CN108259172B - Ciphertext searching method in cloud storage system - Google Patents

Ciphertext searching method in cloud storage system Download PDF

Info

Publication number
CN108259172B
CN108259172B CN201810031166.8A CN201810031166A CN108259172B CN 108259172 B CN108259172 B CN 108259172B CN 201810031166 A CN201810031166 A CN 201810031166A CN 108259172 B CN108259172 B CN 108259172B
Authority
CN
China
Prior art keywords
data
key
private key
private
cloud server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810031166.8A
Other languages
Chinese (zh)
Other versions
CN108259172A (en
Inventor
陈建铭
吴祖扬
孟超
王景行
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Graduate School Harbin Institute of Technology
Original Assignee
Shenzhen Graduate School Harbin Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Graduate School Harbin Institute of Technology filed Critical Shenzhen Graduate School Harbin Institute of Technology
Priority to CN201810031166.8A priority Critical patent/CN108259172B/en
Publication of CN108259172A publication Critical patent/CN108259172A/en
Application granted granted Critical
Publication of CN108259172B publication Critical patent/CN108259172B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a ciphertext searching method in a cloud storage system, which comprises the following steps: receiving and storing a ciphertext of the keyword sent by the data owner; a trap door for receiving the search key words sent by the data user; matching the trapdoor with the ciphertext to obtain a search result; the ciphertext is generated based on a private key of the data owner, the trapdoor is generated based on the private key of the data user, the private key of the data owner comprises a partial private key generated by the data owner through a private key generation center and a private value generated by the data owner, and the private key of the data user comprises a partial private key generated by the data user through the private key generation center and a private value generated by the data user. The invention can solve the searchability problem of the ciphertext and the safety problem of the keyword in the cloud storage system in a certificateless public key encryption mode.

