CN103927340B - A kind of cipher text retrieval method - Google Patents

A kind of cipher text retrieval method Download PDF

Info

Publication number
CN103927340B
CN103927340B CN201410119505.XA CN201410119505A CN103927340B CN 103927340 B CN103927340 B CN 103927340B CN 201410119505 A CN201410119505 A CN 201410119505A CN 103927340 B CN103927340 B CN 103927340B
Authority
CN
China
Prior art keywords
document
vector
cluster
ciphertext
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410119505.XA
Other languages
Chinese (zh)
Other versions
CN103927340A (en
Inventor
陈驰
朱晓杰
申培松
田雪
于晶
王朝刚
杨腾飞
李丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201410119505.XA priority Critical patent/CN103927340B/en
Publication of CN103927340A publication Critical patent/CN103927340A/en
Application granted granted Critical
Publication of CN103927340B publication Critical patent/CN103927340B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/3331Query processing
    • G06F16/334Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/35Clustering; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/36Creation of semantic tools, e.g. ontology or thesauri
    • G06F16/374Thesaurus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/93Document management systems

Abstract

The invention discloses a kind of cipher text retrieval method, in the establishment and the encryption of index of client implementation level cluster, server receives cryptogram search vector, relevance score between each document vector sum query vector can be calculated by the ciphertext index based on hierarchical clustering, and document ordering function is realized according to the relevance score, due to vectorial without all of ciphertext document of inquiry in query process, but search for the document vector of specific intra-cluster, so query time greatly reduces, searching ciphertext efficiency is improve.The present invention supports the searching ciphertext that multiple key can sort, and supports the searching ciphertext under big data quantity, meanwhile, effectively protect data-privacy.

