CN108259172B - Ciphertext searching method in cloud storage system - Google Patents
Ciphertext searching method in cloud storage system Download PDFInfo
- Publication number
- CN108259172B CN108259172B CN201810031166.8A CN201810031166A CN108259172B CN 108259172 B CN108259172 B CN 108259172B CN 201810031166 A CN201810031166 A CN 201810031166A CN 108259172 B CN108259172 B CN 108259172B
- Authority
- CN
- China
- Prior art keywords
- data
- key
- private key
- private
- cloud server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a ciphertext searching method in a cloud storage system, which comprises the following steps: receiving and storing a ciphertext of the keyword sent by the data owner; a trap door for receiving the search key words sent by the data user; matching the trapdoor with the ciphertext to obtain a search result; the ciphertext is generated based on a private key of the data owner, the trapdoor is generated based on the private key of the data user, the private key of the data owner comprises a partial private key generated by the data owner through a private key generation center and a private value generated by the data owner, and the private key of the data user comprises a partial private key generated by the data user through the private key generation center and a private value generated by the data user. The invention can solve the searchability problem of the ciphertext and the safety problem of the keyword in the cloud storage system in a certificateless public key encryption mode.
Description
Technical Field
The invention relates to a cloud storage technology, in particular to ciphertext search in a cloud storage system.
Background
With the development of the internet, cloud storage and cloud computing are favored by users by virtue of the advantages of remote access service, low cost, high reliability of data, easy expansion of storage space and the like, become more and more important in daily life, and individuals and enterprises store own data in the cloud more and more. However, as the data management in the cloud is separated from the supervision of the user, many sensitive information is easily leaked, and the security of the data in the cloud storage is more and more concerned by cloud service providers and users. In order to prevent private data of a data owner from being leaked, the data owner usually encrypts the private data first and then stores the encrypted data in the cloud, but another problem is caused by the fact that when a user needs to retrieve a ciphertext file, the cloud server does not have a user key and can only retrieve the file name of the user ciphertext, and the method is lack of protection on keywords of the ciphertext and leaks some information of the user data to a certain extent. Therefore, the problems of searchability and security of the ciphertext in the cloud storage become an urgent problem to be solved.
The research and analysis of the existing cloud storage systems at home and abroad shows that the Baidu cloud uses plaintext for storage, has no related encryption mode, and supports a user to encrypt data by using third-party software and then upload the data to the cloud. The Baidu cloud is stored by using plaintext, and plaintext data of a user is easy to attack in the storage process, so that the security of the storage mode is general. If the user wants to protect the data of the user, the user needs to encrypt the data by using third-party software and upload the encrypted data to the cloud, the security of the encryption model is high, but only the file name of the ciphertext can be searched when the cloud server searches the ciphertext of the user, and the file name of the ciphertext of the user also reveals the related information of the ciphertext to a certain extent. In addition, if a user wants to share a ciphertext with another user, the user must tell the other party the ciphertext decryption key. Two problems are implied in this process, the first is that if the data owner encrypts different ciphertexts using different keys, the data owner needs to remember a large number of keys, and thus, this approach is inconvenient and not desirable for the user. If a data owner encrypts a lot of data with a certain key, the data encrypted with the same key may be leaked after the decryption key telling others of a certain ciphertext. Therefore, the method is not a cloud storage encryption method which can meet the requirements of security and user functions.
Amazon cloud storage service (Amazon S3) uses HTTPS to encrypt and transmit data, and encrypts and stores the data in the cloud, which is better than a hundred-degree cloud, and can prevent attacks from external attackers. However, in the three encryption methods of the SSE-S3, the SSE-KMS and the SSE-C, the keys for encrypting and decrypting data are always acquired by the cloud server, so that the encryption method can only prevent attacks from external attackers and cannot prevent attacks from the inside of the cloud. In addition, in the aspect of ciphertext search, decryption is always performed before search, and certain influence is also caused on efficiency, especially in the case of a large amount of data and large files, decryption takes a certain time, so that the method has certain space for improving safety and efficiency.
