CN105049196B - The encryption method that multiple keywords of designated position can search in cloud storage - Google Patents

The encryption method that multiple keywords of designated position can search in cloud storage Download PDF

Info

Publication number
CN105049196B
CN105049196B CN201510408630.7A CN201510408630A CN105049196B CN 105049196 B CN105049196 B CN 105049196B CN 201510408630 A CN201510408630 A CN 201510408630A CN 105049196 B CN105049196 B CN 105049196B
Authority
CN
China
Prior art keywords
user
search
cloud storage
encryption
keyword
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510408630.7A
Other languages
Chinese (zh)
Other versions
CN105049196A (en
Inventor
王尚平
张亚玲
王晓峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan mingmao Network Technology Co., Ltd.
Original Assignee
Foshan Mingmao Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Mingmao Network Technology Co Ltd filed Critical Foshan Mingmao Network Technology Co Ltd
Priority to CN201510408630.7A priority Critical patent/CN105049196B/en
Publication of CN105049196A publication Critical patent/CN105049196A/en
Application granted granted Critical
Publication of CN105049196B publication Critical patent/CN105049196B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses the encryption methods that a kind of multiple keywords of designated position in cloud storage can search for, and are specifically implemented according to the following steps:Step 1, systematic parameter initialization;Step 2, addition user;Step 3, file owner generate file encryption and Security Index;Step 4, server are to indexing re-encryption;The generation of step 5, user about keyword search token;The search of step 6, cloud storage service device about ciphertext keyword;The decryption of step 7, user about ciphertext;Step 8, revocation user, the present invention can not achieve keyword retrieval after solving the problems, such as cloud storage data encryption existing in the prior art.

