CN105049196A - Searchable encryption method of multiple keywords at specified location in cloud storage - Google Patents

Searchable encryption method of multiple keywords at specified location in cloud storage Download PDF

Info

Publication number
CN105049196A
CN105049196A CN201510408630.7A CN201510408630A CN105049196A CN 105049196 A CN105049196 A CN 105049196A CN 201510408630 A CN201510408630 A CN 201510408630A CN 105049196 A CN105049196 A CN 105049196A
Authority
CN
China
Prior art keywords
user
prime
comk
cloud storage
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510408630.7A
Other languages
Chinese (zh)
Other versions
CN105049196B (en
Inventor
王尚平
张亚玲
王晓峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan mingmao Network Technology Co., Ltd.
Original Assignee
Xian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Technology filed Critical Xian University of Technology
Priority to CN201510408630.7A priority Critical patent/CN105049196B/en
Publication of CN105049196A publication Critical patent/CN105049196A/en
Application granted granted Critical
Publication of CN105049196B publication Critical patent/CN105049196B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a searchable encryption method of multiple keywords at the specified location in cloud storage. The method is implemented specifically according to the following steps: Step 1, system parameter initialization; Step 2, user adding; Step 3, file encryption and security index generation by a file owner; Step 4, index re-encryption by a server; Step 5, generation of keyword search token by a user; Step 6, search of ciphertext keywords by a cloud storage server; Step 7, decryption of ciphertexts by the user; and Step 8, user revocation. By the method, the problem that keyword search cannot be realized after cloud storage data encryption in the prior art is solved.