In summary, the Baidu cloud uses plaintext storage, the security is general, if data is encrypted and uploaded to the cloud, only the retrieval of the file name of the ciphertext can be supported, and in this way, some information of the ciphertext is leaked. The amazon cloud storage service supports keyword retrieval on a ciphertext by using ciphertext storage, but encryption and decryption keys are always acquired by a cloud end, so that the amazon cloud storage service still cannot resist attacks inside the cloud. That is, both of the cloud storage methods have a data security problem.
To solve the searchable encryption problem and the security problem of the ciphertext, Song et al proposes a first practical Symmetric searchable encryption method (SSE), but the method is only applicable to a single-user environment and is not applicable to a cloud storage environment. Then, Boneh et al propose a first searchable public key encryption method (PEKS), which can be used in a multi-user environment and thus can be used in a cloud storage environment. The PEKS method can enable a user to quickly search the ciphertext which the user wants, enhances the practicability of public key encryption, and creates a new research direction. Although the PEKS method solves the searchability problem of the ciphertext, Byun et al [3] attack the PEKS method, which indicates that the PEKS method is subjected to off-line keyword guessing attack (KG attack), and keyword information is still leaked. Then, Rhee et al proposed a Searchable Public-Key Encryption Scheme (dPEKS) for specifying a server, which can resist KG attacks by external attackers but still cannot resist KG attacks by the server. Because the Certificateless public key encryption system inherits the data confidentiality of the traditional public key encryption system and does not need to manage the certificate based on the identity public key encryption system, the Certificateless public key encryption system has better safety and practicability, Peng and the like combine the searchable encryption with the Certificateless public key encryption system, and provide a Certificateless public key encryption method (CLPEKS) based on the Certificateless searchable encryption method, so that the Certificateless public key encryption system has the advantages of being fully exerted, and the CLPEKS method has stronger practicability and higher safety. However, shortly after, Wu et al indicated that Peng et al's CLPEKS method also suffered from KG attack. Later, many scholars have improved on CLPEKS, but to date, no CLPEKS method has been found that can resist KG attacks.
Disclosure of Invention
The invention provides a ciphertext searching method in a cloud storage system, which comprises the following steps:
receiving and storing a ciphertext of the keyword sent by the data owner;
a trap door for receiving the search key words sent by the data user; and
matching the trapdoor with the ciphertext to obtain a search result;
the ciphertext is generated based on a private key of the data owner, the trapdoor is generated based on the private key of the data user, the private key of the data owner comprises a partial private key generated by the data owner through a private key generation center and a private value generated by the data owner, and the private key of the data user comprises a partial private key generated by the data user through the private key generation center and a private value generated by the data user.
And in the process of matching the trapdoor and the ciphertext, a private key of a cloud server is required to be used.
And generating a cipher text of the keyword by using a private key of the data owner, a public key of the data user, an identifier of the data user and an identifier of the cloud server.
And generating the trapdoor of the keyword by utilizing the public key of the data owner, the private key of the data user and the public key of the cloud server.
The data user part private key, the data owner part private key and the cloud server part private key are respectively generated on the basis of a data user identifier, a data owner identifier and a cloud server identifier;
the private key of the data user is generated based on a partial private key of the data user and a private value of the data user, the private key of the data owner is generated based on a partial private key of the data owner and a private value of the data owner, and the private key of the cloud server is generated based on a partial private key of the cloud server and a private value of the cloud server;
the data user public key, the data owner public key and the cloud server public key are generated based on public parameters generated by the key generation center and private values respectively corresponding to the data user, the data owner and the cloud server.
Generating a private key SK of a data owner using the following formulaOPart of the private key DOAnd public key PKO:
DO=s·QO,SKO={xO,DO},PKO=xOP2;
The private key SK of the data user is generated by using the following formulaUPart of the private key DUAnd public key PKU:
DU=s·QU,SKU={xU,DU},PKU=xUP2;
Private key SK of cloud server is generated by using the following formulaSPart of the private key DSAnd public key PKS:
DS=s·QS,SKS={xS,DS},PKS=xS·P1;
Wherein x isS、xO、xUPrivate values, P, of the cloud server, data owner, and data user, respectively1And P2To generate a primitive, P1,P2∈G1;
Wherein Q isS=H1(IDS),QU=H1(IDU),QO=H1(IDO),IDS、IDU、IDORespectively cloud server identification, data user identification and data owner identification.