Description

A kind of cipher text retrieval method
Technical field
The present invention relates to information security field, specifically, it is related to a kind of cipher text retrieval method.
Background technology
Along with the popularization and development of cloud computing, cloud security also increasingly obtains the concern of people.Due to cloud computing system It is in large scale, many privacy of user data and enterprise's private data, and unprecedented open and complexity are carried, make Its security facing stern challenge.In order to protect the security of data, increasing enterprises and individuals have selected first logarithm According to encryption, Cloud Server is then uploaded to again.This causes that the ciphertext data in public cloud are faced with volatile growth, how to examine Data after Suo Jiami become a problem.The fast development of searching ciphertext technology, has promoted the solution of cloud security problem.
Existing scheme currently for ciphertext text retrieval is broadly divided into two classes:Ordered retrieval and the retrieval based on index. Ordered retrieval is mainly compared one by one by all keywords in searching keyword and document, realizes matching retrieval.Based on index Retrieval mainly by search index, realizes the positioning searching of document.But, because ordered retrieval is needed to all of word in document It is scanned, it is necessary to the keyword of scanning also can explosively increase when number of documents exponentially increases, so should Scheme is not suitable for being applied under the very big environment of data volume.And the search method for indexing is based on, during by shorter query execution Between and be widely used.But the foundation of index has to safeguard the safety of data, it is impossible to reveal letter because of index Breath.So, how to set up a kind of safe Indexing Mechanism is a full of challenges problem.
Three below patent all refers to searching ciphertext technology:
Chinese invention patent application, publication number:One kind is disclosed in CN200410070113.5 in PKI and full-text search skill On the basis of art, the data retrieval under conditions of non-decrypting is realized.The present invention is the transformation to global search technology, Here almost remain most of technology of full-text search, encryption only carried out to the index terms of index file, be easy to be System is realized.The encryption of searching ciphertext system, decryption occur in client, effectively reduce data safety to server and network The dependence of Environmental security.
Chinese invention patent application, publication number:A kind of ciphertext full-text search system is disclosed in CN201010187384.4, Include urtext processing module, word-dividing mode, encrypting module, document ciphertext memory module, ciphertext index module, ciphertext inspection Rope module, retrieval result processing module, system management module.The system as a result of ciphertext dynamic descendence tree index structure, The ciphertext dynamic descendence tree index updating method of participle group technology, document local level, achievable safely and efficiently index creation, Full-text search and substring query under the dynamic renewal of index and ciphertext state.
Chinese invention patent application, publication number:Disclose a kind of for rapidly searching ciphertext in CN200810145083.8 Methods, devices and systems.Data owner is to file encryption and by ciphertext storage to server.Data owner is according to text The keyword generation encrypted indexes of part, and by encrypted indexes storage to server.Index is made up of keyword entry set, often Individual keyword entry set is identified by a keyword entry set locator, and including at least associated with corresponding keyword File one or more file retainers.Ciphertext of each file retainer comprising the information for obtaining encryption file, And correct file retainer decruption key is only utilized, the ciphertext could be decrypted.Data owner authorizes to searcher Keyword entry set locator and file retainer decruption key, to enable that searcher retrieves to encrypted indexes And obtain the file relevant with certain keyword.
However, these technical schemes are also faced with some challenges, there are some defects:
1)Cryptogram search efficiency is low.Because the current multiple key searching ciphertext scheme that can sort is required for sequential scan close Text index, can increase the query processing time when data volume is very big, significantly reduce search efficiency.
2)Multiple key word retrieval cannot be carried out.Needs carry out repeatedly list key search and can be only achieved retrieval purpose, so Data transfer and server burden can be increased, while reducing Consumer's Experience.
The content of the invention
Regarding to the issue above, the present invention proposes a kind of new cipher text retrieval method, provides the user more complete close Literary retrieval scheme.
The present invention proposes a kind of multiple key cipher text retrieval method, and client is connected with server, and the client is to clothes Business device uploads, downloads or updates ciphertext data;Its step includes:
1)Vectorization is carried out to the plain text document that data owner uploads in client, according to similar between document vector Degree cluster, and document vector in cluster is layered, the index based on hierarchical clustering, encrypting plaintext document and index are set up, Generate ciphertext document and ciphertext index and upload onto the server;
2)Data consumer's input inquiry sentence, client carries out vectorization to query statement and encrypts, and generation ciphertext is looked into Ask vector and be dealt into server;
3)Server is successively searched the best match most close with data consumer's query statement and is clustered by ciphertext index, And calculate the relevance score between the vector of the ciphertext document vector sum cryptogram search under the cluster;
4)Server according to ciphertext document vector sum cryptogram search vector between relevance score to ciphertext document ordering, According to data consumer's demand, ciphertext document and its document code in the top is returned.
