Pairing-free searchable encryption method supporting revocation and verification

An encryption method and encryption index technology, which is applied to user identity/authority verification and key distribution, can solve the problems of undiscussed key revocation, etc., and achieve the effect of fast operation speed, high security, and low calculation cost

Active Publication Date: 2022-07-26
SHAANXI NORMAL UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Key revocation is not discussed in Liu's proposal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pairing-free searchable encryption method supporting revocation and verification
  • Pairing-free searchable encryption method supporting revocation and verification
  • Pairing-free searchable encryption method supporting revocation and verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0104] The unpaired searchable encryption method supporting revocation and verification of this embodiment consists of the following steps (see figure 1 ):

[0105] (1) Generate encrypted indexes and files

[0106] The methods for generating encrypted indexes and files are as follows:

[0107] 1) Data owners from the group of p-order integers Select the private key α from , and determine the public key β as follows:

[0108] β=g α

[0109] where g is the group from order p A random element selected in , p>2 λ , λ is a parameter, λ is a finite positive integer, and the value of λ in this embodiment is 80.

[0110] 2) Determine the accumulator A as follows i :

[0111]

[0112] N=q 1 ×q 2

[0113] Among them, W i Represents the keyword set, i∈{1,2,...,n}, n represents the number of documents uploaded by the data owner, n is a finite positive integer, n in this embodiment is 1000, and w is the keyword set W i keyword in , q 1 , q 2 is a randomly selected lar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a pairing-free searchable encryption method supporting revocation and verification. The pairing-free searchable encryption method comprises the steps of generating an encryption index and a file, generating an aggregation shared key, generating a search token, querying a keyword, verifying a search result and revoking the shared key. The data owner encrypts the data, uploads the data to the cloud service provider, determines a shared document range, and generates a shared key; the data user initializes a trusted execution environment, establishes a secure channel with the data owner, generates a search token by using the shared key, and sends the search token to the cloud service provider; the cloud service provider returns the query result to the data user, and the data user verifies the correctness and integrity of the result; when the data owner needs to cancel the use right of the data user, key cancel operation is executed, a cancel instruction is sent, the data user deletes the key, and cancel is completed. Pairing operation is removed, credible revocation and public verification are supported, and the method has the advantages of being high in safety, high in search speed and the like and is suitable for scenes such as the Internet of Things.

Description

technical field [0001] The invention belongs to the technical field of searchable encrypted data, in particular to a pairless verifiable searchable encryption method supporting trusted revocation. Background technique [0002] In order to store the massive data generated daily and avoid cumbersome local data management, a large number of individual users and enterprises choose to migrate data to cloud servers to enjoy convenient cloud computing services. In order to avoid privacy leakage caused by malicious user attacks after data outsourcing, users choose to store data in ciphertext. Verifiable searchable encryption allows users to make search queries based on ciphertext, which can relieve data owners of privacy concerns. However the number of keys held by users will vary with the number of document sets they can retrieve. [0003] Zheli Liu's article "Verifiable searchable encryption with aggregate keys for data sharing system" (Future Generation Computer Systems, 2018) ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/08
CPCH04L63/0435H04L9/3213H04L63/123H04L9/0861Y02D30/50
Inventor 王静怡王涛徐飞
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products