Ciphertext C of keyword w is generated by using the following formulaw={C1,C2,C3}:
C1=rP1,
C2=rP2,
Wherein r is a random number, xOIs a private value of the data owner, P1And P2To generate a primitive, P1,P2∈G1, PKUIs a public key, ID, of a data userUIdentification, ID, for data usersSAnd identifying the cloud server.
Trapdoor T for generating search key w by using the following formulaw={T1,T2}:
T1=DU+xU·H2(w)·PKO+r1P2,
T2=r1PKS,
Wherein r is1Is a random number, xUIs the private value of the data consumer, DUPartial private keys, PK, for data usersOIs a data owner public key, PKSIs a cloud server public key.
The trapdoor T is aligned by adopting the following formulaw={T1,T2} and ciphertext Cw={C1,C2,C3Matching:
e(C1,DS+T1)=C3·e(T2,C2)x(ii) a Wherein the content of the first and second substances,xSas a private value of the cloud server, DSA private key for the cloud server portion;
if the equality is established, the keyword w in the trapdoor is the same as the keyword w in the ciphertext, the matching is successful, otherwise, the matching is failed.
The embodiment of the invention is realized in a certificateless searchable public key encryption mode, not only meets the searchable function of the ciphertext in the cloud storage, but also can resist KG attacks of external attackers and servers, thereby solving the searchable problem of the ciphertext and the security problem of keywords in the cloud storage system. Besides, the method has strong practicability and high performance in the similar method.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 illustrates main steps of a ciphertext search method in a cloud storage system according to an embodiment of the present invention; and
fig. 2 shows detailed steps of a ciphertext search method in a cloud storage system according to another embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar components or components having the same or similar functions throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
Fig. 1 shows the main steps of a ciphertext search method in a cloud storage system, which may be executed by a cloud server and includes:
ST1, receiving and storing the cipher text of the key word sent by the data owner;
ST2, trapdoor for receiving search key word sent by data user; and
ST3, matching the trapdoor with the ciphertext to obtain a search result;
the ciphertext is generated based on a private key of the data owner, the trapdoor is generated based on the private key of the data user, the private key of the data owner comprises a partial private key generated by the data owner through a private key generation center and a private value generated by the data owner, and the private key of the data user comprises a partial private key generated by the data user through the private key generation center and a private value generated by the data user.
And in the process of matching the trapdoor and the ciphertext, a private key of a cloud server is required to be used.
And generating a cipher text of the keyword by using a private key of the data owner, a public key of the data user, an identifier of the data user and an identifier of the cloud server.
And generating the trapdoor of the keyword by utilizing the public key of the data owner, the private key of the data user and the public key of the cloud server.
The data user part private key, the data owner part private key and the cloud server part private key are respectively generated on the basis of a data user identifier, a data owner identifier and a cloud server identifier;
the private key of the data user is generated based on a partial private key of the data user and a private value of the data user, the private key of the data owner is generated based on a partial private key of the data owner and a private value of the data owner, and the private key of the cloud server is generated based on a partial private key of the cloud server and a private value of the cloud server;
the data user public key, the data owner public key and the cloud server public key are generated based on public parameters generated by the key generation center and private values respectively corresponding to the data user, the data owner and the cloud server.
Fig. 2 shows detailed steps of a ciphertext search method in a cloud storage system according to another embodiment of the present invention, including:
s1, generating public system parameters by a Key Generation Center (KGC for short); may include the following steps S11-S13:
s11, inputting a k as a safety parameter, and selecting a bilinear mapping e: G1×G1→G2。
S13, setting the master key msk ═ S, and outputting the public system parameter param:
param={k,G1,G2,e,q,P1,P2,Ppub,H1,H2,H3}
wherein H1,H2,H3Are 3 different hash functions:
s2, KGC generates partial private key D of serverSPartial private key D of data userUAnd partial private key D of data ownerO. D can be generated by the following steps S21-S23S、DUAnd DO. SK can be generated by the following steps S21 and S22SAnd PKS。
S21, calculating: qS=H1(IDS),QU=H1(IDU),QO=H1(IDO) Wherein IDS、IDU、 IDORespectively cloud server identification, data user identification and data owner identification.