Description

The encryption method that multiple keywords of designated position can search in cloud storage
Technical field
The invention belongs to field of information security technology, and in particular to multiple keywords of designated position can in a kind of cloud storage The encryption method of search.
Background technology
Cloud computing is capable of providing the various advanced calculating clothes that cost is relatively low, expansible as a kind of new computation model Business, in order to save storage and manage the cost of data, data can be outsourced to cloud storage service device by enterprises and individuals.Cloud storage The data that service provides have the advantages such as availability and reliability, but it also there are one apparent disadvantage, i.e. data do not exist Under the management and control of user, asked for what user urgently paid close attention to then how to safeguard that the confidentiality and integrity of data becomes Topic.
Although what cloud storage service provider (Cloud Storage Service Provider, CSSP) was believed by enterprise can By property, availability, fault-tolerance etc., but people are uncertain about CSSP not by the data of trustship for other purposes;Similarly for For personal user, they wish that the data of oneself can only be accessed by oneself or specified people and cannot be accessed by CSSP.This will Problem of both causing:On the one hand, from the point of view of user, they, which can not find, allows their believable CSSP completely to store With their data of management;On the other hand it from the point of view of CSSP, will be lost in the case where not solving the above problems big The client of amount.Therefore, the confidentiality of data and integrality will hinder the popularization and use of cloud storage.
In view of above practical problem, data must be encrypted before being transferred to CSSP by user oneself in cloud storage, and And can only be also decrypted by user oneself, the danger of user data leakage will be mitigated in this way.But this will introduce one it is new Problem obtains data that they want simultaneously if user needs the document for including some keyword then whether user can be quickly Ensure confidentiality of the data to CSSP
Invention content
The object of the present invention is to provide the encryption method that a kind of multiple keywords of designated position in cloud storage can search for, solutions It has determined the problem of can not achieve keyword retrieval after cloud storage data encryption existing in the prior art.
The technical solution adopted in the present invention is the encryption side that multiple keywords of designated position can search in cloud storage Method is specifically implemented according to the following steps:
Step 1, systematic parameter initialization;
Step 2, addition user;
Step 3, file owner generate file encryption and Security Index;
Step 4, server are to indexing re-encryption;
The generation of step 5, user about keyword search token;
The search of step 6, cloud storage service device about ciphertext keyword;
The decryption of step 7, user about ciphertext;
Step 8, revocation user.
The features of the present invention also characterized in that
Step 1 is specifically implemented according to the following steps:
Step (1.1) inputs security parameter k by file encryption person Ent, exports the multiplicative cyclic group that two ranks are prime number q G1And G2, g1For G1Generation member, g2For G2Generation member;
Step (1.2), selection bilinear map
Two step (1.4), selection pseudo-random functionWith And arbitrarily select two random seed s ', s " ∈R{0,1}k
Step (1.5), selection symmetric encipherment algorithm SKE={ SKE.Gen (1k), SKE.ENC (), SKE.DE () }, with Machine equably selects an encryption key ek ← SKE.Gen (1k);
Step 2 is specifically implemented according to the following steps:
Step (2.2) is incited somebody to actionSafely it is sent to user uID, user uIDSecrecy
Step (2.3) is incited somebody to actionIt is safely sent to Serv, Serv is added in its user list U-ComK
Step 3 is specifically implemented according to the following steps:
Step (3.1), input user keyEncryption key ek, random seed s ', document DiAnd its it is crucial Word listRandomly choose riRZq
Step 4 is specifically implemented according to the following steps:
Step (4.1), server S erv execution pairIn index Ii *Re-encryption, input user identity uIDAnd reception It arrivesServ is according to uIDIt is searched in U-ComKIf nothing returns, otherwise recalculateIn Ii *It must index:
Step (4.2), by Ci=(Encek(Di),Ii) be stored on Serv.
Step 5 is specifically implemented according to the following steps:
Step (5.1), user uIDExecute the search token for being used for generating connection keyword, inputIt s ', s " and to examine 1≤l of keyword position of rope1,…,ld≤ m and corresponding keyword w '1,…,w′d, d is the keyword number of user's search, Randomly choose random numberIt calculates according to the following formula:
T3=f " (s ", t2);
Step (5.2) will search for token T=(uID,T1,T2,T3,l1,…,ld) it is sent to cloud storage server S erv.
Step 6 is specifically implemented according to the following steps:
Step (6.1), cloud storage server S erv are executed for searching for encrypted document, input search token T=(uID,T1, T2,T3,l1,…,ld) and ciphertext Ci=(Encek(Di),Ii), Serv is first according to uIDIt is searched in U-ComKIf nothing returns, otherwise Serv initializes empty set Ω;
Step (6.2), to Ci, 1≤i≤n,Judge as inferior whether true:
If so, then Ω=Ω ∪ { Ci, search result Ω is finally sent to user uID, otherwise, the ciphertext and key Word mismatch continues search for next keyword index Ii+1, search result Ω is finally sent to user uID
Step 7 is specially:
User uIDThe input symmetric key ek and Ω received is rightCalculate Di=Decek(Ei)。
Step 8 is specially:
User management mechanism UM inputs user identity uID, UM sends revocation user u to cloud storage server S ervIDLife It enables, Serv executes operationThat is cloud storage service device CSS deletes user uIDNote Volume project.
The beneficial effects of the invention are as follows, the encryption method that multiple keywords of designated position can search in cloud storage, data User can be stored in cloud storage service device by after the data encryption of oneself, when needing, can pass through keyword retrieval token The ciphertext data of needs are retrieved, then download decryption.Meanwhile cloud storage service device is not aware that the keyword of user search, Ensure the data information privacy of user.By the way that compared with existing scheme, the method for the present invention is communicating and is calculating cost, that is, searches The overall efficiency of rope trapdoor size, the speed of keyword encryption and search etc. is improved, while the present invention is suitable more User environment, refer to that can increase and cancel user, and user, which increases, can pass through algorithm Enroll (kUM,uID) realize, user Revocation can pass through algorithm RevokeUser (uID) realize.