Description

Ciphertext searching method in cloud storage system
Technical Field
The invention relates to a cloud storage technology, in particular to ciphertext search in a cloud storage system.
Background
With the development of the internet, cloud storage and cloud computing are favored by users by virtue of the advantages of remote access service, low cost, high reliability of data, easy expansion of storage space and the like, become more and more important in daily life, and individuals and enterprises store own data in the cloud more and more. However, as the data management in the cloud is separated from the supervision of the user, many sensitive information is easily leaked, and the security of the data in the cloud storage is more and more concerned by cloud service providers and users. In order to prevent private data of a data owner from being leaked, the data owner usually encrypts the private data first and then stores the encrypted data in the cloud, but another problem is caused by the fact that when a user needs to retrieve a ciphertext file, the cloud server does not have a user key and can only retrieve the file name of the user ciphertext, and the method is lack of protection on keywords of the ciphertext and leaks some information of the user data to a certain extent. Therefore, the problems of searchability and security of the ciphertext in the cloud storage become an urgent problem to be solved.
The research and analysis of the existing cloud storage systems at home and abroad shows that the Baidu cloud uses plaintext for storage, has no related encryption mode, and supports a user to encrypt data by using third-party software and then upload the data to the cloud. The Baidu cloud is stored by using plaintext, and plaintext data of a user is easy to attack in the storage process, so that the security of the storage mode is general. If the user wants to protect the data of the user, the user needs to encrypt the data by using third-party software and upload the encrypted data to the cloud, the security of the encryption model is high, but only the file name of the ciphertext can be searched when the cloud server searches the ciphertext of the user, and the file name of the ciphertext of the user also reveals the related information of the ciphertext to a certain extent. In addition, if a user wants to share a ciphertext with another user, the user must tell the other party the ciphertext decryption key. Two problems are implied in this process, the first is that if the data owner encrypts different ciphertexts using different keys, the data owner needs to remember a large number of keys, and thus, this approach is inconvenient and not desirable for the user. If a data owner encrypts a lot of data with a certain key, the data encrypted with the same key may be leaked after the decryption key telling others of a certain ciphertext. Therefore, the method is not a cloud storage encryption method which can meet the requirements of security and user functions.
Amazon cloud storage service (Amazon S3) uses HTTPS to encrypt and transmit data, and encrypts and stores the data in the cloud, which is better than a hundred-degree cloud, and can prevent attacks from external attackers. However, in the three encryption methods of the SSE-S3, the SSE-KMS and the SSE-C, the keys for encrypting and decrypting data are always acquired by the cloud server, so that the encryption method can only prevent attacks from external attackers and cannot prevent attacks from the inside of the cloud. In addition, in the aspect of ciphertext search, decryption is always performed before search, and certain influence is also caused on efficiency, especially in the case of a large amount of data and large files, decryption takes a certain time, so that the method has certain space for improving safety and efficiency.
In summary, the Baidu cloud uses plaintext storage, the security is general, if data is encrypted and uploaded to the cloud, only the retrieval of the file name of the ciphertext can be supported, and in this way, some information of the ciphertext is leaked. The amazon cloud storage service supports keyword retrieval on a ciphertext by using ciphertext storage, but encryption and decryption keys are always acquired by a cloud end, so that the amazon cloud storage service still cannot resist attacks inside the cloud. That is, both of the cloud storage methods have a data security problem.
To solve the searchable encryption problem and the security problem of the ciphertext, Song et al proposes a first practical Symmetric searchable encryption method (SSE), but the method is only applicable to a single-user environment and is not applicable to a cloud storage environment. Then, Boneh et al propose a first searchable public key encryption method (PEKS), which can be used in a multi-user environment and thus can be used in a cloud storage environment. The PEKS method can enable a user to quickly search the ciphertext which the user wants, enhances the practicability of public key encryption, and creates a new research direction. Although the PEKS method solves the searchability problem of the ciphertext, Byun et al [3] attack the PEKS method, which indicates that the PEKS method is subjected to off-line keyword guessing attack (KG attack), and keyword information is still leaked. Then, Rhee et al proposed a Searchable Public-Key Encryption Scheme (dPEKS) for specifying a server, which can resist KG attacks by external attackers but still cannot resist KG attacks by the server. Because the Certificateless public key encryption system inherits the data confidentiality of the traditional public key encryption system and does not need to manage the certificate based on the identity public key encryption system, the Certificateless public key encryption system has better safety and practicability, Peng and the like combine the searchable encryption with the Certificateless public key encryption system, and provide a Certificateless public key encryption method (CLPEKS) based on the Certificateless searchable encryption method, so that the Certificateless public key encryption system has the advantages of being fully exerted, and the CLPEKS method has stronger practicability and higher safety. However, shortly after, Wu et al indicated that Peng et al's CLPEKS method also suffered from KG attack. Later, many scholars have improved on CLPEKS, but to date, no CLPEKS method has been found that can resist KG attacks.