S22, calculating a partial private key by using the master key S: dS=s·QS,DU=s·QU,DO=s·QO。
S23, sending D respectivelyS、DU、DOTo the server, to the data consumer, and to the data owner.
S3, cloud server generates server private key SKSAnd server public key PKS. SK can be generated by the following steps S31 and S32SAnd PKS。
S31, the cloud server selects a random number xS(also known as the private value of the cloud server);
s32, the cloud server utilizes the random number xSAnd server part private key DSSetting its own private key SKS={xS,DSUsing a random number xSAnd generating element P1Calculate the server public key PKS=xS·P1。
S4, generating data owner public key PKOData owner private key SKOData user public key PKUAnd data user private key SKU. PK may be generated by the following steps S41 and S42O、SKO、PKUAnd SKU。
S41, selecting a random number x by the data owner and the data consumer respectivelyO(also called private value of data owner) and a random number xU(private value of data consumer).
S42, data owner uses random number xOAnd data owner partial private key DOSetting its own private key SKO={xO,DOUsing a random number xOAnd generating element P2Computing a data owner public key PKO=xOP2(ii) a Data user utilizes random number xUAnd a data user part private key DUSetting its own private key SKU={xU,DUUsing a random number xUAnd generating element P2Calculating the public key PK of the data userU=xUP2。
S5, the data owner encrypts the keyword w to generate a keyword ciphertext CwAnd sending the data to a cloud server for storage. Preferably, the method includes steps S51-S54:
and S51, selecting a random number r.
S52, calculating QU=H1(IDU),QS=H1(IDS)。
S53, using random number r and random number xOGenerating element P1And P2Server public key PKSAnd data user public key PKUGenerating ciphertext C corresponding to keyword ww={C1,C2,C3}. Preferably, the specific process is as follows:
C1=rP1,
C2=rP2,
s54, sending ciphertext CwAnd storing the data to the cloud server.
S6, when the data user wants to search the ciphertext with the keyword w, the trapdoor T for searching is generatedwAnd sending the data to the cloud server for retrieval. Preferably, the method includes steps S61-S63:
s61, selecting a random number r1。
S62, using random number r1Random number xUPrivate key D of data user partUData owner public key PKOPublic key PK of cloud serverSAnd generating element P2Trapdoor T for calculation and retrievalw={T1,T2The method concretely comprises the following steps:
T1=DU+xU·H2(w)·PKO+r1P2,
T2=r1PKS,
s63, sending trapdoor TwAnd searching to the cloud server.
S7, trap door T sent by cloud server to data userwAnd stored key ciphertext CwAnd matching and performing subsequent processing according to a matching result.
Trapdoor T sent by cloud server receiving data userwThen, the trapdoor T is put inwAnd ciphertext C of the stored data ownerwThe matching is carried out, and the calculation can be carried out firstlyAnd then the following matching formula is used for verification:
e(C1,DS+T1)=C3·e(T2,C2)x
if the key word w in the ciphertext is the same as the key word w in the trapdoor, the equation is established, the matching is successful, and otherwise, the matching is failed.
The verification process of the matching formula is as follows:
the embodiment of the invention can meet the searching function of the ciphertext in the cloud storage and can resist KG attacks of external attackers and servers, thereby solving the searching problem of the ciphertext and the safety problem of keywords in the cloud storage system and having stronger practicability and high performance.
In addition, the invention has no certificate management problem, and has the advantages of high ciphertext retrieval speed and high practicability. According to the invention, companies or individuals can develop related systems to protect own data security. The existing cloud storage platform can also add corresponding functions according to the invention, thereby realizing greater protection of user data.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples" or the like, mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing is a more detailed description of the present invention that is presented in conjunction with specific embodiments, and the practice of the invention is not to be considered limited to those descriptions. It will be apparent to those skilled in the art that a number of simple derivations or substitutions can be made without departing from the inventive concept.