Specific implementation mode
The present invention is described in detail With reference to embodiment.
The encryption method that multiple keywords of designated position can search in cloud storage of the present invention, it is specifically real according to the following steps It applies:
Step 1, systematic parameter initialization:
It is specifically implemented according to the following steps:
Step (1.1) inputs security parameter k by file encryption person Ent, exports the multiplicative cyclic group that two ranks are prime number q G1And G2, g1For G1Generation member, g2For G2Generation member;
Step (1.2), selection bilinear map
Two step (1.4), selection pseudo-random functionWith And arbitrarily select two random seed s ', s " ∈R{0,1}k
Step (1.5), selection symmetric encipherment algorithm SKE={ SKE.Gen (1k), SKE.ENC (), SKE.DE () }, with Machine equably selects an encryption key ek ← SKE.Gen (1k);
Step 2, addition user:
It is specifically implemented according to the following steps:
Step (2.2) is incited somebody to actionSafely it is sent to user uID, user uIDSecrecy
Step (2.3) is incited somebody to actionIt is safely sent to Serv, Serv is added in its user list U-ComK
Step 3, file owner generate file encryption and Security Index:
It is specifically implemented according to the following steps:
Step (3.1), input user keyEncryption key ek, random seed s ', document DiAnd its it is crucial Word listRandomly choose riRZq
Step 4, server are to indexing re-encryption:
It is specifically implemented according to the following steps:
Step (4.1), server S erv execution pairIn index Ii *Re-encryption, input user identity uIDAnd reception It arrivesServ is according to uIDIt is searched in U-ComKIf nothing returns, otherwise recalculateIn Ii * It must index:
Step (4.2), by Ci=(Encek(Di),Ii) be stored on Serv;
The generation of step 5, user about keyword search token:
It is specifically implemented according to the following steps:
Step (5.1), user uIDExecute the search token for being used for generating connection keyword, inputIt s ', s " and to examine 1≤l of keyword position of rope1,…,ld≤ m and corresponding keyword w '1,…,w′d, d is the keyword number of user's search, Randomly choose random numberIt calculates according to the following formula:
Step (5.2) will search for token T=(uID,T1,T2,T3,l1,…,ld) it is sent to cloud storage server S erv;
The search of step 6, cloud storage service device about ciphertext keyword:
It is specifically implemented according to the following steps:
Step (6.1), cloud storage server S erv are executed for searching for encrypted document, input search token T=(uID,T1, T2,T3,l1,…,ld) and ciphertext Ci=(Encek(Di),Ii), Serv is first according to uIDIt is searched in U-ComKIf nothing returns, otherwise Serv initializes empty set Ω;
Step (6.2), to Ci, 1≤i≤n,Judge as inferior whether true:
If so, then Ω=Ω ∪ { Ci, search result Ω is finally sent to user uID, otherwise, the ciphertext and key Word mismatch continues search for next keyword index Ii+1, search result Ω is finally sent to user uID
The decryption of step 7, user about ciphertext:
Specially:
User uIDThe input symmetric key ek and Ω received is rightCalculate Di=Decek(Ei);
Step 8, revocation user:
Specially:
User management mechanism UM inputs user identity uID, UM sends revocation user u to cloud storage server S ervIDLife It enables, Serv executes operationThat is cloud storage service device CSS deletes user uIDNote Volume project.
The safety for the encryption method that can search for below to multiple keywords of designated position in cloud storage of the present invention carries out Analysis:
It proves:If all data are all generated according to described in the method for the present invention, and if Wherein 1≤i≤m, 1≤j≤d, then have:
Card is finished
Summary to the present invention:
The encryption method that multiple keywords of designated position can search in cloud storage of the present invention, can be in encrypted data set It closes and scans for inquiring, specific method is first to generate index set for file set, reuses and can search for encryption to these ropes Draw to be encrypted and to meet following property to hide index content, and encrypt:1) order of a keyword (indexing) is given Board can obtain the pointer of the All Files comprising the keyword;2) there is no token, the content of index is hiding;3) only User with association key could generate token;4) retrieving is other than exposing which file-sharing some keyword, The specifying information of any relevant document and keyword will not be exposed.Can search for encrypted central role is carried for cloud storage service For:First, user oneself controls its data;Second is that the security property of data can be verified by Cryptography Principles, rather than pass through Law, physical equipment determine safety.
The encryption method that multiple keywords of designated position can search in cloud storage of the present invention is used in cloud storage service Family can use the encipherment scheme that can search for data encryption after, be outsourced to cloud storage service device.Encipherment scheme is can search for make User can selectively access its ciphertext data, while also ensure that user searches for the confidentiality of data, crucial based on connection Word (boolean combinations of i.e. multiple keywords) can search for encipherment scheme because its higher search precision is in secure storage service There is important application value.The present invention successively proposes the encrypted mode of keyword using authorized user and storage server A kind of encryption method can search for multiple keywords so that authorized user can utilize the trapdoor search encryption text of connection keyword Shelves.By the way that compared with existing scheme, the scheme of proposition is communicating and is calculating cost, that is, searches for trapdoor size, keyword encryption With the speed of search, etc. overall efficiency be improved.In addition, the scheme proposed supports multi-user, it can be dynamic Increase and cancel user so that user can carry out data sharing directly in storage server.