Further, described data owner can be with authorization data user(The user for being retrieved)In the clothes Business device on search its upload onto the server on document.
Further, the vectorization method for expressing of described plain text document is as follows:
1)Syntactic analysis and morphological analysis are carried out according to the plain text document that data owner uploads, keyword set is obtained, Keyword in all documents constitutes dictionary;
2)According to above-mentioned dictionary, each document is searched, if the keyword in the dictionary can be found in a document, The correspondence position of the document vector is 1, is otherwise 0.
Also the method similar with plain text document vectorization is used during query statement vectorization.
Further, after hierarchical clustering is formed, each cluster includes a center vector, for example, it may be each is literary The average of shelves vector;The described index based on hierarchical clustering include cluster, the membership of document, cluster centre vector and Document vector.
Further, when described foundation is based on the index of hierarchical clustering, following clustering convergence condition is preset:
1)The degree of correlation is satisfied by certain constraints between document number of vectors and the document vector of intra-cluster;
2)Using Euclidean space distance metric or corner dimension as the degree of correlation foundation.
Further, vector is indicated after described cluster centre vector encryption as ciphertext cluster.
Further, the index AES for being used during described encrypted indexes is comprised the following steps:
1)In client generation index encryption key { u, S, M1,M2};
2)Document vector D, cluster centre vector C are extended for the vector that length is u, random number is inserted in the position having more, Then the document vector sum cluster centre vector after expansion is respectively decomposed into two vector D according to vectorial S1、D2With C1、C2, then Cipher key matrix M1 ‐1,M2 ‐1D is multiplied by respectively1,D2With C1、C2, by decomposition after vectorial D1And D2It is encrypted as M‐1 1*D1, M‐1 2*D2, C1With C2It is encrypted as M‐1 1*C1, M‐1 2*C2And on uploading onto the server, so as to obtain ciphertext index.
Further, described ciphertext index includes cluster, the membership of document, and ciphertext cluster indicates vectorial and close Document vector.
Further, the server successively searches the best match cluster most close with data consumer's query statement When, the relevance score between cryptogram search vector ciphertext cluster instruction vector corresponding with each cluster in this layer is calculated, point Number highest for matching cluster, then to next layer continue inquire about the matching cluster all sub- cluster, find out its correlation Gamete cluster set, the like, the matching cluster of the bottom is best match cluster.
Compared with prior art, the present invention has following advantage:
1)The searching ciphertext for supporting multiple key to sort.Server receives cryptogram search vector, by poly- based on level The ciphertext index of class can calculate the relevance score between each document vector sum query vector, and according to the degree of correlation point Number realizes document ordering function.
2)Support the searching ciphertext under big data quantity.The program inquires about maximally related matching by searching with data consumer Cluster, reduces the amount of calculation of relevance score between document and inquiry, the significant increase efficiency of searching ciphertext.
3)The work of clustering and index encryption is completed in client, data-privacy is effectively protected.
Brief description of the drawings
Fig. 1 is the application scenario diagram in multiple key cipher text retrieval method of the present invention, and wherein Top k represent data consumer Specify and return to file number;
Fig. 2 is the overall framework figure in multiple key cipher text retrieval method of the present invention, whereinCryptogram search vector is represented, Top k represent that data consumer specifies and return to file number;
Fig. 3 is the flow chart of the cryptogram search in multiple key cipher text retrieval method of the present invention, wherein(W1…Wn)Represent bright Query text vector,(T1…Tn)Cryptogram search vector is represented,(C1,1…C1,n)、(C2,1…C2,n)、(C3,1…C3,n)Represent that ciphertext is gathered Class center vector,(d1,1…d1,n)、(d2,1…d2,n)、(d3,1…d3,n)、(d9,1…d9,n)Represent ciphertext document vector.
Specific embodiment
The present invention will be further described in detail with specific implementation below in conjunction with the accompanying drawings, but limits this never in any form The scope of invention.
The present embodiment uses the application scenarios based on data outsourcing model as shown in Figure 1, wherein, have three in initialization system Individual user, respectively admin, tom and jerry, wherein admin are data owners, and jerry is cloud service provider, and tom is Data consumer.
The present embodiment shows that admin uploads to document on the Cloud Server of jerry offers, and authorizes tom in cloud service The query process of these documents and tom is searched on device, whole process is as shown in Figure 2.
It is assumed that admin has 7 documents, as shown in table 1, wherein keyword is extracted from content for its content and keyword Come.
Table 1:Document content and keyword
Document code Document content Keyword
1 There is basketball, be exactly perfect life Basketball, perfect, life
2 Basketball is round Basketball is justified
3 This child likes playing basketball Child, likes, and beats, basketball
4 I can go to play basketball the time Time, meeting is beaten, basketball
5 Football is my hobby Football, hobby
6 With the people that football is dreamed of Band, football, dream
7 The comparing of football and basketball Football, basketball compares
Table 2:The dictionary that all documents of admin are constituted
Numbering Keyword Numbering Keyword
1 Basketball 8 Time
2 It is perfect 9 Meeting
3 Life 10 Football
4 Circle 11 Hobby
5 Child 12 Band
6 Like 13 Dream
7 Beat 14 Compare
Word in table 2 comes from the keyword in document, and the keyword in all documents constitutes a dictionary.According to this Individual dictionary, admin is by each document vectorization, if the word occurs in document, the corresponding position of vector is 1, is otherwise 0, knot Fruit is as follows:
Table 3:The vectorization of document is represented
Admin carries out hierarchical clustering in client according to above-mentioned document vector, wherein, set in the present embodiment following Clustering convergence condition:
(1) the similarity between an intra-cluster document is greater than equal to 1, otherwise increases a cluster newly.
(2) a cluster interior element is otherwise layered no more than 3.
The specific execution step of hierarchical clustering algorithm is as follows:
(1) it is 2 that admin sets initial cluster centre number;
(2) random two vectors of selection from document vector are used as initial cluster center, it is assumed that be 1 and 6;
(3) partition clustering is carried out to document, finally obtain ground floor two documents vector set { 1,2,3,4 } and 5,6, 7}。
To document vector set { 1,2,3,4 } continue divide, obtain the second layer two documents vector set { 1,2 } and {3,4}。
After cluster is formed, the center vector of each cluster is the average of each document vector.After cluster centre vector encryption Vector can be indicated as ciphertext cluster.
Before encryption is indexed, admin firstly generates key { u, S, M1,M2}。
When encryption is indexed, 14 random values are all added to every document vector sum cluster centre vector first(This value Can sets itself as required), it is assumed that random value is all 0.1.Admin produces random vector S with random value generator, its length Spend is that document vector length adds random number digit, that is, 28.
Table 4:Random vector S
1 2 3 4 5 6 7 8 9 10 11 12 13 14
1 1 1 1 1 1 1 0 0 0 0 0 0 0
15 16 17 18 19 20 21 22 23 24 25 26 27 28
0 0 0 0 0 0 0 1 1 1 1 1 1 1
Each document vector sum cluster centre vector, is divided into D by 28 place values in S1And D2, as S [i]=1, D1[i] is random value, D2[i]=originally value-D1[i].As S [i]=0, D2[i]=D1[i].Assuming that all of random value is all 0.5, then D1Such as table 5, D2Such as table 6.
Table 5:D1Vector set
Table 6:D2Vector set
Assuming that document { 1,2,3,4 } and { 5,6,7 } form the two of ground floor larger clusters, wherein cluster 1, 2,3,4 } be divided into two clusters of the second layer { 1,2 } and { 3,4 } again, following four figure illustrate these corresponding centers of cluster to The segmentation situation of amount:
Table 7:{ 1,2,3,4 } center vector of document vector set and its segmentation after vector
Table 8:{ 5,6,7 } center vector of document vector set and its segmentation after vector
Table 9:{ 1,2 } center vector of document vector set and its segmentation after vector
Table 10:{ 3,4 } center vector of document vector set and its segmentation after vector
Two matrix M in the key that Admin is produced1And M2It is reversible unit matrix.Use M1And M2After segmentation Vectorial D1And D2It is M after encryption‐1 1*D1, M‐1 2*D2, and on uploading onto the server, while to the plain text document of user using symmetrical On AES encryption is uploaded onto the server, the document vector after encryption is:
Table 11:Encryption M‐1 1*D1Set
Table 12:Encryption M‐1 2*D2Set
Detailed process during inquiry is as shown in figure 3, setting data user tom wants to search and keyword " perfect life " most phase 1 document for closing, " perfect life " is issued admin by him, and admin firstly generates query vector Q, such as table 13, wherein first 14 Dictionary construction is depended on, 14 is random value afterwards, it is assumed that be all 0.01.Then using the S in key to the query vector Q that generates Carry out segmentation and produce Q1And Q2, such as table 14.
Table 13:Query vector Q
Q 1 2 3 4 5 6 7 8 9 10 11 12 13 14
0 1 1 0 0 0 0 0 0 0 0 0 0 0
15 16 17 18 19 20 21 22 23 24 25 26 27 28
0.01 0.01 0.01 0.01 0.01 0.01 0.01 0.01 0.01 0.01 0.01 0.01 0.01 0.01
Table 14:The split vector of Q
Q1 1 2 3 4 5 6 7 8 9 10 11 12 13 14
0 1 1 0 0 0 0 0.5 0.5 0.5 0.5 0.5 0.5 0.5
15 16 17 18 19 20 21 22 23 24 25 26 27 28
0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.01 0.01 0.01 0.01 0.01 0.01 0.01
Q2 1 2 3 4 5 6 7 8 9 10 11 12 13 14
0 1 1 0 0 0 0 ‐0.5 ‐0.5 ‐0.5 ‐0.5 ‐0.5 ‐0.5 ‐0.5
15 16 17 18 19 20 21 22 23 24 25 26 27 28
‐0.49 ‐0.49 ‐0.49 ‐0.49 ‐0.49 ‐0.49 ‐0.49 0.01 0.01 0.01 0.01 0.01 0.01 0.01
Afterwards, admin uses key M1, M2To the Q for producing1And Q2Encryption, i.e. MT 1*Q1, MT 2* Q2, is sent to server. Server is first by MT 1*Q1、MT 2* Q2 and ciphertext cluster centre vector 1 and 2 carry out Euclidean distance computing, as a result such as table 15, according to Result show that cluster { 1,2,3,4 } is matching cluster, MT 1*Q1、MT 2* Q2 again with ciphertext cluster centre vector 11 and center vector 12 Compare, it is { 1,2 } to calculate best match cluster, such as table 16, last MT 1*Q1、MT 2* Q2 and ciphertext document vector 1,2 are distinguished Calculate relevance score, such as table 17, finally, numbering be 1 document be most matching inquiry document, its ciphertext document returns to number According to user tom, tom can be issued admin and be obtained document cleartext information decrypting.
Table 15:Calculate ground floor matching cluster
M-11* centers 1 M-11* centers 2
MT1*Q1 2.43 2.34
M-12* centers 1 M-12* centers 2
MT2*Q2 2.85 3.52
Amount to 5.28 5.86
Table 16:Calculate second layer matching cluster
M-11* centers 11 M-11* centers 12
MT1*Q1 2.51 2.41
M-12* centers 11 M-12* centers 12
MT2*Q2 2.50 3.12
Amount to 5.01 5.43
Table 17:Calculate most relevant documentation
M-11* documents vector 1 M-11* documents vector 2
MT1*Q1 2.51 2.51
M-12* documents vector 1 M-12* documents vector 2
MT2*Q2 2.24 2.96
Amount to 4.75 5.47
From the present embodiment as can be seen that this method realizes multiple key can sort searching ciphertext, wherein, do not obtaining The disabled user of data owner's proper authorization is the cleartext information that cannot know document, it is ensured that the content safety of document.It is right In server, because document and index are all encryptions, and different cryptogram search can also be generated for same key word of the inquiry, Server is difficult with the clear content that statistical analysis means guess document.From search efficiency, due in query process Without all of ciphertext document vector of inquiry, but the document for searching for specific intra-cluster is vectorial, so query time subtracts significantly It is few, improve searching ciphertext efficiency.

