CN105049196B - The encryption method that multiple keywords of designated position can search in cloud storage - Google Patents
The encryption method that multiple keywords of designated position can search in cloud storage Download PDFInfo
- Publication number
- CN105049196B CN105049196B CN201510408630.7A CN201510408630A CN105049196B CN 105049196 B CN105049196 B CN 105049196B CN 201510408630 A CN201510408630 A CN 201510408630A CN 105049196 B CN105049196 B CN 105049196B
- Authority
- CN
- China
- Prior art keywords
- user
- search
- cloud storage
- encryption
- keyword
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention discloses the encryption methods that a kind of multiple keywords of designated position in cloud storage can search for, and are specifically implemented according to the following steps:Step 1, systematic parameter initialization;Step 2, addition user;Step 3, file owner generate file encryption and Security Index;Step 4, server are to indexing re-encryption;The generation of step 5, user about keyword search token;The search of step 6, cloud storage service device about ciphertext keyword;The decryption of step 7, user about ciphertext;Step 8, revocation user, the present invention can not achieve keyword retrieval after solving the problems, such as cloud storage data encryption existing in the prior art.
Description
Technical field
The invention belongs to field of information security technology, and in particular to multiple keywords of designated position can in a kind of cloud storage
The encryption method of search.
Background technology
Cloud computing is capable of providing the various advanced calculating clothes that cost is relatively low, expansible as a kind of new computation model
Business, in order to save storage and manage the cost of data, data can be outsourced to cloud storage service device by enterprises and individuals.Cloud storage
The data that service provides have the advantages such as availability and reliability, but it also there are one apparent disadvantage, i.e. data do not exist
Under the management and control of user, asked for what user urgently paid close attention to then how to safeguard that the confidentiality and integrity of data becomes
Topic.
Although what cloud storage service provider (Cloud Storage Service Provider, CSSP) was believed by enterprise can
By property, availability, fault-tolerance etc., but people are uncertain about CSSP not by the data of trustship for other purposes;Similarly for
For personal user, they wish that the data of oneself can only be accessed by oneself or specified people and cannot be accessed by CSSP.This will
Problem of both causing:On the one hand, from the point of view of user, they, which can not find, allows their believable CSSP completely to store
With their data of management;On the other hand it from the point of view of CSSP, will be lost in the case where not solving the above problems big
The client of amount.Therefore, the confidentiality of data and integrality will hinder the popularization and use of cloud storage.
In view of above practical problem, data must be encrypted before being transferred to CSSP by user oneself in cloud storage, and
And can only be also decrypted by user oneself, the danger of user data leakage will be mitigated in this way.But this will introduce one it is new
Problem obtains data that they want simultaneously if user needs the document for including some keyword then whether user can be quickly
Ensure confidentiality of the data to CSSP
Invention content
The object of the present invention is to provide the encryption method that a kind of multiple keywords of designated position in cloud storage can search for, solutions
It has determined the problem of can not achieve keyword retrieval after cloud storage data encryption existing in the prior art.
The technical solution adopted in the present invention is the encryption side that multiple keywords of designated position can search in cloud storage
Method is specifically implemented according to the following steps:
Step 1, systematic parameter initialization;
Step 2, addition user;
Step 3, file owner generate file encryption and Security Index;
Step 4, server are to indexing re-encryption;
The generation of step 5, user about keyword search token;
The search of step 6, cloud storage service device about ciphertext keyword;
The decryption of step 7, user about ciphertext;
Step 8, revocation user.
