CN105049196A - Searchable encryption method of multiple keywords at specified location in cloud storage - Google Patents
Searchable encryption method of multiple keywords at specified location in cloud storage Download PDFInfo
- Publication number
- CN105049196A CN105049196A CN201510408630.7A CN201510408630A CN105049196A CN 105049196 A CN105049196 A CN 105049196A CN 201510408630 A CN201510408630 A CN 201510408630A CN 105049196 A CN105049196 A CN 105049196A
- Authority
- CN
- China
- Prior art keywords
- user
- prime
- comk
- cloud storage
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a searchable encryption method of multiple keywords at the specified location in cloud storage. The method is implemented specifically according to the following steps: Step 1, system parameter initialization; Step 2, user adding; Step 3, file encryption and security index generation by a file owner; Step 4, index re-encryption by a server; Step 5, generation of keyword search token by a user; Step 6, search of ciphertext keywords by a cloud storage server; Step 7, decryption of ciphertexts by the user; and Step 8, user revocation. By the method, the problem that keyword search cannot be realized after cloud storage data encryption in the prior art is solved.
Description
Technical field
The invention belongs to field of information security technology, the encryption method that the multiple keywords being specifically related to assigned address in the storage of a kind of cloud can be searched for.
Background technology
Cloud computing, as a kind of new computation model, can provide the calculation services of lower, the extendible various advanced person of cost, and in order to save the cost of storage and management data, data can be outsourced to cloud storage server by enterprises and individuals.The data that cloud stores service provides have the advantage such as availability and reliability, but it also has a shortcoming clearly, namely data are not under the management of user and controlling, and so how the confidentiality and integrity of service data just becomes the problem that user urgently pays close attention to.
Although the reliability, availability, fault-tolerance etc. of cloud storage service provider (CloudStorageServiceProvider, CSSP) are believed by enterprise, the data of trustship are not used for other objects by the people CSSP that is uncertain about; Same for personal user, they wish that the data of oneself can only be accessed by oneself or the people specified and can not be accessed by CSSP.This will cause the problem of two aspects: on the one hand, from the angle of user, and they cannot find and allow they complete believable CSSP carry out their data of store and management; On the other hand from the angle of CSSP, a large amount of clients will be lost when not solving the problem.Therefore, the popularization that cloud will be hindered to store of the confidentiality of data and integrality and use.
In view of above practical problem, during cloud stores, data before being transferred to CSSP, must being encrypted by user oneself, and also can only be decrypted by user oneself, will alleviate the danger that user data leaks like this.Do their data of wanting of the acquisition that so user can be very fast also ensure the confidentiality of data to CSSP but this is by problem new for introducing one, as user needs the document comprising certain keyword?
Summary of the invention
The encryption method that the multiple keywords that the object of this invention is to provide assigned address in the storage of a kind of cloud can be searched for, can not realize the problem of keyword retrieval after solving the cloud storage data encryption existed in prior art.
The technical solution adopted in the present invention is, the encryption method that during cloud stores, multiple keywords of assigned address can be searched for, and specifically implements according to following steps:
Step 1, system parameters initialization;
Step 2, interpolation user;
Step 3, file owner generate file encryption and Security Index;
Step 4, server are to index re-encryption;
Step 5, user are about the generation of keyword search token;
Step 6, cloud storage server are about the search of ciphertext keyword;
Step 7, user are about the deciphering of ciphertext;
Step 8, cancel user.
Feature of the present invention is also,
Step 1 is specifically implemented according to following steps:
Step (1.1), input security parameter k by file encryption person Ent, export the multiplication loop group G that two rank are prime number q
1and G
2, g
1for G
1generator, g
2for G
2generator;
Step (1.2), selection bilinear map
Step (1.3), the random x of selection equably ∈ Z
qas the master key of file encryption person Ent, be designated as
Wherein
Be designated as msk
ent=x, calculates h=g
1 x;
Step (1.4), selection two pseudo-random function
with
and select two random seed s ', s " ∈ arbitrarily
r{ 0,1}
k;
Step (1.5), selection symmetric encipherment algorithm SKE={SKE.Gen (1
k), SKE.ENC (.), SKE.DE (.) }, select an encryption key ek ← SKE.Gen (1 equably at random
k);
The open system parameters of step (1.6), file encryption person Ent is
Secrecy system private key is msk
ent=x, random seed s ', s " ∈
r{ 0,1}
kand file encryption key ek.