Claims (8)

1. a kind of cipher text retrieval method, client is connected with server, and the user end to server is uploaded, downloaded or more Xinmi City Literary data;Its step includes:
1) vectorization is carried out to the plain text document that data owner uploads in client, is gathered according to the similarity between document vector Class, and document vector in cluster is layered, set up the index based on hierarchical clustering, encrypting plaintext document and index, generation Ciphertext document and ciphertext index are simultaneously uploaded onto the server, wherein, when setting up the index based on hierarchical clustering, preset following Clustering convergence condition:
1-1) degree of correlation is satisfied by certain constraints between the document number of vectors of intra-cluster and document vector;
Euclidean space distance metric or corner dimension 1-2) are used as the foundation of the degree of correlation;
2) data consumer's input inquiry sentence, client carries out vectorization to query statement and encrypts, generation cryptogram search to Measure and be dealt into server;
3) server is successively searched the best match most close with data consumer's query statement and is clustered by ciphertext index, and counts Calculate the relevance score between the ciphertext document vector sum cryptogram search vector under the cluster;
4) server according to the relevance score between ciphertext document vector sum cryptogram search vector to ciphertext document ordering, according to Data consumer's demand, returns to ciphertext document and its document code in the top.
2. cipher text retrieval method as claimed in claim 1, it is characterised in that described data owner authorization data user Searched on the server its upload onto the server on document.
3. cipher text retrieval method as claimed in claim 1, it is characterised in that the vectorization method for expressing of described plain text document It is as follows:
1) plain text document uploaded according to data owner carries out syntactic analysis and morphological analysis, obtains keyword set, owns Keyword in document constitutes dictionary;
2) according to above-mentioned dictionary, each document is searched, if the keyword in the dictionary, this article can be found in a document The correspondence position of shelves vector is 1, is otherwise 0.
4. cipher text retrieval method as claimed in claim 1, it is characterised in that after hierarchical clustering is formed, each cluster is included One center vector;The described index based on hierarchical clustering include cluster, the membership of document, cluster centre vector and Document vector.
5. cipher text retrieval method as claimed in claim 4, it is characterised in that as close after described cluster centre vector encryption Text cluster indicates vector.
6. cipher text retrieval method as claimed in claim 4, it is characterised in that the index used during described encrypted indexes is encrypted Algorithm is comprised the following steps:
1) in client generation index encryption key { u, S, M1,M2};
2) document vector D, cluster centre vector C are extended for the vector that length is u, random number is inserted in the position having more, then Document vector sum cluster centre vector after expansion is respectively decomposed into two vector D according to vectorial S1、D2With C1、C2, then key Matrix M1 ‐1,M2 ‐1D is multiplied by respectively1,D2With C1、C2, by decomposition after vectorial D1And D2It is encrypted as M‐1 1*D1, M‐1 2*D2, C1And C2Plus Close is M‐1 1*C1, M‐1 2*C2And on uploading onto the server, so as to obtain ciphertext index.
7. cipher text retrieval method as claimed in claim 5, it is characterised in that described ciphertext index includes cluster, document Membership, ciphertext cluster indicates vector and ciphertext document vector.
8. the cipher text retrieval method as described in claim 5-7 is any, it is characterised in that the server is successively searched and data When the most close best match of user's query statement is clustered, cryptogram search vector is calculated corresponding close with each cluster in the layer Text cluster indicates the relevance score between vector, fraction highest to be clustered for matching, then continues to inquire about this to next layer All sub- cluster with cluster, finds out the matching son cluster set of its correlation, the like, the matching cluster of the bottom is most Good matching cluster.
CN201410119505.XA 2014-03-27 2014-03-27 A kind of cipher text retrieval method Expired - Fee Related CN103927340B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410119505.XA CN103927340B (en) 2014-03-27 2014-03-27 A kind of cipher text retrieval method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410119505.XA CN103927340B (en) 2014-03-27 2014-03-27 A kind of cipher text retrieval method