The features of the present invention also characterized in that
Step 1 is specifically implemented according to the following steps:
Step (1.1) inputs security parameter k by file encryption person Ent, exports the multiplicative cyclic group that two ranks are prime number q
G1And G2, g1For G1Generation member, g2For G2Generation member;
Step (1.2), selection bilinear map
Two step (1.4), selection pseudo-random functionWith
And arbitrarily select two random seed s ', s " ∈R{0,1}k;
Step (1.5), selection symmetric encipherment algorithm SKE={ SKE.Gen (1k), SKE.ENC (), SKE.DE () }, with
Machine equably selects an encryption key ek ← SKE.Gen (1k);
Step 2 is specifically implemented according to the following steps:
Step (2.2) is incited somebody to actionSafely it is sent to user uID, user uIDSecrecy
Step (2.3) is incited somebody to actionIt is safely sent to Serv, Serv is added in its user list U-ComK
Step 3 is specifically implemented according to the following steps:
Step (3.1), input user keyEncryption key ek, random seed s ', document DiAnd its it is crucial
Word listRandomly choose ri∈RZq;
Step 4 is specifically implemented according to the following steps:
Step (4.1), server S erv execution pairIn index Ii *Re-encryption, input user identity uIDAnd reception
It arrivesServ is according to uIDIt is searched in U-ComKIf nothing returns, otherwise recalculateIn
Ii *It must index:
Step (4.2), by Ci=(Encek(Di),Ii) be stored on Serv.
Step 5 is specifically implemented according to the following steps:
Step (5.1), user uIDExecute the search token for being used for generating connection keyword, inputIt s ', s " and to examine
1≤l of keyword position of rope1,…,ld≤ m and corresponding keyword w '1,…,w′d, d is the keyword number of user's search,
Randomly choose random numberIt calculates according to the following formula:
T3=f " (s ", t2);
Step (5.2) will search for token T=(uID,T1,T2,T3,l1,…,ld) it is sent to cloud storage server S erv.
Step 6 is specifically implemented according to the following steps:
Step (6.1), cloud storage server S erv are executed for searching for encrypted document, input search token T=(uID,T1,
T2,T3,l1,…,ld) and ciphertext Ci=(Encek(Di),Ii), Serv is first according to uIDIt is searched in U-ComKIf nothing returns, otherwise Serv initializes empty set Ω;
Step (6.2), to Ci, 1≤i≤n,Judge as inferior whether true:
If so, then Ω=Ω ∪ { Ci, search result Ω is finally sent to user uID, otherwise, the ciphertext and key
Word mismatch continues search for next keyword index Ii+1, search result Ω is finally sent to user uID。
Step 7 is specially:
User uIDThe input symmetric key ek and Ω received is rightCalculate Di=Decek(Ei)。
Step 8 is specially:
User management mechanism UM inputs user identity uID, UM sends revocation user u to cloud storage server S ervIDLife
It enables, Serv executes operationThat is cloud storage service device CSS deletes user uIDNote
Volume project.
The beneficial effects of the invention are as follows, the encryption method that multiple keywords of designated position can search in cloud storage, data
User can be stored in cloud storage service device by after the data encryption of oneself, when needing, can pass through keyword retrieval token
The ciphertext data of needs are retrieved, then download decryption.Meanwhile cloud storage service device is not aware that the keyword of user search,
Ensure the data information privacy of user.By the way that compared with existing scheme, the method for the present invention is communicating and is calculating cost, that is, searches
The overall efficiency of rope trapdoor size, the speed of keyword encryption and search etc. is improved, while the present invention is suitable more
User environment, refer to that can increase and cancel user, and user, which increases, can pass through algorithm Enroll (kUM,uID) realize, user
Revocation can pass through algorithm RevokeUser (uID) realize.
Specific implementation mode
The present invention is described in detail With reference to embodiment.