Step 2 is specifically implemented according to following steps:
The master key k of step (2.1), input system user administrator UM
uM=x and user identity u
iD∈ U, exports user u
iDkey and auxiliary key
Here
Step (2.2), general
send to user u safely
iD, user u
iDmaintain secrecy
Step (2.3), general
send to Serv safely, Serv adds in its user list U-ComK
Step 3 is specifically implemented according to following steps:
Step (3.1), input user key
encryption key ek, random seed s ', document D
iand lists of keywords
stochastic choice r
i∈
rz
q;
Step (3.2), calculating
with
Calculate
1≤j≤i
m, order
Note
Will
send to Cloud Server Serv.
Step 4 is specifically implemented according to following steps:
It is right that step (4.1), server S erv perform
in index I
i *re-encryption, input user identity u
iDwith to receive
serv is according to u
iDsearch in U-ComK
if nothing, then return, otherwise recalculate
in I
i *obtain index:
Step (4.2), by C
i=(Enc
ek(D
i), I
i) be stored on Serv.
Step 5 is specifically implemented according to following steps:
Step (5.1), user u
iDperform and be used for generating the search token connecting keyword, input
s ', s " and the keyword position 1≤l that will retrieve
1..., l
dthe keyword w ' of≤m and correspondence
1..., w '
d, d is the keyword number of user search, Stochastic choice random number
calculate according to the following formula:
T
3=f″(s″,t
2);
Step (5.2), token T=(u will be searched for
iD, T
1, T
2, T
3, l
1..., l
d) send to cloud to store server S erv.
Step 6 is specifically implemented according to following steps:
Step (6.1), cloud storage server S erv performs for searching for encrypted document, inputted search token T=(u
iD, T
1, T
2, T
3, l
1..., l
d) and ciphertext C
i=(Enc
ek(D
i), I
i), Serv is first according to u
iDsearch in U-ComK
if nothing, then return, otherwise Serv initialization empty set Ω;
Step (6.2), to C
i, 1≤i≤n,
judge whether set up as inferior:
If set up, then Ω=Ω ∪ { C
i, finally Search Results Ω is sent to user u
iD, otherwise this ciphertext and crucial word mismatch, continue the next keyword index I of search
i+1, finally Search Results Ω is sent to user u
iD.
Step 7 is specially:
User u
iDinput symmetric key ek and the Ω received is right
calculate D
i=Dec
ek(E
i).
Step 8 is specially:
User management mechanism UM inputs user identity u
iD, UM sends to cloud storage server S erv and cancels user u
iDorder, Serv executable operations
namely cloud storage server CSS deletes user u
iDregistration project
.
The invention has the beneficial effects as follows, the encryption method that during cloud stores, multiple keywords of assigned address can be searched for, data user can by after the data encryption of oneself, be stored in cloud storage server, when needing, can by keyword retrieval Token Retrieval to the encrypt data needed, then download decryption.Meanwhile, cloud storage server does not also know the keyword of user search, guarantees the data message privacy of user.By compared with existing scheme, the inventive method is at communication and calculation cost, namely search for trapdoor size, the overall efficiency of the aspect such as speed of keyword encryption and search is improved, the present invention is simultaneously applicable multi-user environment, refer to and can increase and cancel user, user increases can pass through algorithm Enroll (k
uM, u
iD) realize, cancelling of user can by algorithm RevokeUser (u
iD) realize.
Embodiment
Below in conjunction with embodiment, the present invention is described in detail.