Publications (2)

Publication Number Publication Date
CN103927340A CN103927340A (en) 2014-07-16
CN103927340B true CN103927340B (en) 2017-06-27

Family

ID=51145561

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410119505.XA Expired - Fee Related CN103927340B (en) 2014-03-27 2014-03-27 A kind of cipher text retrieval method

Country Status (1)

Country Link
CN (1) CN103927340B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108647529A (en) * 2018-05-09 2018-10-12 上海海事大学 A kind of semantic-based multi-key word sorted search intimacy protection system and method
CN109885650A (en) * 2019-01-08 2019-06-14 南京邮电大学 A kind of outsourcing cloud environment secret protection ciphertext ordering searching method

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653562B (en) * 2014-12-02 2019-03-15 阿里巴巴集团控股有限公司 The calculation method and device of correlation between a kind of content of text and inquiry request
CN104615692B (en) * 2015-01-23 2017-09-19 重庆邮电大学 It is a kind of to support that dynamic updates and multiple key safe ordering can search for encryption method
CN106559422B (en) * 2016-11-10 2019-04-23 西安电子科技大学 Multidimensional ciphertext interval query method based on key agreement
CN107273464B (en) * 2017-06-02 2020-05-12 浙江大学 Distributed measurement similarity query processing method based on publish/subscribe mode
CN110019011A (en) * 2017-11-20 2019-07-16 中移(杭州)信息技术有限公司 A kind of cipher text retrieval method and equipment
CN108228849A (en) * 2018-01-10 2018-06-29 浙江理工大学 Ciphertext sorted search method based on classification packet index in cloud network
CN108319589B (en) * 2018-03-14 2021-08-10 腾讯科技(深圳)有限公司 Parameter string processing method, device, computer readable storage medium and equipment
CN109740362B (en) * 2019-01-03 2021-02-26 中国科学院软件研究所 Ciphertext index generation and retrieval method and system based on entropy coding
CN109885640B (en) * 2019-01-08 2021-05-11 南京邮电大学 Multi-keyword ciphertext sorting and searching method based on alpha-fork index tree
CN111767373A (en) * 2020-06-30 2020-10-13 平安国际智慧城市科技股份有限公司 Document retrieval method, document retrieval device, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102708216A (en) * 2012-06-28 2012-10-03 北京邮电大学 Word-segmentation organizing method and clustering method for ciphertext search
CN103345526A (en) * 2013-07-22 2013-10-09 武汉大学 Efficient privacy protection encrypted message querying method in cloud environment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100146299A1 (en) * 2008-10-29 2010-06-10 Ashwin Swaminathan System and method for confidentiality-preserving rank-ordered search