The encryption method that multiple keywords of designated position can search in cloud storage of the present invention, it is specifically real according to the following steps
It applies:
Step 1, systematic parameter initialization:
It is specifically implemented according to the following steps:
Step (1.1) inputs security parameter k by file encryption person Ent, exports the multiplicative cyclic group that two ranks are prime number q
G1And G2, g1For G1Generation member, g2For G2Generation member;
Step (1.2), selection bilinear map
Two step (1.4), selection pseudo-random functionWith
And arbitrarily select two random seed s ', s " ∈R{0,1}k;
Step (1.5), selection symmetric encipherment algorithm SKE={ SKE.Gen (1k), SKE.ENC (), SKE.DE () }, with
Machine equably selects an encryption key ek ← SKE.Gen (1k);
Step 2, addition user:
It is specifically implemented according to the following steps:
Step (2.2) is incited somebody to actionSafely it is sent to user uID, user uIDSecrecy
Step (2.3) is incited somebody to actionIt is safely sent to Serv, Serv is added in its user list U-ComK
Step 3, file owner generate file encryption and Security Index:
It is specifically implemented according to the following steps:
Step (3.1), input user keyEncryption key ek, random seed s ', document DiAnd its it is crucial
Word listRandomly choose ri∈RZq;
Step 4, server are to indexing re-encryption:
It is specifically implemented according to the following steps:
Step (4.1), server S erv execution pairIn index Ii *Re-encryption, input user identity uIDAnd reception
It arrivesServ is according to uIDIt is searched in U-ComKIf nothing returns, otherwise recalculateIn Ii *
It must index:
Step (4.2), by Ci=(Encek(Di),Ii) be stored on Serv;
The generation of step 5, user about keyword search token:
It is specifically implemented according to the following steps:
Step (5.1), user uIDExecute the search token for being used for generating connection keyword, inputIt s ', s " and to examine
1≤l of keyword position of rope1,…,ld≤ m and corresponding keyword w '1,…,w′d, d is the keyword number of user's search,
Randomly choose random numberIt calculates according to the following formula:
Step (5.2) will search for token T=(uID,T1,T2,T3,l1,…,ld) it is sent to cloud storage server S erv;
The search of step 6, cloud storage service device about ciphertext keyword:
It is specifically implemented according to the following steps:
Step (6.1), cloud storage server S erv are executed for searching for encrypted document, input search token T=(uID,T1,
T2,T3,l1,…,ld) and ciphertext Ci=(Encek(Di),Ii), Serv is first according to uIDIt is searched in U-ComKIf nothing returns, otherwise Serv initializes empty set Ω;
Step (6.2), to Ci, 1≤i≤n,Judge as inferior whether true:
If so, then Ω=Ω ∪ { Ci, search result Ω is finally sent to user uID, otherwise, the ciphertext and key
Word mismatch continues search for next keyword index Ii+1, search result Ω is finally sent to user uID;
The decryption of step 7, user about ciphertext:
Specially:
User uIDThe input symmetric key ek and Ω received is rightCalculate Di=Decek(Ei);
Step 8, revocation user:
Specially:
User management mechanism UM inputs user identity uID, UM sends revocation user u to cloud storage server S ervIDLife
It enables, Serv executes operationThat is cloud storage service device CSS deletes user uIDNote
Volume project.
The safety for the encryption method that can search for below to multiple keywords of designated position in cloud storage of the present invention carries out
Analysis:
It proves:If all data are all generated according to described in the method for the present invention, and if
Wherein 1≤i≤m, 1≤j≤d, then have:
Card is finished
Summary to the present invention:
The encryption method that multiple keywords of designated position can search in cloud storage of the present invention, can be in encrypted data set
It closes and scans for inquiring, specific method is first to generate index set for file set, reuses and can search for encryption to these ropes
Draw to be encrypted and to meet following property to hide index content, and encrypt:1) order of a keyword (indexing) is given
Board can obtain the pointer of the All Files comprising the keyword;2) there is no token, the content of index is hiding;3) only
User with association key could generate token;4) retrieving is other than exposing which file-sharing some keyword,
The specifying information of any relevant document and keyword will not be exposed.Can search for encrypted central role is carried for cloud storage service
For:First, user oneself controls its data;Second is that the security property of data can be verified by Cryptography Principles, rather than pass through
Law, physical equipment determine safety.
The encryption method that multiple keywords of designated position can search in cloud storage of the present invention is used in cloud storage service
Family can use the encipherment scheme that can search for data encryption after, be outsourced to cloud storage service device.Encipherment scheme is can search for make
User can selectively access its ciphertext data, while also ensure that user searches for the confidentiality of data, crucial based on connection
Word (boolean combinations of i.e. multiple keywords) can search for encipherment scheme because its higher search precision is in secure storage service
There is important application value.The present invention successively proposes the encrypted mode of keyword using authorized user and storage server
A kind of encryption method can search for multiple keywords so that authorized user can utilize the trapdoor search encryption text of connection keyword
Shelves.By the way that compared with existing scheme, the scheme of proposition is communicating and is calculating cost, that is, searches for trapdoor size, keyword encryption
With the speed of search, etc. overall efficiency be improved.In addition, the scheme proposed supports multi-user, it can be dynamic
Increase and cancel user so that user can carry out data sharing directly in storage server.