Disclosure of Invention
The invention provides a ciphertext searching method in a cloud storage system, which comprises the following steps:
receiving and storing a ciphertext of the keyword sent by the data owner;
a trap door for receiving the search key words sent by the data user; and
matching the trapdoor with the ciphertext to obtain a search result;
the ciphertext is generated based on a private key of the data owner, the trapdoor is generated based on the private key of the data user, the private key of the data owner comprises a partial private key generated by the data owner through a private key generation center and a private value generated by the data owner, and the private key of the data user comprises a partial private key generated by the data user through the private key generation center and a private value generated by the data user.
And in the process of matching the trapdoor and the ciphertext, a private key of a cloud server is required to be used.
And generating a cipher text of the keyword by using a private key of the data owner, a public key of the data user, an identifier of the data user and an identifier of the cloud server.
And generating the trapdoor of the keyword by utilizing the public key of the data owner, the private key of the data user and the public key of the cloud server.
The data user part private key, the data owner part private key and the cloud server part private key are respectively generated on the basis of a data user identifier, a data owner identifier and a cloud server identifier;
the private key of the data user is generated based on a partial private key of the data user and a private value of the data user, the private key of the data owner is generated based on a partial private key of the data owner and a private value of the data owner, and the private key of the cloud server is generated based on a partial private key of the cloud server and a private value of the cloud server;
the data user public key, the data owner public key and the cloud server public key are generated based on public parameters generated by the key generation center and private values respectively corresponding to the data user, the data owner and the cloud server.
Generating a private key SK of a data owner using the following formulaOPart of the private key DOAnd public key PKO
DO=s·QO,SKO={xO,DO},PKO=xOP2
The private key SK of the data user is generated by using the following formulaUPart of the private key DUAnd public key PKU
DU=s·QU,SKU={xU,DU},PKU=xUP2
Private key SK of cloud server is generated by using the following formulaSPart of the private key DSAnd public key PKS
DS=s·QS,SKS={xS,DS},PKS=xS·P1
Wherein x isS、xO、xUPrivate values, P, of the cloud server, data owner, and data user, respectively1And P2To generate a primitive, P1,P2∈G1
Wherein Q isS=H1(IDS),QU=H1(IDU),QO=H1(IDO),IDS、IDU、IDORespectively cloud server identification, data user identification and data owner identification.
Ciphertext C of keyword w is generated by using the following formulaw={C1,C2,C3}:
C1=rP1,
C2=rP2,
Figure BDA0001546506130000041
Wherein r is a random number, xOIs a private value of the data owner, P1And P2To generate a primitive, P1,P2∈G1, PKUIs a public key, ID, of a data userUIdentification, ID, for data usersSAnd identifying the cloud server.
Trapdoor T for generating search key w by using the following formulaw={T1,T2}:
T1=DU+xU·H2(w)·PKO+r1P2,
T2=r1PKS,
Wherein r is1Is a random number, xUIs the private value of the data consumer, DUPartial private keys, PK, for data usersOIs a data owner public key, PKSIs a cloud server public key.
The trapdoor T is aligned by adopting the following formulaw={T1,T2} and ciphertext Cw={C1,C2,C3Matching:
e(C1,DS+T1)=C3·e(T2,C2)x(ii) a Wherein the content of the first and second substances,
Figure BDA0001546506130000042
xSas a private value of the cloud server, DSA private key for the cloud server portion;
if the equality is established, the keyword w in the trapdoor is the same as the keyword w in the ciphertext, the matching is successful, otherwise, the matching is failed.
The embodiment of the invention is realized in a certificateless searchable public key encryption mode, not only meets the searchable function of the ciphertext in the cloud storage, but also can resist KG attacks of external attackers and servers, thereby solving the searchable problem of the ciphertext and the security problem of keywords in the cloud storage system. Besides, the method has strong practicability and high performance in the similar method.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 illustrates main steps of a ciphertext search method in a cloud storage system according to an embodiment of the present invention; and
fig. 2 shows detailed steps of a ciphertext search method in a cloud storage system according to another embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar components or components having the same or similar functions throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
Fig. 1 shows the main steps of a ciphertext search method in a cloud storage system, which may be executed by a cloud server and includes:
ST1, receiving and storing the cipher text of the key word sent by the data owner;
ST2, trapdoor for receiving search key word sent by data user; and
ST3, matching the trapdoor with the ciphertext to obtain a search result;
the ciphertext is generated based on a private key of the data owner, the trapdoor is generated based on the private key of the data user, the private key of the data owner comprises a partial private key generated by the data owner through a private key generation center and a private value generated by the data owner, and the private key of the data user comprises a partial private key generated by the data user through the private key generation center and a private value generated by the data user.
And in the process of matching the trapdoor and the ciphertext, a private key of a cloud server is required to be used.
And generating a cipher text of the keyword by using a private key of the data owner, a public key of the data user, an identifier of the data user and an identifier of the cloud server.
And generating the trapdoor of the keyword by utilizing the public key of the data owner, the private key of the data user and the public key of the cloud server.
The data user part private key, the data owner part private key and the cloud server part private key are respectively generated on the basis of a data user identifier, a data owner identifier and a cloud server identifier;