Description

The encryption method that during cloud stores, multiple keywords of assigned address can be searched for
Technical field
The invention belongs to field of information security technology, the encryption method that the multiple keywords being specifically related to assigned address in the storage of a kind of cloud can be searched for.
Background technology
Cloud computing, as a kind of new computation model, can provide the calculation services of lower, the extendible various advanced person of cost, and in order to save the cost of storage and management data, data can be outsourced to cloud storage server by enterprises and individuals.The data that cloud stores service provides have the advantage such as availability and reliability, but it also has a shortcoming clearly, namely data are not under the management of user and controlling, and so how the confidentiality and integrity of service data just becomes the problem that user urgently pays close attention to.
Although the reliability, availability, fault-tolerance etc. of cloud storage service provider (CloudStorageServiceProvider, CSSP) are believed by enterprise, the data of trustship are not used for other objects by the people CSSP that is uncertain about; Same for personal user, they wish that the data of oneself can only be accessed by oneself or the people specified and can not be accessed by CSSP.This will cause the problem of two aspects: on the one hand, from the angle of user, and they cannot find and allow they complete believable CSSP carry out their data of store and management; On the other hand from the angle of CSSP, a large amount of clients will be lost when not solving the problem.Therefore, the popularization that cloud will be hindered to store of the confidentiality of data and integrality and use.
In view of above practical problem, during cloud stores, data before being transferred to CSSP, must being encrypted by user oneself, and also can only be decrypted by user oneself, will alleviate the danger that user data leaks like this.Do their data of wanting of the acquisition that so user can be very fast also ensure the confidentiality of data to CSSP but this is by problem new for introducing one, as user needs the document comprising certain keyword?
Summary of the invention
The encryption method that the multiple keywords that the object of this invention is to provide assigned address in the storage of a kind of cloud can be searched for, can not realize the problem of keyword retrieval after solving the cloud storage data encryption existed in prior art.
The technical solution adopted in the present invention is, the encryption method that during cloud stores, multiple keywords of assigned address can be searched for, and specifically implements according to following steps:
Step 1, system parameters initialization;
Step 2, interpolation user;
Step 3, file owner generate file encryption and Security Index;
Step 4, server are to index re-encryption;
Step 5, user are about the generation of keyword search token;
Step 6, cloud storage server are about the search of ciphertext keyword;
Step 7, user are about the deciphering of ciphertext;
Step 8, cancel user.
Feature of the present invention is also,
Step 1 is specifically implemented according to following steps:
Step (1.1), input security parameter k by file encryption person Ent, export the multiplication loop group G that two rank are prime number q 1and G 2, g 1for G 1generator, g 2for G 2generator;
Step (1.2), selection bilinear map
Step (1.3), the random x of selection equably ∈ Z qas the master key of file encryption person Ent, be designated as msk E n t = x ∈ Z q * , Wherein Z q * = { 1 , 2 , ... , q - 1 } , Be designated as msk ent=x, calculates h=g 1 x;
Step (1.4), selection two pseudo-random function with and select two random seed s ', s " ∈ arbitrarily r{ 0,1} k;
Step (1.5), selection symmetric encipherment algorithm SKE={SKE.Gen (1 k), SKE.ENC (.), SKE.DE (.) }, select an encryption key ek ← SKE.Gen (1 equably at random k);
The open system parameters of step (1.6), file encryption person Ent is p a r a m = ( G 1 , G 2 , e ^ , g 1 , g 2 , q , f ′ , f ′ ′ , h , S K E ) , Secrecy system private key is msk ent=x, random seed s ', s " ∈ r{ 0,1} kand file encryption key ek.