Claims (5)
1. the encryption method that multiple keywords of designated position can search in cloud storage, which is characterized in that specifically according to following step
It is rapid to implement:
Step 1, systematic parameter initialization;
Step 2, addition user, are specifically implemented according to the following steps:
The master key k of step (2.1), input system user administrator UMUM=x and user identity uID∈ U, output user uID's
Key and auxiliary keyHere
Step (2.2) is incited somebody to actionSafely it is sent to user uID, user uIDSecrecy
Step (2.3) is incited somebody to actionIt is safely sent to Serv, Serv is added in its user list U-ComK
Step 3, file owner generate file encryption and Security Index;
Step 4, server are specifically implemented according to the following steps to indexing re-encryption:
Step (4.1), server S erv execution pairIn index Ii *Re-encryption, input user identity uIDWith receiveServ is according to uIDIt is searched in U-ComKIf nothing returns, otherwise recalculateIn Ii *Obtain rope
Draw:
Step (4.2), by Ci=(Encek(Di),Ii) be stored on Serv;
The generation of step 5, user about keyword search token, is specifically implemented according to the following steps:
Step (5.1), user uIDExecute the search token for being used for generating connection keyword, inputIt s ', s " and to be retrieved
1≤l of keyword position1,…,ld≤ m and corresponding keyword w '1,…,w′d, d is the keyword number of user's search, at random
Select random numberIt calculates according to the following formula:
T3=f " (s ", t2);
Step (5.2) will search for token T=(uID,T1,T2,T3,l1,…,ld) it is sent to cloud storage server S erv;
The search of step 6, cloud storage service device about ciphertext keyword, step 6 are specifically implemented according to the following steps:
Step (6.1), cloud storage server S erv are executed for searching for encrypted document, input search token T=(uID,T1,T2,
T3,l1,…,ld) and ciphertext Ci=(Encek(Di),Ii), Serv is first according to uIDIt is searched in U-ComKIf
Nothing then returns, and otherwise Serv initializes empty set Ω;
Step (6.2), to Ci, 1≤i≤n,Judge as inferior whether true:
If so, then Ω=Ω ∪ { Ci, search result Ω is finally sent to user uID, otherwise, the ciphertext and keyword are not
Matching, continues search for next keyword index Ii+1, search result Ω is finally sent to user uID;
The decryption of step 7, user about ciphertext;
Step 8, revocation user.
2. the encryption method that multiple keywords of designated position can search in cloud storage according to claim 1, feature
It is, the step 1 is specifically implemented according to the following steps:
Step (1.1) inputs security parameter k by file encryption person Ent, exports the multiplicative cyclic group G that two ranks are prime number q1With
G2, g1For G1Generation member, g2For G2Generation member;
Step (1.2), selection bilinear map
Step (1.3), uniformly at random selection x ∈ ZqAs the master key of file encryption person Ent, it is denoted asIts
InIt is denoted as mskEnt=x calculates h=g1 x;
Two step (1.4), selection pseudo-random functionWithAnd it is arbitrary
Select two random seed s ', s " ∈R{0,1}k;
Step (1.5), selection symmetric encipherment algorithm SKE={ SKE.Gen (1k), SKE.ENC (), SKE.DE () }, it is random uniform
Ground selects an encryption key ek ← SKE.Gen (1k);
Step (1.6), file encryption personDisclosing systematic parameter isSecrecy system private key is mskEnt=x, with
Machine s ', s " ∈R{0,1}kAnd file encryption key ek.