the private key of the data user is generated based on a partial private key of the data user and a private value of the data user, the private key of the data owner is generated based on a partial private key of the data owner and a private value of the data owner, and the private key of the cloud server is generated based on a partial private key of the cloud server and a private value of the cloud server;
the data user public key, the data owner public key and the cloud server public key are generated based on public parameters generated by the key generation center and private values respectively corresponding to the data user, the data owner and the cloud server.
Fig. 2 shows detailed steps of a ciphertext search method in a cloud storage system according to another embodiment of the present invention, including:
s1, generating public system parameters by a Key Generation Center (KGC for short); may include the following steps S11-S13:
s11, inputting a k as a safety parameter, and selecting a bilinear mapping e: G1×G1→G2
S12, random selection
Figure BDA0001546506130000061
And two generators P1,P2∈G1And calculate Ppub=sP1
S13, setting the master key msk ═ S, and outputting the public system parameter param:
param={k,G1,G2,e,q,P1,P2,Ppub,H1,H2,H3}
wherein H1,H2,H3Are 3 different hash functions:
Figure BDA0001546506130000062
s2, KGC generates partial private key D of serverSPartial private key D of data userUAnd partial private key D of data ownerO. D can be generated by the following steps S21-S23S、DUAnd DO. SK can be generated by the following steps S21 and S22SAnd PKS
S21, calculating: qS=H1(IDS),QU=H1(IDU),QO=H1(IDO) Wherein IDS、IDU、 IDORespectively cloud server identification, data user identification and data owner identification.
S22, calculating a partial private key by using the master key S: dS=s·QS,DU=s·QU,DO=s·QO
S23, sending D respectivelyS、DU、DOTo the server, to the data consumer, and to the data owner.
S3, cloud server generates server private key SKSAnd server public key PKS. SK can be generated by the following steps S31 and S32SAnd PKS
S31, the cloud server selects a random number xS(also known as the private value of the cloud server);
s32, the cloud server utilizes the random number xSAnd server part private key DSSetting its own private key SKS={xS,DSUsing a random number xSAnd generating element P1Calculate the server public key PKS=xS·P1
S4, generating data owner public key PKOData owner private key SKOData user public key PKUAnd data user private key SKU. PK may be generated by the following steps S41 and S42O、SKO、PKUAnd SKU
S41, selecting a random number x by the data owner and the data consumer respectivelyO(also called private value of data owner) and a random number xU(private value of data consumer).
S42, data owner uses random number xOAnd data owner partial private key DOSetting its own private key SKO={xO,DOUsing a random number xOAnd generating element P2Computing a data owner public key PKO=xOP2(ii) a Data user utilizes random number xUAnd a data user part private key DUSetting its own private key SKU={xU,DUUsing a random number xUAnd generating element P2Calculating the public key PK of the data userU=xUP2
S5, the data owner encrypts the keyword w to generate a keyword ciphertext CwAnd sending the data to a cloud server for storage. Preferably, the method includes steps S51-S54:
and S51, selecting a random number r.
S52, calculating QU=H1(IDU),QS=H1(IDS)。
S53, using random number r and random number xOGenerating element P1And P2Server public key PKSAnd data user public key PKUGenerating ciphertext C corresponding to keyword ww={C1,C2,C3}. Preferably, the specific process is as follows:
C1=rP1,
C2=rP2,
Figure BDA0001546506130000071
s54, sending ciphertext CwAnd storing the data to the cloud server.
S6, when the data user wants to search the ciphertext with the keyword w, the trapdoor T for searching is generatedwAnd sending the data to the cloud server for retrieval. Preferably, the method includes steps S61-S63:
s61, selecting a random number r1
S62, using random number r1Random number xUPrivate key D of data user partUData owner public key PKOPublic key PK of cloud serverSAnd generating element P2Trapdoor T for calculation and retrievalw={T1,T2The method concretely comprises the following steps:
T1=DU+xU·H2(w)·PKO+r1P2,
T2=r1PKS,
s63, sending trapdoor TwAnd searching to the cloud server.
S7, trap door T sent by cloud server to data userwAnd stored key ciphertext CwAnd matching and performing subsequent processing according to a matching result.
Trapdoor T sent by cloud server receiving data userwThen, the trapdoor T is put inwAnd ciphertext C of the stored data ownerwThe matching is carried out, and the calculation can be carried out firstly
Figure BDA0001546506130000072
And then the following matching formula is used for verification:
e(C1,DS+T1)=C3·e(T2,C2)x
if the key word w in the ciphertext is the same as the key word w in the trapdoor, the equation is established, the matching is successful, and otherwise, the matching is failed.
The verification process of the matching formula is as follows:
Figure BDA0001546506130000081
the embodiment of the invention can meet the searching function of the ciphertext in the cloud storage and can resist KG attacks of external attackers and servers, thereby solving the searching problem of the ciphertext and the safety problem of keywords in the cloud storage system and having stronger practicability and high performance.
In addition, the invention has no certificate management problem, and has the advantages of high ciphertext retrieval speed and high practicability. According to the invention, companies or individuals can develop related systems to protect own data security. The existing cloud storage platform can also add corresponding functions according to the invention, thereby realizing greater protection of user data.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples" or the like, mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing is a more detailed description of the present invention that is presented in conjunction with specific embodiments, and the practice of the invention is not to be considered limited to those descriptions. It will be apparent to those skilled in the art that a number of simple derivations or substitutions can be made without departing from the inventive concept.