Step 2 is specifically implemented according to following steps:
The master key k of step (2.1), input system user administrator UM uM=x and user identity u iD∈ U, exports user u iDkey and auxiliary key ( sk u I D , ComK u I D ) = ( g 1 x u I D ∈ R Z q * , g 2 k U M / x u I D ) = ( g 1 x u I D , g 2 x / x u I D ) , Here ComK u I D = g 2 x / x u I D , sk u I D = g 1 x u I D ;
Step (2.2), general send to user u safely iD, user u iDmaintain secrecy
Step (2.3), general send to Serv safely, Serv adds in its user list U-ComK
Step 3 is specifically implemented according to following steps:
Step (3.1), input user key encryption key ek, random seed s ', document D iand lists of keywords stochastic choice r irz q;
Step (3.2), calculating with ∀ w i , j ∈ W i , Calculate σ i , j = f ′ ( s ′ , w i , j ) ∈ Z q * , ω i , j = ( sk u I D ) r i σ i , j , 1≤j≤i m, order I i * = ( h r i , ComK u I D r i , ω i , 1 , ... , ω i , i m ) , Note C i * = ( Enc e k ( D i ) , I i * ) , Will send to Cloud Server Serv.
Step 4 is specifically implemented according to following steps:
It is right that step (4.1), server S erv perform in index I i *re-encryption, input user identity u iDwith to receive serv is according to u iDsearch in U-ComK if nothing, then return, otherwise recalculate in I i *obtain index:
I i = ( h r i , ComK u I D r i , e ( ω i , 1 , ComK u I D ) , ... , e ( ω i , m , ComK u I D ) ) = ( h r i , ComK u I D r i , e ( g 1 , g 2 ) r i σ i , 1 x , ... , e ( g 1 , g 2 ) r i σ i , m x ) = ( h r i , ComK u I D r i , e ( h , g 2 ) r i σ i , 1 , ... , e ( h , g 2 ) r i σ i , m ) = ( h r i , ComK u I D r i , I i 1 , ... , I i m ) ,
Step (4.2), by C i=(Enc ek(D i), I i) be stored on Serv.
Step 5 is specifically implemented according to following steps:
Step (5.1), user u iDperform and be used for generating the search token connecting keyword, input s ', s " and the keyword position 1≤l that will retrieve 1..., l dthe keyword w ' of≤m and correspondence 1..., w ' d, d is the keyword number of user search, Stochastic choice random number calculate according to the following formula:
T 1 = sk u I D ( t 1 + f ′ ′ ( s ′ ′ , t 2 ) Σ j = 1 d f ′ ( s ′ , w j ′ ) ) = g 1 ( t 1 + f ′ ′ ( s ′ ′ , t 2 ) Σ j = 1 d f ′ ( s ′ , w j ′ ) ) x u I D ,
T 2 = g 2 t 1 ,
T 3=f″(s″,t 2);
Step (5.2), token T=(u will be searched for iD, T 1, T 2, T 3, l 1..., l d) send to cloud to store server S erv.
Step 6 is specifically implemented according to following steps:
Step (6.1), cloud storage server S erv performs for searching for encrypted document, inputted search token T=(u iD, T 1, T 2, T 3, l 1..., l d) and ciphertext C i=(Enc ek(D i), I i), Serv is first according to u iDsearch in U-ComK if nothing, then return, otherwise Serv initialization empty set Ω;
Step (6.2), to C i, 1≤i≤n, judge whether set up as inferior:
e ( T 1 , ComK u I D r i ) / e ( h r i , T 2 ) = ( Π j = 1 d I il j ) T 3
If set up, then Ω=Ω ∪ { C i, finally Search Results Ω is sent to user u iD, otherwise this ciphertext and crucial word mismatch, continue the next keyword index I of search i+1, finally Search Results Ω is sent to user u iD.
Step 7 is specially:
User u iDinput symmetric key ek and the Ω received is right calculate D i=Dec ek(E i).
Step 8 is specially:
User management mechanism UM inputs user identity u iD, UM sends to cloud storage server S erv and cancels user u iDorder, Serv executable operations namely cloud storage server CSS deletes user u iDregistration project .
The invention has the beneficial effects as follows, the encryption method that during cloud stores, multiple keywords of assigned address can be searched for, data user can by after the data encryption of oneself, be stored in cloud storage server, when needing, can by keyword retrieval Token Retrieval to the encrypt data needed, then download decryption.Meanwhile, cloud storage server does not also know the keyword of user search, guarantees the data message privacy of user.By compared with existing scheme, the inventive method is at communication and calculation cost, namely search for trapdoor size, the overall efficiency of the aspect such as speed of keyword encryption and search is improved, the present invention is simultaneously applicable multi-user environment, refer to and can increase and cancel user, user increases can pass through algorithm Enroll (k uM, u iD) realize, cancelling of user can by algorithm RevokeUser (u iD) realize.