The encryption method that during cloud of the present invention stores, multiple keywords of assigned address can be searched for, specifically implement according to following steps:
Step 1, system parameters initialization:
Specifically implement according to following steps:
Step (1.1), input security parameter k by file encryption person Ent, export the multiplication loop group G that two rank are prime number q
1and G
2, g
1for G
1generator, g
2for G
2generator;
Step (1.2), selection bilinear map
Step (1.3), the random x of selection equably ∈ Z
qas the master key of file encryption person Ent, be designated as
Wherein
Be designated as msk
ent=x, calculates h=g
1 x;
Step (1.4), selection two pseudo-random function
with
and select two random seed s ', s " ∈ arbitrarily
r{ 0,1}
k;
Step (1.5), selection symmetric encipherment algorithm SKE={SKE.Gen (1
k), SKE.ENC (.), SKE.DE (.) }, select an encryption key ek ← SKE.Gen (1 equably at random
k);
The open system parameters of step (1.6), file encryption person Ent is
Secrecy system private key is msk
ent=x, random seed s ', s " ∈
r{ 0,1}
kand file encryption key ek.
Step 2, interpolation user:
Specifically implement according to following steps:
The master key k of step (2.1), input system user administrator UM
uM=x and user identity u
iD∈ U, exports user u
iDkey and auxiliary key
Here
Step (2.2), general
send to user u safely
iD, user u
iDmaintain secrecy
Step (2.3), general
send to Serv safely, Serv adds in its user list U-ComK
Step 3, file owner generate file encryption and Security Index:
Specifically implement according to following steps:
Step (3.1), input user key
encryption key ek, random seed s ', document D
iand lists of keywords
stochastic choice r
i∈
rz
q;
Step (3.2), calculating
with
Calculate
1≤j≤i
m, order
Note
Will
send to Cloud Server Serv;
Step 4, server are to index re-encryption:
Specifically implement according to following steps:
It is right that step (4.1), server S erv perform
in index I
i *re-encryption, input user identity u
iDwith to receive
serv is according to u
iDsearch in U-ComK
if nothing, then return, otherwise recalculate
in I
i *obtain index:
Step (4.2), by C
i=(Enc
ek(D
i), I
i) be stored on Serv;
Step 5, user are about the generation of keyword search token:
Specifically implement according to following steps:
Step (5.1), user u
iDperform and be used for generating the search token connecting keyword, input
s ', s " and the keyword position 1≤l that will retrieve
1..., l
dthe keyword w ' of≤m and correspondence
1..., w '
d, d is the keyword number of user search, Stochastic choice random number
calculate according to the following formula:
Step (5.2), token T=(u will be searched for
iD, T
1, T
2, T
3, l
1..., l
d) send to cloud to store server S erv;
Step 6, cloud storage server are about the search of ciphertext keyword:
Specifically implement according to following steps:
Step (6.1), cloud storage server S erv performs for searching for encrypted document, inputted search token T=(u
iD, T
1, T
2, T
3, l
1..., l
d) and ciphertext C
i=(Enc
ek(D
i), I
i), Serv is first according to u
iDsearch in U-ComK
if nothing, then return, otherwise Serv initialization empty set Ω;
Step (6.2), to C
i, 1≤i≤n,
judge whether set up as inferior:
If set up, then Ω=Ω ∪ { C
i, finally Search Results Ω is sent to user u
iD, otherwise this ciphertext and crucial word mismatch, continue the next keyword index I of search
i+1, finally Search Results Ω is sent to user u
iD;
Step 7, user are about the deciphering of ciphertext:
Be specially:
User u
iDinput symmetric key ek and the Ω received is right
calculate D
i=Dec
ek(E
i);
Step 8, cancel user:
Be specially:
User management mechanism UM inputs user identity u
iD, UM sends to cloud storage server S erv and cancels user u
iDorder, Serv executable operations
namely cloud storage server CSS deletes user u
iDregistration project
.