Claims (8)

1. A ciphertext search method in a cloud storage system comprises the following steps:
receiving and storing a ciphertext of the keyword sent by the data owner;
a trap door for receiving the search key words sent by the data user; and
matching the trapdoor with the ciphertext to obtain a search result;
wherein the ciphertext is generated based on a private key of the data owner, the trapdoor is generated based on a private key of the data user, the private key of the data owner comprises a partial private key generated by the data owner by using a key generation center and a private value generated by the data owner, the private key of the data user comprises a partial private key generated by the data user by using the key generation center and a private value generated by the data user,
wherein G is a bilinear mapping1×G1→G2Random selection of
Figure FDA0002717787570000011
And two generators P1,P2∈G1And calculate Ppub=sP1Generating a ciphertext C of the keyword w using the following formulaw={C1,C2,C3}:
C1=rP1,
C2=rP2,
Figure FDA0002717787570000012
Wherein r is a random number, xOFor data congestionPrivacy value of the owner, P1And P2To generate a primitive, P1,P2∈G1,PKUIs a public key, ID, of a data userUIdentification, ID, for data usersSIdentify for cloud Server, H1、H2Are two different hash functions:
H1:{0,1}*→G1,H2:
Figure FDA0002717787570000013
2. the method of claim 1, wherein matching the trapdoor and ciphertext utilizes a private key of a cloud server.
3. The method of claim 2, wherein the ciphertext of the key is generated using a private key of a data owner, a public key of a data user, an identifier of the data user, and an identifier of a cloud server.
4. The method of claim 3, wherein the trapdoor for the key is generated using a data owner public key, a data user private key, and a cloud server public key.
5. The method of claim 4, wherein:
the data user part private key, the data owner part private key and the cloud server part private key are respectively generated on the basis of a data user identifier, a data owner identifier and a cloud server identifier;
the private key of the data user is generated based on a part of the private key of the data user and the private value of the data user; the data owner private key is generated based on a partial private key of the data owner and a private value of the data owner, and the cloud server private key is generated based on a partial private key of the cloud server and a private value of the cloud server;
the data user public key, the data owner public key and the cloud server public key are generated based on public parameters generated by the key generation center and private values respectively corresponding to the data user, the data owner and the cloud server.
6. The method of claim 5, wherein:
generating a private key SK of a data owner using the following formulaOPart of the private key DOAnd public key PKO
DO=s·QO,SKO={xO,DO},PKO=xOP2
The private key SK of the data user is generated by using the following formulaUPart of the private key DUAnd public key PKU
DU=s·QU,SKU={xU,DU},PKU=xUP2
Private key SK of cloud server is generated by using the following formulaSPart of the private key DSAnd public key PKS
DS=s·QS,SKS={xS,DS},PKS=xS·P1
Wherein x isS、xO、xUPrivate values, P, of the cloud server, data owner, and data user, respectively1And P2To generate a primitive, P1,P2∈G1
Wherein Q isS=H1(IDS),QU=H1(IDU),QO=H1(IDO),IDS、IDU、IDORespectively cloud server identification, data user identification and data owner identification.
7. The method of claim 1, wherein the trapdoor T for the search key w is generated using the following formulaw={T1,T2}:
T1=DU+xU·H2(w)·PKO+r1P2,
T2=r1PKS,
Wherein r is1Is a random number, xUIs the private value of the data consumer, DUPartial private keys, PK, for data usersOIs a data owner public key, PKSIs a cloud server public key.
8. The method of claim 7, wherein the trapdoor T is characterized by the following equationw={T1,T2} and ciphertext Cw={C1,C2,C3Matching:
e(C1,DS+T1)=C3·e(T2,C2)x(ii) a Wherein the content of the first and second substances,
Figure FDA0002717787570000021
xSas a private value of the cloud server, DSA private key for the cloud server portion;
if the equality is established, the keyword w in the trapdoor is the same as the keyword w in the ciphertext, the matching is successful, otherwise, the matching is failed.
CN201810031166.8A 2018-01-12 2018-01-12 Ciphertext searching method in cloud storage system Expired - Fee Related CN108259172B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810031166.8A CN108259172B (en) 2018-01-12 2018-01-12 Ciphertext searching method in cloud storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810031166.8A CN108259172B (en) 2018-01-12 2018-01-12 Ciphertext searching method in cloud storage system