Embodiment
Below in conjunction with embodiment, the present invention is described in detail.
The encryption method that during cloud of the present invention stores, multiple keywords of assigned address can be searched for, specifically implement according to following steps:
Step 1, system parameters initialization:
Specifically implement according to following steps:
Step (1.1), input security parameter k by file encryption person Ent, export the multiplication loop group G that two rank are prime number q 1and G 2, g 1for G 1generator, g 2for G 2generator;
Step (1.2), selection bilinear map
Step (1.3), the random x of selection equably ∈ Z qas the master key of file encryption person Ent, be designated as msk E n t = x ∈ Z q * , Wherein Z q * = { 1 , 2 , ... , q - 1 } , Be designated as msk ent=x, calculates h=g 1 x;
Step (1.4), selection two pseudo-random function with and select two random seed s ', s " ∈ arbitrarily r{ 0,1} k;
Step (1.5), selection symmetric encipherment algorithm SKE={SKE.Gen (1 k), SKE.ENC (.), SKE.DE (.) }, select an encryption key ek ← SKE.Gen (1 equably at random k);
The open system parameters of step (1.6), file encryption person Ent is p a r a m = ( G 1 , G 2 , e ^ , g 1 , g 2 , q , f ′ , f ′ ′ , h , S K E ) , Secrecy system private key is msk ent=x, random seed s ', s " ∈ r{ 0,1} kand file encryption key ek.
Step 2, interpolation user:
Specifically implement according to following steps:
The master key k of step (2.1), input system user administrator UM uM=x and user identity u iD∈ U, exports user u iDkey and auxiliary key ( sk u I D , ComK u I D ) = ( g 1 x u I D ∈ R Z q * , g 2 k U M / x u I D ) = ( g 1 x u I D , g 2 x / x u I D ) , Here ComK u I D = g 2 x / x u I D , sk u I D = g 1 x u I D ;
Step (2.2), general send to user u safely iD, user u iDmaintain secrecy
Step (2.3), general send to Serv safely, Serv adds in its user list U-ComK
Step 3, file owner generate file encryption and Security Index:
Specifically implement according to following steps:
Step (3.1), input user key encryption key ek, random seed s ', document D iand lists of keywords stochastic choice r irz q;
Step (3.2), calculating with ∀ w i , j ∈ W i , Calculate σ i , j = f ′ ( s ′ , w i , j ) ∈ Z q * , ω i , j = ( sk u I D ) r i σ i , j , 1≤j≤i m, order I i * = ( h r i , ComK u I D r i , ω i , 1 , ... , ω i , i m ) , Note C i * = ( Enc e k ( D i ) , I i * ) , Will send to Cloud Server Serv;
Step 4, server are to index re-encryption:
Specifically implement according to following steps:
It is right that step (4.1), server S erv perform in index I i *re-encryption, input user identity u iDwith to receive serv is according to u iDsearch in U-ComK if nothing, then return, otherwise recalculate in I i *obtain index:
I i = ( h r i , ComK u I D r i , e ( ω i , 1 , ComK u I D ) , ... , e ( ω i , m , ComK u I D ) ) = ( h r i , ComK u I D r i , e ( g 1 , g 2 ) r i σ i , 1 x , ... , e ( g 1 , g 2 ) r i σ i , m x ) = ( h r i , ComK u I D r i , e ( h , g 2 ) r i σ i , 1 , ... , e ( h , g 2 ) r i σ i , m ) = ( h r i , ComK u I D r i , I i 1 , ... , I i m ) ,
Step (4.2), by C i=(Enc ek(D i), I i) be stored on Serv;
Step 5, user are about the generation of keyword search token:
Specifically implement according to following steps:
Step (5.1), user u iDperform and be used for generating the search token connecting keyword, input s ', s " and the keyword position 1≤l that will retrieve 1..., l dthe keyword w ' of≤m and correspondence 1..., w ' d, d is the keyword number of user search, Stochastic choice random number calculate according to the following formula:
T 1 = sk u I D ( t 1 + f ′ ′ ( s ′ ′ , t 2 ) Σ j = 1 d f ′ ( s ′ , w j ′ ) ) = g 1 ( t 1 + f ′ ′ ( s ′ ′ , t 2 ) Σ j = 1 d f ′ ( s ′ , w j ′ ) ) x u I D , T 2 = g 2 t 1 , T 3 = f ′ ′ ( s ′ ′ , t 2 ) ;
Step (5.2), token T=(u will be searched for iD, T 1, T 2, T 3, l 1..., l d) send to cloud to store server S erv;
Step 6, cloud storage server are about the search of ciphertext keyword:
Specifically implement according to following steps:
Step (6.1), cloud storage server S erv performs for searching for encrypted document, inputted search token T=(u iD, T 1, T 2, T 3, l 1..., l d) and ciphertext C i=(Enc ek(D i), I i), Serv is first according to u iDsearch in U-ComK if nothing, then return, otherwise Serv initialization empty set Ω;
Step (6.2), to C i, 1≤i≤n, judge whether set up as inferior:
e ( T 1 , ComK u I D r i ) / e ( h r i , T 2 ) = ( Π j = 1 d I il j ) T 3
If set up, then Ω=Ω ∪ { C i, finally Search Results Ω is sent to user u iD, otherwise this ciphertext and crucial word mismatch, continue the next keyword index I of search i+1, finally Search Results Ω is sent to user u iD;
Step 7, user are about the deciphering of ciphertext:
Be specially:
User u iDinput symmetric key ek and the Ω received is right calculate D i=Dec ek(E i);
Step 8, cancel user:
Be specially:
User management mechanism UM inputs user identity u iD, UM sends to cloud storage server S erv and cancels user u iDorder, Serv executable operations namely cloud storage server CSS deletes user u iDregistration project .
In storing cloud of the present invention below, the fail safe of the encryption method that multiple keywords of assigned address can be searched for is analyzed:
Prove: if all data all generate according to describing in the inventive method, and if wherein 1≤i≤m, 1≤j≤d, then have:
( Π j = 1 d I il j ) T 3 = ( Π j = 1 d e ( h , g 2 ) r i σ i , l j ) T 3 = ( Π j = 1 d e ( h , g 2 ) r i σ i , l j ) T 3 = e ( h , g 2 ) f ′ ′ ( s ′ ′ , t 2 ) Σ j = 1 d r i f ′ ( s ′ , w j ′ ) , e ( T 1 , ComK u I D r i ) / e ( h r i , T 2 ) = e ( g 1 ( t 1 + f ′ ′ ( s ′ ′ , t 2 ) Σ j = 1 d f ′ ( s ′ , w j ′ ) ) x u I D , g 2 ( x / x u I D ) r i ) / e ( g 1 xr i , g 2 t 1 ) = e ( h ( f ′ ′ ( s ′ ′ , t 2 ) Σ j = 1 d r i f ′ ( s ′ , w j ′ ) ) , g 2 )
Therefore e ( T 1 , ComK u I D r i ) / e ( h r i , T 2 ) = ( Π j = 1 d I il j ) T 3 .
Card is finished
To summary of the present invention:
The encryption method that during cloud of the present invention stores, multiple keywords of assigned address can be searched for, can in the enterprising line search inquiry of the data acquisition system of encryption, concrete grammar is, it is first the set of file set generating indexes, re-using can search for encrypt is encrypted with hiding index content to these indexes, and encryption will meet following character: the 1) token of a given keyword (i.e. index), can obtain the pointer of the All Files comprising this keyword; 2) do not have token, the content of index is hiding; 3) user only with association key could generate token; 4) retrieving is except exposing certain keyword of which file-sharing, can not expose the specifying information of any relevant document and keyword.The central role can searching for encryption is for cloud stores service provides: one is that user oneself controls its data; Two is that the security property of data can be verified by Cryptography Principles, instead of determines fail safe by law, physical equipment.
The encryption method that during cloud of the present invention stores, multiple keywords of assigned address can be searched for, in cloud stores service, user can use the encipherment scheme that can search for after data encryption, is outsourced to cloud storage server.Can search for encipherment scheme makes user can selectively access its encrypt data, the confidentiality of user search data can also be guaranteed, based on the encipherment scheme searched for connecting keyword (i.e. the boolean combination of multiple keyword) because its higher search precision has important using value in safe storage is served simultaneously.The present invention adopts authorized user and storage server successively to propose a kind of encryption method of searching for multiple keyword to the mode of keyword encryption, makes authorized user can utilize the trapdoor search encrypted document of connection keyword.By compared with existing scheme, the scheme of proposition, at communication and calculation cost, namely searches for the speed of trapdoor size, keyword encryption and search, etc. the overall efficiency of aspect be improved.In addition, the scheme of proposition supports multi-user, namely can increase dynamically and cancel user, make user directly can carry out data sharing on storage server.

