the query keyword predicate of the data user to a credible authority to verify whether the identity of the user is legal or not during data user retrieval, and generating a retrieval token and sending the retrieval token to the data user if the identity of the user is legal; enabling the data user to receive the retrieval token and upload the retrieval token to the cloud; after receiving the token, enabling the cloud server to check whether each index ciphertext is matched with the retrieval token or not by using a system public key, and send the matched data ciphertext to a data user; and enabling the data user to recover the data ciphertext into plaintext content by using the private key. According to the invention, fine-grained Boolean access control, Brillouin keyword search and constant-level systemkey length can be realized.

Description

technical field [0001] The invention relates to the technical fields of information retrieval and cryptography, in particular to a multi-keyword searchable encryption method and system supporting a Boolean access control strategy. Background technique [0002] With the rapid development of Internet technology and the popularity of cloud computing technology, more and more business users and individuals store their data in the cloud, replacing the past practice of storing in their own data centers. Users can retrieve data in the cloud anytime, anywhere, and can easily share it with those who have permission. However, while cloud computing provides us with convenience, it also has serious security risks. When data is outsourced to cloud servers in plaintext, it may be subject to illegal access by cloud service providers or hackers. The usual solution is to encrypt the data and store it on the cloud server in the form of ciphertext, but this also makes the traditional plainte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/62
Inventor 徐玲玲陈建彰
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products