Claims (8)
1. A ciphertext search method in a cloud storage system comprises the following steps:
receiving and storing a ciphertext of the keyword sent by the data owner;
a trap door for receiving the search key words sent by the data user; and
matching the trapdoor with the ciphertext to obtain a search result;
wherein the ciphertext is generated based on a private key of the data owner, the trapdoor is generated based on a private key of the data user, the private key of the data owner comprises a partial private key generated by the data owner by using a key generation center and a private value generated by the data owner, the private key of the data user comprises a partial private key generated by the data user by using the key generation center and a private value generated by the data user,
wherein G is a bilinear mapping1×G1→G2Random selection ofAnd two generators P1,P2∈G1And calculate Ppub=sP1Generating a ciphertext C of the keyword w using the following formulaw={C1,C2,C3}:
C1=rP1,
C2=rP2,
Wherein r is a random number, xOFor data congestionPrivacy value of the owner, P1And P2To generate a primitive, P1,P2∈G1,PKUIs a public key, ID, of a data userUIdentification, ID, for data usersSIdentify for cloud Server, H1、H2Are two different hash functions:
2. the method of claim 1, wherein matching the trapdoor and ciphertext utilizes a private key of a cloud server.
3. The method of claim 2, wherein the ciphertext of the key is generated using a private key of a data owner, a public key of a data user, an identifier of the data user, and an identifier of a cloud server.
4. The method of claim 3, wherein the trapdoor for the key is generated using a data owner public key, a data user private key, and a cloud server public key.
5. The method of claim 4, wherein:
the data user part private key, the data owner part private key and the cloud server part private key are respectively generated on the basis of a data user identifier, a data owner identifier and a cloud server identifier;
the private key of the data user is generated based on a part of the private key of the data user and the private value of the data user; the data owner private key is generated based on a partial private key of the data owner and a private value of the data owner, and the cloud server private key is generated based on a partial private key of the cloud server and a private value of the cloud server;
the data user public key, the data owner public key and the cloud server public key are generated based on public parameters generated by the key generation center and private values respectively corresponding to the data user, the data owner and the cloud server.
6. The method of claim 5, wherein:
generating a private key SK of a data owner using the following formulaOPart of the private key DOAnd public key PKO:
DO=s·QO,SKO={xO,DO},PKO=xOP2;
The private key SK of the data user is generated by using the following formulaUPart of the private key DUAnd public key PKU:
DU=s·QU,SKU={xU,DU},PKU=xUP2;
Private key SK of cloud server is generated by using the following formulaSPart of the private key DSAnd public key PKS:
DS=s·QS,SKS={xS,DS},PKS=xS·P1;
Wherein x isS、xO、xUPrivate values, P, of the cloud server, data owner, and data user, respectively1And P2To generate a primitive, P1,P2∈G1;
Wherein Q isS=H1(IDS),QU=H1(IDU),QO=H1(IDO),IDS、IDU、IDORespectively cloud server identification, data user identification and data owner identification.
7. The method of claim 1, wherein the trapdoor T for the search key w is generated using the following formulaw={T1,T2}:
T1=DU+xU·H2(w)·PKO+r1P2,
T2=r1PKS,
Wherein r is1Is a random number, xUIs the private value of the data consumer, DUPartial private keys, PK, for data usersOIs a data owner public key, PKSIs a cloud server public key.