Claims (9)

1. the encryption method that in cloud storage, multiple keywords of assigned address can be searched for, is characterized in that, specifically implement according to following steps:
Step 1, system parameters initialization;
Step 2, interpolation user;
Step 3, file owner generate file encryption and Security Index;
Step 4, server are to index re-encryption;
Step 5, user are about the generation of keyword search token;
Step 6, cloud storage server are about the search of ciphertext keyword;
Step 7, user are about the deciphering of ciphertext;
Step 8, cancel user.
2. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 1 is specifically implemented according to following steps:
Step (1.1), input security parameter k by file encryption person Ent, export the multiplication loop group G that two rank are prime number q 1and G 2, g 1for G 1generator, g 2for G 2generator;
Step (1.2), selection bilinear map
Step (1.3), the random x of selection equably ∈ Z qas the master key of file encryption person Ent, be designated as msk E n t = x ∈ Z q * , Wherein Z q * = { 1 , 2 , ... , q - 1 } , Be designated as msk ent=x, calculates
Step (1.4), selection two pseudo-random function with and select two random seed s ', s " ∈ arbitrarily r{ 0,1} k;
Step (1.5), selection symmetric encipherment algorithm SKE={SKE.Gen (1 k), SKE.ENC (.), SKE.DE (.) }, select an encryption key ek ← SKE.Gen (1 equably at random k);
The open system parameters of step (1.6), file encryption person Ent is p a r a m = ( G 1 , G 2 , e ^ , g 1 , g 2 , q , f ′ , f ′ ′ , h , S K E ) , Secrecy system private key is msk ent=x, random seed and file encryption key ek.
3. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 2 is specifically implemented according to following steps:
The master key k of step (2.1), input system user administrator UM uM=x and user identity u iD∈ U, exports user u iDkey and auxiliary key ( sk u I D , ComK u I D ) = ( g 1 x u I D ∈ R Z q * , g 2 k U M / x u I D ) = ( g 1 x u I D , g 2 x / x u I D ) , Here ComK u I D = g 2 x / x u I D , sk u I D = g 1 x u I D ;
Step (2.2), general send to user u safely iD, user u iDmaintain secrecy
Step (2.3), general send to Serv safely, Serv adds in its user list U-ComK
4. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 3 is specifically implemented according to following steps:
Step (3.1), input user key encryption key ek, random seed s ', document D iand lists of keywords W i = ( w i , 1 , ... , w i , i m ) , 1 ≤ i ≤ n , Stochastic choice r irz q;
Step (3.2), calculating with calculate σ i , j = f ′ ( s ′ , w i , j ) ∈ Z q * , ω i , j = ( sk u I D ) r i σ i , j , 1≤j≤i m, order I i * = ( h r i , ComK u I D r i , ω i , 1 , ... , ω i , i m ) , Note C i * = ( Enc e k ( D i ) , I i * ) , Will send to Cloud Server Serv.
5. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 4 is specifically implemented according to following steps:
It is right that step (4.1), server S erv perform in index re-encryption, input user identity u iDwith to receive serv is according to u iDsearch in U-ComK if nothing, then return, otherwise recalculate in obtain index:
I i = ( h r i , ComK u I D r i , e ( ω i , 1 , ComK u I D ) , ... , e ( ω i , m , ComK u I D ) ) = ( h r i , ComK u I D r i , e ( g 1 , g 2 ) r i σ i , 1 x , ... , e ( g 1 , g 2 ) r i σ i , m x ) = ( h r i , ComK u I D r i , e ( h , g 2 ) r i σ i , 1 , ... , e ( h , g 2 ) r i σ i , m ) = ( h r i , ComK u I D r i , I i 1 , ... , I i m ) ,
Step (4.2), by C i=(Enc ek(D i), I i) be stored on Serv.
6. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 5 is specifically implemented according to following steps:
Step (5.1), user u iDperform and be used for generating the search token connecting keyword, input s ', s " and the keyword position 1≤l that will retrieve 1..., l dthe keyword w ' of≤m and correspondence 1..., w ' d, d is the keyword number of user search, Stochastic choice random number calculate according to the following formula:
T 1 = sk u I D ( t 1 + f ′ ′ ( s ′ ′ , t 2 ) Σ j = 1 d f ′ ( s ′ , w j ′ ) ) = g 1 ( t 1 + f ′ ′ ( s ′ ′ , t 2 ) Σ j = 1 d f ′ ( s ′ , w j ′ ) ) x u I D ,
T 2 = g 2 t 1 ,
T 3=f″(s″,t 2);
Step (5.2), token T=(u will be searched for iD, T 1, T 2, T 3, l 1..., l d) send to cloud to store server S erv.
7. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 6 is specifically implemented according to following steps:
Step (6.1), cloud storage server S erv performs for searching for encrypted document, inputted search token T=(u iD, T 1, T 2, T 3, l 1..., l d) and ciphertext C i=(Enc ek(D i), I i), Serv is first according to u iDsearch in U-ComK if nothing, then return, otherwise Serv initialization empty set Ω;
Step (6.2), to C i, 1≤i≤n, judge whether set up as inferior:
e ( T 1 , ComK u I D r i ) / e ( h r i , T 2 ) = ( Π j = 1 d I il j ) T 3
If set up, then Ω=Ω ∪ { C i, finally Search Results Ω is sent to user u iD, otherwise this ciphertext and crucial word mismatch, continue the next keyword index I of search i+1, finally Search Results Ω is sent to user u iD.
8. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 7 is specially:
User u iDinput symmetric key ek and the Ω received is right calculate D i=Dec ek(E i).
9. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 8 is specially:
User management mechanism UM inputs user identity u iD, UM sends to cloud storage server S erv and cancels user u iDorder, Serv executable operations U - C o m K = U - C o m K \ { ( u I D , comk u I D ) } , Namely cloud storage server CSS deletes user u iDregistration project .
CN201510408630.7A 2015-07-13 2015-07-13 The encryption method that multiple keywords of designated position can search in cloud storage Active CN105049196B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510408630.7A CN105049196B (en) 2015-07-13 2015-07-13 The encryption method that multiple keywords of designated position can search in cloud storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510408630.7A CN105049196B (en) 2015-07-13 2015-07-13 The encryption method that multiple keywords of designated position can search in cloud storage