3. the encryption method that multiple keywords of designated position can search in cloud storage according to claim 1, feature
It is, the step 3 is specifically implemented according to the following steps:
Step (3.1), input user keyEncryption key ek, random seed s ', document DiAnd its lists of keywordsRandomly choose ri∈RZq;
Step (3.2) calculatesWithIt calculates It enablesNoteIt willIt is sent to Cloud Server
Serv。
4. the encryption method that multiple keywords of designated position can search in cloud storage according to claim 1, feature
It is, the step 7 is specially:
User uIDThe input symmetric key ek and Ω received is rightCalculate Di=Decek(Ei)。
5. the encryption method that multiple keywords of designated position can search in cloud storage according to claim 1, feature
It is, the step 8 is specially:
User management mechanism UM inputs user identity uID, UM sends revocation user u to cloud storage server S ervIDOrder,
Serv executes operationThat is cloud storage service device CSS deletes user uIDRegistration entries
Mesh.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510408630.7A CN105049196B (en) | 2015-07-13 | 2015-07-13 | The encryption method that multiple keywords of designated position can search in cloud storage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510408630.7A CN105049196B (en) | 2015-07-13 | 2015-07-13 | The encryption method that multiple keywords of designated position can search in cloud storage |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105049196A CN105049196A (en) | 2015-11-11 |
CN105049196B true CN105049196B (en) | 2018-08-03 |
Family
ID=54455419
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510408630.7A Active CN105049196B (en) | 2015-07-13 | 2015-07-13 | The encryption method that multiple keywords of designated position can search in cloud storage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105049196B (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105897419B (en) * | 2016-03-31 | 2018-12-18 | 浙江工业大学 | A kind of multi-user's dynamic keyword word can search for encryption method |
CN105763324B (en) * | 2016-04-19 | 2019-03-29 | 四川理工学院 | It is controllable to can verify that multi-user end can search for encryption searching method |
CN109496403B (en) * | 2016-07-25 | 2023-06-23 | 罗伯特·博世有限公司 | Method and system for dynamic searchable symmetric encryption with forward privacy and delegated verifiability |
CN106850652B (en) * | 2017-02-21 | 2020-05-26 | 重庆邮电大学 | Arbitration searchable encryption method |
CN107070900B (en) * | 2017-03-23 | 2019-10-11 | 西安电子科技大学 | It can search for re-encryption method based on what is obscured |
CN107634829A (en) * | 2017-09-12 | 2018-01-26 | 南京理工大学 | Encrypted electronic medical records system and encryption method can search for based on attribute |
CN108011713B (en) * | 2017-11-16 | 2020-11-20 | 南京邮电大学 | Ciphertext retrieval method based on homomorphic encryption in cloud storage |
CN108920968B (en) * | 2018-06-29 | 2022-03-18 | 南京理工大学 | File searchable encryption method based on connection keywords |
CN109450935B (en) * | 2018-12-19 | 2021-02-02 | 河南科技大学 | Verifiable semantic security multi-keyword search method in cloud storage |
CN110851481B (en) * | 2019-11-08 | 2022-06-28 | 青岛大学 | Searchable encryption method, device and equipment and readable storage medium |
CN111935141B (en) * | 2020-08-10 | 2022-03-22 | 合肥工业大学 | Single-time inadvertent anti-link query system and method for secret data |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102938767A (en) * | 2012-11-13 | 2013-02-20 | 西安电子科技大学 | Efficient verified fuzzy key word searching method based on cloud data subcontract system |
CN103544301A (en) * | 2013-10-31 | 2014-01-29 | 上海交通大学 | Efficient and safe multi-keyword-supporting searching method in mobile cloud |
CN103873236A (en) * | 2012-12-12 | 2014-06-18 | 华为技术有限公司 | Searchable encryption method and equipment thereof |
CN104021157A (en) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | Method for keyword searchable encryption based on bilinear pairs in cloud storage |
CN104022866A (en) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | Searchable encryption method for multi-user cipher text keyword in cloud storage |
CN104023051A (en) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | Multi-user multi-keyword searchable encryption method in cloud storage |
CN104052740A (en) * | 2014-05-22 | 2014-09-17 | 西安理工大学 | Verifiable and searchable encryption method based on dictionary in cloud storage |
-
2015