In storing cloud of the present invention below, the fail safe of the encryption method that multiple keywords of assigned address can be searched for is analyzed:
Prove: if all data all generate according to describing in the inventive method, and if
wherein 1≤i≤m, 1≤j≤d, then have:
Therefore
Card is finished
To summary of the present invention:
The encryption method that during cloud of the present invention stores, multiple keywords of assigned address can be searched for, can in the enterprising line search inquiry of the data acquisition system of encryption, concrete grammar is, it is first the set of file set generating indexes, re-using can search for encrypt is encrypted with hiding index content to these indexes, and encryption will meet following character: the 1) token of a given keyword (i.e. index), can obtain the pointer of the All Files comprising this keyword; 2) do not have token, the content of index is hiding; 3) user only with association key could generate token; 4) retrieving is except exposing certain keyword of which file-sharing, can not expose the specifying information of any relevant document and keyword.The central role can searching for encryption is for cloud stores service provides: one is that user oneself controls its data; Two is that the security property of data can be verified by Cryptography Principles, instead of determines fail safe by law, physical equipment.
The encryption method that during cloud of the present invention stores, multiple keywords of assigned address can be searched for, in cloud stores service, user can use the encipherment scheme that can search for after data encryption, is outsourced to cloud storage server.Can search for encipherment scheme makes user can selectively access its encrypt data, the confidentiality of user search data can also be guaranteed, based on the encipherment scheme searched for connecting keyword (i.e. the boolean combination of multiple keyword) because its higher search precision has important using value in safe storage is served simultaneously.The present invention adopts authorized user and storage server successively to propose a kind of encryption method of searching for multiple keyword to the mode of keyword encryption, makes authorized user can utilize the trapdoor search encrypted document of connection keyword.By compared with existing scheme, the scheme of proposition, at communication and calculation cost, namely searches for the speed of trapdoor size, keyword encryption and search, etc. the overall efficiency of aspect be improved.In addition, the scheme of proposition supports multi-user, namely can increase dynamically and cancel user, make user directly can carry out data sharing on storage server.
Claims (9)
1. the encryption method that in cloud storage, multiple keywords of assigned address can be searched for, is characterized in that, specifically implement according to following steps:
Step 1, system parameters initialization;
Step 2, interpolation user;
Step 3, file owner generate file encryption and Security Index;
Step 4, server are to index re-encryption;
Step 5, user are about the generation of keyword search token;
Step 6, cloud storage server are about the search of ciphertext keyword;
Step 7, user are about the deciphering of ciphertext;
Step 8, cancel user.
2. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 1 is specifically implemented according to following steps:
Step (1.1), input security parameter k by file encryption person Ent, export the multiplication loop group G that two rank are prime number q
1and G
2, g
1for G
1generator, g
2for G
2generator;
Step (1.2), selection bilinear map
Step (1.3), the random x of selection equably ∈ Z
qas the master key of file encryption person Ent, be designated as
Wherein
Be designated as msk
ent=x, calculates
Step (1.4), selection two pseudo-random function
with
and select two random seed s ', s " ∈ arbitrarily
r{ 0,1}
k;
Step (1.5), selection symmetric encipherment algorithm SKE={SKE.Gen (1
k), SKE.ENC (.), SKE.DE (.) }, select an encryption key ek ← SKE.Gen (1 equably at random
k);
The open system parameters of step (1.6), file encryption person Ent is
Secrecy system private key is msk
ent=x, random seed
and file encryption key ek.
3. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 2 is specifically implemented according to following steps:
The master key k of step (2.1), input system user administrator UM
uM=x and user identity u
iD∈ U, exports user u
iDkey and auxiliary key
Here
Step (2.2), general
send to user u safely
iD, user u
iDmaintain secrecy
Step (2.3), general
send to Serv safely, Serv adds in its user list U-ComK
4. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 3 is specifically implemented according to following steps:
Step (3.1), input user key
encryption key ek, random seed s ', document D
iand lists of keywords
Stochastic choice r
i∈
rz
q;
Step (3.2), calculating
with
calculate
1≤j≤i
m, order
Note
Will
send to Cloud Server Serv.
5. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 4 is specifically implemented according to following steps:
It is right that step (4.1), server S erv perform
in index
re-encryption, input user identity u
iDwith to receive
serv is according to u
iDsearch in U-ComK
if nothing, then return, otherwise recalculate
in
obtain index:
Step (4.2), by C
i=(Enc
ek(D
i), I
i) be stored on Serv.
6. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 5 is specifically implemented according to following steps:
Step (5.1), user u
iDperform and be used for generating the search token connecting keyword, input
s ', s " and the keyword position 1≤l that will retrieve
1..., l
dthe keyword w ' of≤m and correspondence
1..., w '
d, d is the keyword number of user search, Stochastic choice random number
calculate according to the following formula:
T
3=f″(s″,t
2);
Step (5.2), token T=(u will be searched for
iD, T
1, T
2, T
3, l
1..., l
d) send to cloud to store server S erv.
7. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 6 is specifically implemented according to following steps:
Step (6.1), cloud storage server S erv performs for searching for encrypted document, inputted search token T=(u
iD, T
1, T
2, T
3, l
1..., l
d) and ciphertext C
i=(Enc
ek(D
i), I
i), Serv is first according to u
iDsearch in U-ComK
if nothing, then return, otherwise Serv initialization empty set Ω;
Step (6.2), to C
i, 1≤i≤n,
judge whether set up as inferior:
If set up, then Ω=Ω ∪ { C
i, finally Search Results Ω is sent to user u
iD, otherwise this ciphertext and crucial word mismatch, continue the next keyword index I of search
i+1, finally Search Results Ω is sent to user u
iD.
8. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 7 is specially:
User u
iDinput symmetric key ek and the Ω received is right
calculate D
i=Dec
ek(E
i).
9. the encryption method that in cloud storage according to claim 1, multiple keywords of assigned address can be searched for, it is characterized in that, described step 8 is specially:
User management mechanism UM inputs user identity u
iD, UM sends to cloud storage server S erv and cancels user u
iDorder, Serv executable operations
Namely cloud storage server CSS deletes user u
iDregistration project
.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510408630.7A CN105049196B (en) | 2015-07-13 | 2015-07-13 | The encryption method that multiple keywords of designated position can search in cloud storage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510408630.7A CN105049196B (en) | 2015-07-13 | 2015-07-13 | The encryption method that multiple keywords of designated position can search in cloud storage |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105049196A true CN105049196A (en) | 2015-11-11 |
CN105049196B CN105049196B (en) | 2018-08-03 |
Family
ID=54455419
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510408630.7A Active CN105049196B (en) | 2015-07-13 | 2015-07-13 | The encryption method that multiple keywords of designated position can search in cloud storage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105049196B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105763324A (en) * | 2016-04-19 | 2016-07-13 | 四川理工学院 | Controllable searchable encryption searching method being able to verify multi user-ends |
CN105897419A (en) * | 2016-03-31 | 2016-08-24 | 浙江工业大学 | Multi-user dynamic keyword searchable encryption method |
CN106850652A (en) * | 2017-02-21 | 2017-06-13 | 重庆邮电大学 | One kind arbitration can search for encryption method |
CN107070900A (en) * | 2017-03-23 | 2017-08-18 | 西安电子科技大学 | Re-encryption method is can search for based on what is obscured |
CN107634829A (en) * | 2017-09-12 | 2018-01-26 | 南京理工大学 | Encrypted electronic medical records system and encryption method can search for based on attribute |
CN108011713A (en) * | 2017-11-16 | 2018-05-08 | 南京邮电大学 | Cipher text retrieval method based on homomorphic cryptography in a kind of cloud storage |
CN108920968A (en) * | 2018-06-29 | 2018-11-30 | 南京理工大学 | It is a kind of that encryption method can search for based on the file for connecting keyword |
CN109450935A (en) * | 2018-12-19 | 2019-03-08 | 河南科技大学 | The multi-key word searching method for the Semantic Security that can verify that in cloud storage |
CN109496403A (en) * | 2016-07-25 | 2019-03-19 | 罗伯特·博世有限公司 | For having the preceding dynamic to privacy and commission verifiability to can search for the method and system of symmetric cryptography |