Publications (2)

Publication Number Publication Date
CN105049196A true CN105049196A (en) 2015-11-11
CN105049196B CN105049196B (en) 2018-08-03

Family

ID=54455419

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510408630.7A Active CN105049196B (en) 2015-07-13 2015-07-13 The encryption method that multiple keywords of designated position can search in cloud storage

Country Status (1)

Country Link
CN (1) CN105049196B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105763324A (en) * 2016-04-19 2016-07-13 四川理工学院 Controllable searchable encryption searching method being able to verify multi user-ends
CN105897419A (en) * 2016-03-31 2016-08-24 浙江工业大学 Multi-user dynamic keyword searchable encryption method
CN106850652A (en) * 2017-02-21 2017-06-13 重庆邮电大学 One kind arbitration can search for encryption method
CN107070900A (en) * 2017-03-23 2017-08-18 西安电子科技大学 Re-encryption method is can search for based on what is obscured
CN107634829A (en) * 2017-09-12 2018-01-26 南京理工大学 Encrypted electronic medical records system and encryption method can search for based on attribute
CN108011713A (en) * 2017-11-16 2018-05-08 南京邮电大学 Cipher text retrieval method based on homomorphic cryptography in a kind of cloud storage
CN108920968A (en) * 2018-06-29 2018-11-30 南京理工大学 It is a kind of that encryption method can search for based on the file for connecting keyword
CN109450935A (en) * 2018-12-19 2019-03-08 河南科技大学 The multi-key word searching method for the Semantic Security that can verify that in cloud storage
CN109496403A (en) * 2016-07-25 2019-03-19 罗伯特·博世有限公司 For having the preceding dynamic to privacy and commission verifiability to can search for the method and system of symmetric cryptography
CN110851481A (en) * 2019-11-08 2020-02-28 青岛大学 Searchable encryption method, device, equipment and readable storage medium
CN111935141A (en) * 2020-08-10 2020-11-13 合肥工业大学 Single-time inadvertent anti-link query system and method for secret data

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102938767A (en) * 2012-11-13 2013-02-20 西安电子科技大学 Efficient verified fuzzy key word searching method based on cloud data subcontract system
CN103544301A (en) * 2013-10-31 2014-01-29 上海交通大学 Efficient and safe multi-keyword-supporting searching method in mobile cloud
CN103873236A (en) * 2012-12-12 2014-06-18 华为技术有限公司 Searchable encryption method and equipment thereof
CN104022866A (en) * 2014-05-22 2014-09-03 西安理工大学 Searchable encryption method for multi-user cipher text keyword in cloud storage
CN104023051A (en) * 2014-05-22 2014-09-03 西安理工大学 Multi-user multi-keyword searchable encryption method in cloud storage
CN104021157A (en) * 2014-05-22 2014-09-03 西安理工大学 Method for keyword searchable encryption based on bilinear pairs in cloud storage
CN104052740A (en) * 2014-05-22 2014-09-17 西安理工大学 Verifiable and searchable encryption method based on dictionary in cloud storage

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102938767A (en) * 2012-11-13 2013-02-20 西安电子科技大学 Efficient verified fuzzy key word searching method based on cloud data subcontract system
CN103873236A (en) * 2012-12-12 2014-06-18 华为技术有限公司 Searchable encryption method and equipment thereof
CN103544301A (en) * 2013-10-31 2014-01-29 上海交通大学 Efficient and safe multi-keyword-supporting searching method in mobile cloud
CN104022866A (en) * 2014-05-22 2014-09-03 西安理工大学 Searchable encryption method for multi-user cipher text keyword in cloud storage
CN104023051A (en) * 2014-05-22 2014-09-03 西安理工大学 Multi-user multi-keyword searchable encryption method in cloud storage
CN104021157A (en) * 2014-05-22 2014-09-03 西安理工大学 Method for keyword searchable encryption based on bilinear pairs in cloud storage
CN104052740A (en) * 2014-05-22 2014-09-17 西安理工大学 Verifiable and searchable encryption method based on dictionary in cloud storage