- 2015-07-13 CN CN201510408630.7A patent/CN105049196B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102938767A (en) * | 2012-11-13 | 2013-02-20 | 西安电子科技大学 | Efficient verified fuzzy key word searching method based on cloud data subcontract system |
CN103873236A (en) * | 2012-12-12 | 2014-06-18 | 华为技术有限公司 | Searchable encryption method and equipment thereof |
CN103544301A (en) * | 2013-10-31 | 2014-01-29 | 上海交通大学 | Efficient and safe multi-keyword-supporting searching method in mobile cloud |
CN104021157A (en) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | Method for keyword searchable encryption based on bilinear pairs in cloud storage |
CN104022866A (en) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | Searchable encryption method for multi-user cipher text keyword in cloud storage |
CN104023051A (en) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | Multi-user multi-keyword searchable encryption method in cloud storage |
CN104052740A (en) * | 2014-05-22 | 2014-09-17 | 西安理工大学 | Verifiable and searchable encryption method based on dictionary in cloud storage |
Non-Patent Citations (2)
Title |
---|
A Multi-User Searchable Symmetric Encryption Scheme for Cloud Storage System;ZHANG Yaling etc;《IEEE》;20130911;第815-820页 * |
一个高效的基于连接关键词的可搜索加密方案;王尚平等;《电子与信息学报》;20130930;第35卷(第9期);第2266-2271页 * |
Also Published As
Publication number | Publication date |
---|---|
CN105049196A (en) | 2015-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105049196B (en) | The encryption method that multiple keywords of designated position can search in cloud storage | |
CN104021157B (en) | Keyword in cloud storage based on Bilinear map can search for encryption method | |
CN105024802B (en) | Multi-user's multi-key word based on Bilinear map can search for encryption method in cloud storage | |
CN104038349B (en) | Effective and verifiable public key searching encryption method based on KP-ABE | |
CN106127075B (en) | Encryption method can search for based on secret protection under a kind of cloud storage environment | |
CN106330865B (en) | The attribute base keyword searching method efficiently cancelled and cloud computing application system are supported under cloud environment | |
KR101679156B1 (en) | Secure private database querying with content hiding bloom filters | |
CN106407822B (en) | A kind of keyword, multi-key word can search for encryption method and system | |
CN105024812B (en) | The encryption method that can search for of the nominative testing person of identity-based in cloud storage | |
CN104023051A (en) | Multi-user multi-keyword searchable encryption method in cloud storage | |
CN105069358B (en) | Keyword based on the Bloom filters with storage organization can search for encryption method | |
CN108062485A (en) | A kind of fuzzy keyword searching method of multi-service oriented device multi-user | |
CN104022866A (en) | Searchable encryption method for multi-user cipher text keyword in cloud storage | |
CN105915520A (en) | File storage and searching method based on public key searchable encryption, and storage system | |
CN105933281B (en) | A kind of quantum homomorphism symmetrically can search for the method and system of encryption | |
CN105610910A (en) | Cloud storage oriented ciphertext full-text search method and system based on full homomorphic ciphers | |
CN104468121B (en) | The encrypted public key of support multi-key cipher based on given server can search for encryption method | |
CN108171066A (en) | The cross-domain searching method of keyword and system in a kind of medical treatment cloud under secret protection | |
CN108092972A (en) | A kind of more authorization centers can search for encryption method based on attribute | |
CN104052740A (en) | Verifiable and searchable encryption method based on dictionary in cloud storage | |
CN110392038A (en) | The multi-key cipher that can verify that under a kind of multi-user scene can search for encryption method | |
CN114036240A (en) | Multi-service provider private data sharing system and method based on block chain | |
Liu et al. | EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination | |
CN109740378A (en) | A kind of safety of anti-keyword privacy leakage is to index construction and its search method | |
EP3607485A1 (en) | Encrypted search cloud service with cryptographic sharing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20180622 Address after: 528000 4 building, 1 Zhenghe Road, Jinlong residential committee, Chencun Town, Shunde District, Foshan, Guangdong Applicant after: Foshan mingmao Network Technology Co., Ltd. Address before: 710048 No. 5 Jinhua South Road, Shaanxi, Xi'an Applicant before: Xi'an University of Technology |
|
GR01 | Patent grant | ||
GR01 | Patent grant |