CN110851481A (en) * | 2019-11-08 | 2020-02-28 | 青岛大学 | Searchable encryption method, device, equipment and readable storage medium |
CN111935141A (en) * | 2020-08-10 | 2020-11-13 | 合肥工业大学 | Single-time inadvertent anti-link query system and method for secret data |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102938767A (en) * | 2012-11-13 | 2013-02-20 | 西安电子科技大学 | Efficient verified fuzzy key word searching method based on cloud data subcontract system |
CN103544301A (en) * | 2013-10-31 | 2014-01-29 | 上海交通大学 | Efficient and safe multi-keyword-supporting searching method in mobile cloud |
CN103873236A (en) * | 2012-12-12 | 2014-06-18 | 华为技术有限公司 | Searchable encryption method and equipment thereof |
CN104022866A (en) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | Searchable encryption method for multi-user cipher text keyword in cloud storage |
CN104023051A (en) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | Multi-user multi-keyword searchable encryption method in cloud storage |
CN104021157A (en) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | Method for keyword searchable encryption based on bilinear pairs in cloud storage |
CN104052740A (en) * | 2014-05-22 | 2014-09-17 | 西安理工大学 | Verifiable and searchable encryption method based on dictionary in cloud storage |
-
2015
- 2015-07-13 CN CN201510408630.7A patent/CN105049196B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102938767A (en) * | 2012-11-13 | 2013-02-20 | 西安电子科技大学 | Efficient verified fuzzy key word searching method based on cloud data subcontract system |
CN103873236A (en) * | 2012-12-12 | 2014-06-18 | 华为技术有限公司 | Searchable encryption method and equipment thereof |
CN103544301A (en) * | 2013-10-31 | 2014-01-29 | 上海交通大学 | Efficient and safe multi-keyword-supporting searching method in mobile cloud |
CN104022866A (en) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | Searchable encryption method for multi-user cipher text keyword in cloud storage |
CN104023051A (en) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | Multi-user multi-keyword searchable encryption method in cloud storage |
CN104021157A (en) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | Method for keyword searchable encryption based on bilinear pairs in cloud storage |
CN104052740A (en) * | 2014-05-22 | 2014-09-17 | 西安理工大学 | Verifiable and searchable encryption method based on dictionary in cloud storage |
Non-Patent Citations (2)
Title |
---|
ZHANG YALING ETC: "A Multi-User Searchable Symmetric Encryption Scheme for Cloud Storage System", 《IEEE》 * |
王尚平等: "一个高效的基于连接关键词的可搜索加密方案", 《电子与信息学报》 * |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105897419A (en) * | 2016-03-31 | 2016-08-24 | 浙江工业大学 | Multi-user dynamic keyword searchable encryption method |
CN105897419B (en) * | 2016-03-31 | 2018-12-18 | 浙江工业大学 | A kind of multi-user's dynamic keyword word can search for encryption method |
CN105763324A (en) * | 2016-04-19 | 2016-07-13 | 四川理工学院 | Controllable searchable encryption searching method being able to verify multi user-ends |
CN109496403A (en) * | 2016-07-25 | 2019-03-19 | 罗伯特·博世有限公司 | For having the preceding dynamic to privacy and commission verifiability to can search for the method and system of symmetric cryptography |
CN106850652A (en) * | 2017-02-21 | 2017-06-13 | 重庆邮电大学 | One kind arbitration can search for encryption method |
CN106850652B (en) * | 2017-02-21 | 2020-05-26 | 重庆邮电大学 | Arbitration searchable encryption method |
CN107070900A (en) * | 2017-03-23 | 2017-08-18 | 西安电子科技大学 | Re-encryption method is can search for based on what is obscured |
CN107070900B (en) * | 2017-03-23 | 2019-10-11 | 西安电子科技大学 | It can search for re-encryption method based on what is obscured |
CN107634829A (en) * | 2017-09-12 | 2018-01-26 | 南京理工大学 | Encrypted electronic medical records system and encryption method can search for based on attribute |
CN108011713A (en) * | 2017-11-16 | 2018-05-08 | 南京邮电大学 | Cipher text retrieval method based on homomorphic cryptography in a kind of cloud storage |
CN108011713B (en) * | 2017-11-16 | 2020-11-20 | 南京邮电大学 | Ciphertext retrieval method based on homomorphic encryption in cloud storage |