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ZHANG YALING ETC: "A Multi-User Searchable Symmetric Encryption Scheme for Cloud Storage System", 《IEEE》 *
王尚平等: "一个高效的基于连接关键词的可搜索加密方案", 《电子与信息学报》 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105897419A (en) * 2016-03-31 2016-08-24 浙江工业大学 Multi-user dynamic keyword searchable encryption method
CN105897419B (en) * 2016-03-31 2018-12-18 浙江工业大学 A kind of multi-user's dynamic keyword word can search for encryption method
CN105763324A (en) * 2016-04-19 2016-07-13 四川理工学院 Controllable searchable encryption searching method being able to verify multi user-ends
CN109496403A (en) * 2016-07-25 2019-03-19 罗伯特·博世有限公司 For having the preceding dynamic to privacy and commission verifiability to can search for the method and system of symmetric cryptography
CN106850652A (en) * 2017-02-21 2017-06-13 重庆邮电大学 One kind arbitration can search for encryption method
CN106850652B (en) * 2017-02-21 2020-05-26 重庆邮电大学 Arbitration searchable encryption method
CN107070900A (en) * 2017-03-23 2017-08-18 西安电子科技大学 Re-encryption method is can search for based on what is obscured
CN107070900B (en) * 2017-03-23 2019-10-11 西安电子科技大学 It can search for re-encryption method based on what is obscured
CN107634829A (en) * 2017-09-12 2018-01-26 南京理工大学 Encrypted electronic medical records system and encryption method can search for based on attribute
CN108011713A (en) * 2017-11-16 2018-05-08 南京邮电大学 Cipher text retrieval method based on homomorphic cryptography in a kind of cloud storage
CN108011713B (en) * 2017-11-16 2020-11-20 南京邮电大学 Ciphertext retrieval method based on homomorphic encryption in cloud storage
CN108920968A (en) * 2018-06-29 2018-11-30 南京理工大学 It is a kind of that encryption method can search for based on the file for connecting keyword
CN109450935A (en) * 2018-12-19 2019-03-08 河南科技大学 The multi-key word searching method for the Semantic Security that can verify that in cloud storage
CN109450935B (en) * 2018-12-19 2021-02-02 河南科技大学 Verifiable semantic security multi-keyword search method in cloud storage
CN110851481A (en) * 2019-11-08 2020-02-28 青岛大学 Searchable encryption method, device, equipment and readable storage medium
CN110851481B (en) * 2019-11-08 2022-06-28 青岛大学 Searchable encryption method, device and equipment and readable storage medium
CN111935141A (en) * 2020-08-10 2020-11-13 合肥工业大学 Single-time inadvertent anti-link query system and method for secret data

Also Published As

Publication number Publication date
CN105049196B (en) 2018-08-03

Similar Documents

Publication Publication Date Title
CN104021157B (en) Keyword in cloud storage based on Bilinear map can search for encryption method
CN105049196A (en) Searchable encryption method of multiple keywords at specified location in cloud storage
CN105024802B (en) Multi-user's multi-key word based on Bilinear map can search for encryption method in cloud storage
CN104023051A (en) Multi-user multi-keyword searchable encryption method in cloud storage
CN108632032B (en) Safe multi-keyword sequencing retrieval system without key escrow
Wang et al. Secure ranked keyword search over encrypted cloud data
CN104486315B (en) A kind of revocable key outsourcing decryption method based on contents attribute
CN106330865B (en) The attribute base keyword searching method efficiently cancelled and cloud computing application system are supported under cloud environment
CN106921674B (en) The proxy re-encryption semanteme of quantum attack can search for encryption method after anti-
CN105262843B (en) A kind of anti-data-leakage guard method for cloud storage environment
CN104022866A (en) Searchable encryption method for multi-user cipher text keyword in cloud storage
CN105915520A (en) File storage and searching method based on public key searchable encryption, and storage system
CN108062485A (en) A kind of fuzzy keyword searching method of multi-service oriented device multi-user
CN105024812B (en) The encryption method that can search for of the nominative testing person of identity-based in cloud storage
CN105610910A (en) Cloud storage oriented ciphertext full-text search method and system based on full homomorphic ciphers
CN105743888A (en) Agent re-encryption scheme based on keyword research
CN104852801A (en) Searchable public key encryption method
CN108092972B (en) Multi-authorization-center attribute-based searchable encryption method
CN109493017A (en) Credible outsourcing storage method based on block chain
KR20130085491A (en) Multi-user searchable encryption system with index validation and tracing and method thereof
CN104052740A (en) Verifiable and searchable encryption method based on dictionary in cloud storage
CN106599719A (en) Ciphertext retrieval method supporting efficient key management
CN107547530A (en) On-line/off-line keyword search methodology and its cloud computing application system based on attribute under mobile cloud environment
CN105282167A (en) Searchable certificateless public key encryption method
CN110392038A (en) The multi-key cipher that can verify that under a kind of multi-user scene can search for encryption method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20180622

Address after: 528000 4 building, 1 Zhenghe Road, Jinlong residential committee, Chencun Town, Shunde District, Foshan, Guangdong

Applicant after: Foshan mingmao Network Technology Co., Ltd.

Address before: 710048 No. 5 Jinhua South Road, Shaanxi, Xi'an

Applicant before: Xi'an University of Technology

GR01 Patent grant
GR01 Patent grant