8. The method of claim 7, wherein the trapdoor T is characterized by the following equationw={T1,T2} and ciphertext Cw={C1,C2,C3Matching:
e(C1,DS+T1)=C3·e(T2,C2)x(ii) a Wherein the content of the first and second substances,xSas a private value of the cloud server, DSA private key for the cloud server portion;
if the equality is established, the keyword w in the trapdoor is the same as the keyword w in the ciphertext, the matching is successful, otherwise, the matching is failed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810031166.8A CN108259172B (en) | 2018-01-12 | 2018-01-12 | Ciphertext searching method in cloud storage system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810031166.8A CN108259172B (en) | 2018-01-12 | 2018-01-12 | Ciphertext searching method in cloud storage system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108259172A CN108259172A (en) | 2018-07-06 |
CN108259172B true CN108259172B (en) | 2021-02-05 |
Family
ID=62726967
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810031166.8A Expired - Fee Related CN108259172B (en) | 2018-01-12 | 2018-01-12 | Ciphertext searching method in cloud storage system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108259172B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109255244B (en) * | 2018-07-16 | 2020-08-11 | 哈尔滨工业大学(深圳) | Data encryption method and device and data encryption retrieval system |
CN109889332A (en) * | 2019-01-21 | 2019-06-14 | 电子科技大学 | Equation testing encryption method based on certificate |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104408177A (en) * | 2014-12-15 | 2015-03-11 | 西安电子科技大学 | Cipher searching method based on cloud document system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9425960B2 (en) * | 2008-10-17 | 2016-08-23 | Sap Se | Searchable encryption for outsourcing data analytics |
US9391965B2 (en) * | 2012-01-25 | 2016-07-12 | Mitsubishi Electric Corporation | Data search device, data search method, data search program, data registration device, data registration method, data registration program, and information processing device |
CN104852801B (en) * | 2015-02-13 | 2018-02-13 | 陕西师范大学 | A kind of public key encryption method that can search for |
CN105282167A (en) * | 2015-11-06 | 2016-01-27 | 福建工程学院 | Searchable certificateless public key encryption method |
CN105681280B (en) * | 2015-12-29 | 2019-02-22 | 西安电子科技大学 | Encryption method can search for based on Chinese in a kind of cloud environment |
-
2018
- 2018-01-12 CN CN201810031166.8A patent/CN108259172B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104408177A (en) * | 2014-12-15 | 2015-03-11 | 西安电子科技大学 | Cipher searching method based on cloud document system |
Non-Patent Citations (2)
Title |
---|
《On the Security of a Certificateless Public Key Encryption with Keyword Search》;Tsu-Yang Wu et al.;《International Conference on Intelligent Information Hiding and Multimedia Signal Processing》;20170718;全文 * |
《无证书连接关键字密文检索》;伍祈应等;《西安电子科技大学学报(自然科学版)》;20170630;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN108259172A (en) | 2018-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage | |
Wang et al. | Secure ranked keyword search over encrypted cloud data | |
CN109614818B (en) | Authorized identity-based keyword search encryption method | |
JP6180177B2 (en) | Encrypted data inquiry method and system capable of protecting privacy | |
CN109450935B (en) | Verifiable semantic security multi-keyword search method in cloud storage | |
CN111130757A (en) | Multi-cloud CP-ABE access control method based on block chain | |
US20140192976A1 (en) | Method and system for id-based encryption and decryption | |
CN106487506B (en) | Multi-mechanism KP-ABE method supporting pre-encryption and outsourcing decryption | |
CN109361644B (en) | Fuzzy attribute based encryption method supporting rapid search and decryption | |
CN108092972B (en) | Multi-authorization-center attribute-based searchable encryption method | |
CN112800445B (en) | Boolean query method for forward and backward security and verifiability of ciphertext data | |
CN105282167A (en) | Searchable certificateless public key encryption method | |
CN115632880B (en) | Reliable data transmission and storage method and system based on state cryptographic algorithm | |
CN114528331A (en) | Data query method, device, medium and equipment based on block chain | |
CN114142996B (en) | Searchable encryption method based on SM9 cryptographic algorithm | |
CN108259172B (en) | Ciphertext searching method in cloud storage system | |
CN108243000B (en) | Ciphertext searching method in cloud storage system | |
CN105007258B (en) | A kind of quick keyword can search for public key encryption method | |
CN107454059B (en) | Search encryption method based on sequence cipher in cloud storage environment | |
Suveetha et al. | Ensuring confidentiality of cloud data using homomorphic encryption | |
CN109672525B (en) | Searchable public key encryption method and system with forward index | |
CN108920968B (en) | File searchable encryption method based on connection keywords | |
JP5799635B2 (en) | ENCRYPTED DATA SEARCH SYSTEM, DEVICE, METHOD, AND PROGRAM | |
Wang et al. | DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption | |
CN115174600A (en) | Ciphertext data encryption and safe retrieval method and device for cloud storage system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210205 Termination date: 20220112 |