CN108920968A (en) * | 2018-06-29 | 2018-11-30 | 南京理工大学 | It is a kind of that encryption method can search for based on the file for connecting keyword |
CN109450935A (en) * | 2018-12-19 | 2019-03-08 | 河南科技大学 | The multi-key word searching method for the Semantic Security that can verify that in cloud storage |
CN109450935B (en) * | 2018-12-19 | 2021-02-02 | 河南科技大学 | Verifiable semantic security multi-keyword search method in cloud storage |
CN110851481A (en) * | 2019-11-08 | 2020-02-28 | 青岛大学 | Searchable encryption method, device, equipment and readable storage medium |
CN110851481B (en) * | 2019-11-08 | 2022-06-28 | 青岛大学 | Searchable encryption method, device and equipment and readable storage medium |
CN111935141A (en) * | 2020-08-10 | 2020-11-13 | 合肥工业大学 | Single-time inadvertent anti-link query system and method for secret data |
Also Published As
Publication number | Publication date |
---|---|
CN105049196B (en) | 2018-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104021157B (en) | Keyword in cloud storage based on Bilinear map can search for encryption method | |
CN105049196A (en) | Searchable encryption method of multiple keywords at specified location in cloud storage | |
CN105024802B (en) | Multi-user's multi-key word based on Bilinear map can search for encryption method in cloud storage | |
CN104023051A (en) | Multi-user multi-keyword searchable encryption method in cloud storage | |
CN108632032B (en) | Safe multi-keyword sequencing retrieval system without key escrow | |
Wang et al. | Secure ranked keyword search over encrypted cloud data | |
CN104486315B (en) | A kind of revocable key outsourcing decryption method based on contents attribute | |
CN106330865B (en) | The attribute base keyword searching method efficiently cancelled and cloud computing application system are supported under cloud environment | |
CN106921674B (en) | The proxy re-encryption semanteme of quantum attack can search for encryption method after anti- | |
CN105262843B (en) | A kind of anti-data-leakage guard method for cloud storage environment | |
CN104022866A (en) | Searchable encryption method for multi-user cipher text keyword in cloud storage | |
CN105915520A (en) | File storage and searching method based on public key searchable encryption, and storage system | |
CN108062485A (en) | A kind of fuzzy keyword searching method of multi-service oriented device multi-user | |
CN105024812B (en) | The encryption method that can search for of the nominative testing person of identity-based in cloud storage | |
CN105610910A (en) | Cloud storage oriented ciphertext full-text search method and system based on full homomorphic ciphers | |
CN105743888A (en) | Agent re-encryption scheme based on keyword research | |
CN104852801A (en) | Searchable public key encryption method | |
CN108092972B (en) | Multi-authorization-center attribute-based searchable encryption method | |
CN109493017A (en) | Credible outsourcing storage method based on block chain | |
KR20130085491A (en) | Multi-user searchable encryption system with index validation and tracing and method thereof | |
CN104052740A (en) | Verifiable and searchable encryption method based on dictionary in cloud storage | |
CN106599719A (en) | Ciphertext retrieval method supporting efficient key management | |
CN107547530A (en) | On-line/off-line keyword search methodology and its cloud computing application system based on attribute under mobile cloud environment | |
CN105282167A (en) | Searchable certificateless public key encryption method | |
CN110392038A (en) | The multi-key cipher that can verify that under a kind of multi-user scene can search for encryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20180622 Address after: 528000 4 building, 1 Zhenghe Road, Jinlong residential committee, Chencun Town, Shunde District, Foshan, Guangdong Applicant after: Foshan mingmao Network Technology Co., Ltd. Address before: 710048 No. 5 Jinhua South Road, Shaanxi, Xi'an Applicant before: Xi'an University of Technology |
|
GR01 | Patent grant | ||
GR01 | Patent grant |