Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Parallel searchable encryption method for resisting internal keyword guessing attack

An encryption method and keyword technology, applied in the field of cryptography, can solve problems such as waste of computing resources, limited application range, matching of multiple keywords, and inapplicability of fuzzy matching, so as to achieve optimal search efficiency and improve search efficiency Effect

Pending Publication Date: 2022-07-22
ZHEJIANG UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the number of search lines is less than the matching keyword ciphertext, then the search efficiency is not optimal; if the number of search lines is greater than the matching keyword ciphertext, then the search efficiency is optimal, but there will be additional waste of computing resources; only When the number of search lines is exactly equal to the matching keyword ciphertext, then the search efficiency is optimal and there is no waste of additional computing resources
[0006] (2) The problem of internal keyword guessing attacks is not considered;
[0012] (5) It is only applicable to the search of a single keyword;
[0013] The current parallel search encryption method only considers the matching of a single keyword, it is not applicable to the matching of multiple keywords and fuzzy matching, and the application range is relatively limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Parallel searchable encryption method for resisting internal keyword guessing attack
  • Parallel searchable encryption method for resisting internal keyword guessing attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0053] As shown in the figure, parallel searchable encryption methods resistant to internal keyword guessing attacks are:

[0054] Step (1) establish three-party parameters, including public parameters and private parameters; the details are as follows:

[0055] Initialize the public parameters according to the set security parameter k Choose two multiplicative cyclic groups G according to k 1 and G 2 , the prime number u is the order of the two multiplicative cyclic groups, and g is G 1 the generator of ; A bilinear mapping function G representing an elliptic curve 1 ×G 1 →G 2 , H represents the collision-resistant hash function v h×1 →G 1 , → indicates that the function maps the definition domain of the independent variable to the value domain, v h×1 Represents an h-dimensional vector, and h is set to 3-4 times the number of keywords....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a parallel searchable encryption method for resisting an internal keyword guessing attack. A current parallel search method only supports single keyword search. The method comprises the following steps: a data sender encrypts keywords and files, adds own private keys when encrypting the keywords, establishes an inverted index table, maps the keywords into vectors, and uploads the keywords and the files to a cloud server; the cloud server preprocesses the keyword ciphertext and keeps the preprocessed keyword ciphertext; the data receiver encrypts a group of query keywords to generate a trap door, maps the keywords into a vector, sets a matching mode, and uploads the keywords and the vector to a cloud server; and the cloud server performs vector inner product operation, matches the keyword ciphertext with the trap door, and searches for the corresponding keyword ciphertext. According to the method, internal keyword guessing attacks and selected plaintext attacks can be resisted, semantic security is achieved, parallel search efficiency is high, ciphertext storage space is reduced, multi-keyword search and fuzzy matching search can be achieved, and matching mode conversion is supported.

Description

technical field [0001] The invention belongs to the technical field of cryptography, in particular to the field of searchable encryption in cryptography, and specifically relates to a parallel search-based encryption technology that resists internal keyword guessing attacks and supports multi-keyword search and fuzzy search. Background technique [0002] In order to facilitate data sharing, users upload data to the server for others to find the data they want. However, for the sake of security, the data needs to be encrypted before uploading, and the encrypted data is difficult to search, so the searchable encryption technology was born. The searchable encryption system mainly includes three entities: data sender, data receiver and cloud server. The data sender extracts keywords from a series of data files, encrypts the data files and keywords to generate data ciphertext and keyword ciphertext, establishes a corresponding relationship, and uploads them to the cloud server; ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F16/13G06F16/14
CPCG06F21/602G06F21/6227G06F16/148G06F16/13
Inventor 陈惠芳杨金寰谢磊
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products