Claims (5)

1. the encryption method that multiple keywords of designated position can search in cloud storage, which is characterized in that specifically according to following step It is rapid to implement:
Step 1, systematic parameter initialization;
Step 2, addition user, are specifically implemented according to the following steps:
The master key k of step (2.1), input system user administrator UMUM=x and user identity uID∈ U, output user uID's Key and auxiliary keyHere
Step (2.2) is incited somebody to actionSafely it is sent to user uID, user uIDSecrecy
Step (2.3) is incited somebody to actionIt is safely sent to Serv, Serv is added in its user list U-ComK
Step 3, file owner generate file encryption and Security Index;
Step 4, server are specifically implemented according to the following steps to indexing re-encryption:
Step (4.1), server S erv execution pairIn index Ii *Re-encryption, input user identity uIDWith receiveServ is according to uIDIt is searched in U-ComKIf nothing returns, otherwise recalculateIn Ii *Obtain rope Draw:
Step (4.2), by Ci=(Encek(Di),Ii) be stored on Serv;
The generation of step 5, user about keyword search token, is specifically implemented according to the following steps:
Step (5.1), user uIDExecute the search token for being used for generating connection keyword, inputIt s ', s " and to be retrieved 1≤l of keyword position1,…,ld≤ m and corresponding keyword w '1,…,w′d, d is the keyword number of user's search, at random Select random numberIt calculates according to the following formula:
T3=f " (s ", t2);
Step (5.2) will search for token T=(uID,T1,T2,T3,l1,…,ld) it is sent to cloud storage server S erv;
The search of step 6, cloud storage service device about ciphertext keyword, step 6 are specifically implemented according to the following steps:
Step (6.1), cloud storage server S erv are executed for searching for encrypted document, input search token T=(uID,T1,T2, T3,l1,…,ld) and ciphertext Ci=(Encek(Di),Ii), Serv is first according to uIDIt is searched in U-ComKIf Nothing then returns, and otherwise Serv initializes empty set Ω;
Step (6.2), to Ci, 1≤i≤n,Judge as inferior whether true:
If so, then Ω=Ω ∪ { Ci, search result Ω is finally sent to user uID, otherwise, the ciphertext and keyword are not Matching, continues search for next keyword index Ii+1, search result Ω is finally sent to user uID
The decryption of step 7, user about ciphertext;
Step 8, revocation user.
2. the encryption method that multiple keywords of designated position can search in cloud storage according to claim 1, feature It is, the step 1 is specifically implemented according to the following steps:
Step (1.1) inputs security parameter k by file encryption person Ent, exports the multiplicative cyclic group G that two ranks are prime number q1With G2, g1For G1Generation member, g2For G2Generation member;
Step (1.2), selection bilinear map
Step (1.3), uniformly at random selection x ∈ ZqAs the master key of file encryption person Ent, it is denoted asIts InIt is denoted as mskEnt=x calculates h=g1 x
Two step (1.4), selection pseudo-random functionWithAnd it is arbitrary Select two random seed s ', s " ∈R{0,1}k
Step (1.5), selection symmetric encipherment algorithm SKE={ SKE.Gen (1k), SKE.ENC (), SKE.DE () }, it is random uniform Ground selects an encryption key ek ← SKE.Gen (1k);
Step (1.6), file encryption personDisclosing systematic parameter isSecrecy system private key is mskEnt=x, with Machine s ', s " ∈R{0,1}kAnd file encryption key ek.
3. the encryption method that multiple keywords of designated position can search in cloud storage according to claim 1, feature It is, the step 3 is specifically implemented according to the following steps:
Step (3.1), input user keyEncryption key ek, random seed s ', document DiAnd its lists of keywordsRandomly choose riRZq
Step (3.2) calculatesWithIt calculates It enablesNoteIt willIt is sent to Cloud Server Serv。
4. the encryption method that multiple keywords of designated position can search in cloud storage according to claim 1, feature It is, the step 7 is specially:
User uIDThe input symmetric key ek and Ω received is rightCalculate Di=Decek(Ei)。
5. the encryption method that multiple keywords of designated position can search in cloud storage according to claim 1, feature It is, the step 8 is specially:
User management mechanism UM inputs user identity uID, UM sends revocation user u to cloud storage server S ervIDOrder, Serv executes operationThat is cloud storage service device CSS deletes user uIDRegistration entries Mesh.
CN201510408630.7A 2015-07-13 2015-07-13 The encryption method that multiple keywords of designated position can search in cloud storage Active CN105049196B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510408630.7A CN105049196B (en) 2015-07-13 2015-07-13 The encryption method that multiple keywords of designated position can search in cloud storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510408630.7A CN105049196B (en) 2015-07-13 2015-07-13 The encryption method that multiple keywords of designated position can search in cloud storage