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102708216A (en) * 2012-06-28 2012-10-03 北京邮电大学 Word-segmentation organizing method and clustering method for ciphertext search
CN103345526A (en) * 2013-07-22 2013-10-09 武汉大学 Efficient privacy protection encrypted message querying method in cloud environment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Privacy-Preserving multi-keyword text search in the cloud supporting;wenhai sun等;《IEEE Transactions on Parallel & Distributed System》;20131231;参见图1、图3、第73页2.4节和第74页第3章第1段 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108647529A (en) * 2018-05-09 2018-10-12 上海海事大学 A kind of semantic-based multi-key word sorted search intimacy protection system and method
CN109885650A (en) * 2019-01-08 2019-06-14 南京邮电大学 A kind of outsourcing cloud environment secret protection ciphertext ordering searching method
CN109885650B (en) * 2019-01-08 2021-05-11 南京邮电大学 Outsourcing cloud environment privacy protection ciphertext sorting retrieval method

Also Published As

Publication number Publication date
CN103927340A (en) 2014-07-16

Similar Documents

Publication Publication Date Title
CN103927340B (en) A kind of cipher text retrieval method
CN104765848B (en) What support result efficiently sorted in mixing cloud storage symmetrically can search for encryption method
CN106815350B (en) Dynamic ciphertext multi-keyword fuzzy search method in cloud environment
CN108388807B (en) Efficient and verifiable multi-keyword sequencing searchable encryption method supporting preference search and logic search
Xia et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
CN107480163B (en) Efficient ciphertext image retrieval method supporting privacy protection in cloud environment
CN106326360B (en) A kind of fuzzy keywords-based retrieval method of ciphertext data in cloud environment
Fu et al. Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
Liu et al. Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing
WO2019153813A1 (en) Full-text fuzzy retrieval method for similar chinese characters in ciphertext domain
CN111026788B (en) Homomorphic encryption-based multi-keyword ciphertext ordering and retrieving method in hybrid cloud
Awad et al. Chaotic searchable encryption for mobile cloud storage
CN109992995B (en) Searchable encryption method supporting location protection and privacy inquiry
Fu et al. Semantic keyword search based on trie over encrypted cloud data
CN106980796A (en) MDB is based under cloud environment+The multiple domain of tree connects the searching method of keyword
CN115757676A (en) Fuzzy searchable encryption method and device and electronic equipment
Mittal et al. Privacy preserving synonym based fuzzy multi-keyword ranked search over encrypted cloud data
CN108768651A (en) That supports the inquiry of multidimensional interval range can search for public key encryption method
Yang et al. Cloud information retrieval: Model description and scheme design
CN116644146A (en) Document searching method, device and system, electronic equipment and storage medium
CN109672525B (en) Searchable public key encryption method and system with forward index
CN112328626B (en) Searchable encryption method facing cloud environment and supporting fuzzy keyword sequencing
CN111966778B (en) Multi-keyword ciphertext sorting and searching method based on keyword grouping reverse index
CN108319670A (en) The dynamic ranking searching method that can verify that based on cloud computing
CN114528370A (en) Dynamic multi-keyword fuzzy ordering searching method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170627

Termination date: 20180327

CF01 Termination of patent right due to non-payment of annual fee