Publications (2)

Publication Number Publication Date
CN108259172A CN108259172A (en) 2018-07-06
CN108259172B true CN108259172B (en) 2021-02-05

Family

ID=62726967

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810031166.8A Expired - Fee Related CN108259172B (en) 2018-01-12 2018-01-12 Ciphertext searching method in cloud storage system

Country Status (1)

Country Link
CN (1) CN108259172B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109255244B (en) * 2018-07-16 2020-08-11 哈尔滨工业大学(深圳) Data encryption method and device and data encryption retrieval system
CN109889332A (en) * 2019-01-21 2019-06-14 电子科技大学 Equation testing encryption method based on certificate

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408177A (en) * 2014-12-15 2015-03-11 西安电子科技大学 Cipher searching method based on cloud document system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9425960B2 (en) * 2008-10-17 2016-08-23 Sap Se Searchable encryption for outsourcing data analytics
US9391965B2 (en) * 2012-01-25 2016-07-12 Mitsubishi Electric Corporation Data search device, data search method, data search program, data registration device, data registration method, data registration program, and information processing device
CN104852801B (en) * 2015-02-13 2018-02-13 陕西师范大学 A kind of public key encryption method that can search for
CN105282167A (en) * 2015-11-06 2016-01-27 福建工程学院 Searchable certificateless public key encryption method
CN105681280B (en) * 2015-12-29 2019-02-22 西安电子科技大学 Encryption method can search for based on Chinese in a kind of cloud environment

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408177A (en) * 2014-12-15 2015-03-11 西安电子科技大学 Cipher searching method based on cloud document system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
《On the Security of a Certificateless Public Key Encryption with Keyword Search》;Tsu-Yang Wu et al.;《International Conference on Intelligent Information Hiding and Multimedia Signal Processing》;20170718;全文 *
《无证书连接关键字密文检索》;伍祈应等;《西安电子科技大学学报(自然科学版)》;20170630;全文 *

Also Published As

Publication number Publication date
CN108259172A (en) 2018-07-06

Similar Documents

Publication Publication Date Title
Li et al. KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage
Wang et al. Secure ranked keyword search over encrypted cloud data
CN109614818B (en) Authorized identity-based keyword search encryption method
JP6180177B2 (en) Encrypted data inquiry method and system capable of protecting privacy
CN109450935B (en) Verifiable semantic security multi-keyword search method in cloud storage
CN111130757A (en) Multi-cloud CP-ABE access control method based on block chain
US20140192976A1 (en) Method and system for id-based encryption and decryption
CN106487506B (en) Multi-mechanism KP-ABE method supporting pre-encryption and outsourcing decryption
CN109361644B (en) Fuzzy attribute based encryption method supporting rapid search and decryption
CN108092972B (en) Multi-authorization-center attribute-based searchable encryption method
CN112800445B (en) Boolean query method for forward and backward security and verifiability of ciphertext data
CN105282167A (en) Searchable certificateless public key encryption method
CN115632880B (en) Reliable data transmission and storage method and system based on state cryptographic algorithm
CN114528331A (en) Data query method, device, medium and equipment based on block chain
CN114142996B (en) Searchable encryption method based on SM9 cryptographic algorithm
CN108259172B (en) Ciphertext searching method in cloud storage system
CN108243000B (en) Ciphertext searching method in cloud storage system
CN105007258B (en) A kind of quick keyword can search for public key encryption method
CN107454059B (en) Search encryption method based on sequence cipher in cloud storage environment
Suveetha et al. Ensuring confidentiality of cloud data using homomorphic encryption
CN109672525B (en) Searchable public key encryption method and system with forward index
CN108920968B (en) File searchable encryption method based on connection keywords
JP5799635B2 (en) ENCRYPTED DATA SEARCH SYSTEM, DEVICE, METHOD, AND PROGRAM
Wang et al. DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption
CN115174600A (en) Ciphertext data encryption and safe retrieval method and device for cloud storage system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210205

Termination date: 20220112