Publications (2)

Publication Number Publication Date
CN105049196A CN105049196A (en) 2015-11-11
CN105049196B true CN105049196B (en) 2018-08-03

Family

ID=54455419

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510408630.7A Active CN105049196B (en) 2015-07-13 2015-07-13 The encryption method that multiple keywords of designated position can search in cloud storage

Country Status (1)

Country Link
CN (1) CN105049196B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105897419B (en) * 2016-03-31 2018-12-18 浙江工业大学 A kind of multi-user's dynamic keyword word can search for encryption method
CN105763324B (en) * 2016-04-19 2019-03-29 四川理工学院 It is controllable to can verify that multi-user end can search for encryption searching method
CN109496403B (en) * 2016-07-25 2023-06-23 罗伯特·博世有限公司 Method and system for dynamic searchable symmetric encryption with forward privacy and delegated verifiability
CN106850652B (en) * 2017-02-21 2020-05-26 重庆邮电大学 Arbitration searchable encryption method
CN107070900B (en) * 2017-03-23 2019-10-11 西安电子科技大学 It can search for re-encryption method based on what is obscured
CN107634829A (en) * 2017-09-12 2018-01-26 南京理工大学 Encrypted electronic medical records system and encryption method can search for based on attribute
CN108011713B (en) * 2017-11-16 2020-11-20 南京邮电大学 Ciphertext retrieval method based on homomorphic encryption in cloud storage
CN108920968B (en) * 2018-06-29 2022-03-18 南京理工大学 File searchable encryption method based on connection keywords
CN109450935B (en) * 2018-12-19 2021-02-02 河南科技大学 Verifiable semantic security multi-keyword search method in cloud storage
CN110851481B (en) * 2019-11-08 2022-06-28 青岛大学 Searchable encryption method, device and equipment and readable storage medium
CN111935141B (en) * 2020-08-10 2022-03-22 合肥工业大学 Single-time inadvertent anti-link query system and method for secret data

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102938767A (en) * 2012-11-13 2013-02-20 西安电子科技大学 Efficient verified fuzzy key word searching method based on cloud data subcontract system
CN103544301A (en) * 2013-10-31 2014-01-29 上海交通大学 Efficient and safe multi-keyword-supporting searching method in mobile cloud
CN103873236A (en) * 2012-12-12 2014-06-18 华为技术有限公司 Searchable encryption method and equipment thereof
CN104021157A (en) * 2014-05-22 2014-09-03 西安理工大学 Method for keyword searchable encryption based on bilinear pairs in cloud storage
CN104022866A (en) * 2014-05-22 2014-09-03 西安理工大学 Searchable encryption method for multi-user cipher text keyword in cloud storage
CN104023051A (en) * 2014-05-22 2014-09-03 西安理工大学 Multi-user multi-keyword searchable encryption method in cloud storage
CN104052740A (en) * 2014-05-22 2014-09-17 西安理工大学 Verifiable and searchable encryption method based on dictionary in cloud storage

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102938767A (en) * 2012-11-13 2013-02-20 西安电子科技大学 Efficient verified fuzzy key word searching method based on cloud data subcontract system
CN103873236A (en) * 2012-12-12 2014-06-18 华为技术有限公司 Searchable encryption method and equipment thereof
CN103544301A (en) * 2013-10-31 2014-01-29 上海交通大学 Efficient and safe multi-keyword-supporting searching method in mobile cloud
CN104021157A (en) * 2014-05-22 2014-09-03 西安理工大学 Method for keyword searchable encryption based on bilinear pairs in cloud storage
CN104022866A (en) * 2014-05-22 2014-09-03 西安理工大学 Searchable encryption method for multi-user cipher text keyword in cloud storage
CN104023051A (en) * 2014-05-22 2014-09-03 西安理工大学 Multi-user multi-keyword searchable encryption method in cloud storage
CN104052740A (en) * 2014-05-22 2014-09-17 西安理工大学 Verifiable and searchable encryption method based on dictionary in cloud storage

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A Multi-User Searchable Symmetric Encryption Scheme for Cloud Storage System;ZHANG Yaling etc;《IEEE》;20130911;第815-820页 *
一个高效的基于连接关键词的可搜索加密方案;王尚平等;《电子与信息学报》;20130930;第35卷(第9期);第2266-2271页 *

Also Published As

Publication number Publication date
CN105049196A (en) 2015-11-11

Similar Documents

Publication Publication Date Title
CN105049196B (en) The encryption method that multiple keywords of designated position can search in cloud storage
CN104021157B (en) Keyword in cloud storage based on Bilinear map can search for encryption method
CN105024802B (en) Multi-user's multi-key word based on Bilinear map can search for encryption method in cloud storage
CN104038349B (en) Effective and verifiable public key searching encryption method based on KP-ABE
CN106127075B (en) Encryption method can search for based on secret protection under a kind of cloud storage environment
CN106330865B (en) The attribute base keyword searching method efficiently cancelled and cloud computing application system are supported under cloud environment
KR101679156B1 (en) Secure private database querying with content hiding bloom filters
CN106407822B (en) A kind of keyword, multi-key word can search for encryption method and system
CN105024812B (en) The encryption method that can search for of the nominative testing person of identity-based in cloud storage
CN104023051A (en) Multi-user multi-keyword searchable encryption method in cloud storage
CN105069358B (en) Keyword based on the Bloom filters with storage organization can search for encryption method
CN108062485A (en) A kind of fuzzy keyword searching method of multi-service oriented device multi-user
CN104022866A (en) Searchable encryption method for multi-user cipher text keyword in cloud storage
CN105915520A (en) File storage and searching method based on public key searchable encryption, and storage system
CN105933281B (en) A kind of quantum homomorphism symmetrically can search for the method and system of encryption
CN105610910A (en) Cloud storage oriented ciphertext full-text search method and system based on full homomorphic ciphers
CN104468121B (en) The encrypted public key of support multi-key cipher based on given server can search for encryption method
CN108171066A (en) The cross-domain searching method of keyword and system in a kind of medical treatment cloud under secret protection
CN108092972A (en) A kind of more authorization centers can search for encryption method based on attribute
CN104052740A (en) Verifiable and searchable encryption method based on dictionary in cloud storage
CN110392038A (en) The multi-key cipher that can verify that under a kind of multi-user scene can search for encryption method
CN114036240A (en) Multi-service provider private data sharing system and method based on block chain
Liu et al. EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination
CN109740378A (en) A kind of safety of anti-keyword privacy leakage is to index construction and its search method
EP3607485A1 (en) Encrypted search cloud service with cryptographic sharing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20180622

Address after: 528000 4 building, 1 Zhenghe Road, Jinlong residential committee, Chencun Town, Shunde District, Foshan, Guangdong

Applicant after: Foshan mingmao Network Technology Co., Ltd.

Address before: 710048 No. 5 Jinhua South Road, Shaanxi, Xi'an

Applicant before: Xi'an University of Technology

GR01 Patent grant
GR01 Patent grant