CN105848139A - Location-based privacy protection inquiring and processing method facing mobile cloud platform - Google Patents
Location-based privacy protection inquiring and processing method facing mobile cloud platform Download PDFInfo
- Publication number
- CN105848139A CN105848139A CN201610153059.3A CN201610153059A CN105848139A CN 105848139 A CN105848139 A CN 105848139A CN 201610153059 A CN201610153059 A CN 201610153059A CN 105848139 A CN105848139 A CN 105848139A
- Authority
- CN
- China
- Prior art keywords
- user
- data
- encryption
- key
- cloud platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a location-based privacy protection inquiring and processing method facing a mobile cloud platform. The method sequentially comprises the following steps: system initialization, data main location encryption, user key generation, user key authentication, user location encryption, distance calculation, distance comparison and inquired result obtaining. In the method, based on a location inquiring processing process, under a condition that data main location information and data user location information are not exposed, a mobile cloud service provider handles operation requests of distance calculation and distance comparison to obtain a ciphertext result, and then sends the ciphertext result to a data user, and finally only a legal user can obtain a plaintext result, so that in the process, the method provided by the invention fully utilizes cloud computing resources, and the data user can obtain a service only by a few of the computing resources.
Description
Technical field
The present invention relates to privacy protection processing technology based on position enquiring in mobile cloud platform, be specifically related to one
Towards mobile cloud platform location-based secret protection inquiry processing method.
Background technology
Along with social networks and smart mobile phone end move the fast development of cloud, increasing user is had to use intelligence
Mobile phone records life, and these record data are saved in mobile high in the clouds.It is noted here that these
The record the most embedded positional information of data, because the built-in GPS module of smart mobile phone, has the most powerful position
Put information obtaining ability.Camera function such as smart mobile phone.So commonly using along with mobile cloud, interior in a large number
The data of seated position information are collected beyond the clouds, and this is just for bring abundant basic data based on position enquiring service
Storehouse, brings facility to the life of people., mobile cloud service provider is incredible, and position is originally
Body contains bulk information, it is easy to expose the individual privacy of user.For the angle of data master, he is by this
After a little positional informationes upload to high in the clouds, it is desirable to position is maintained secrecy, and only specific user just can get
Positional information and proposition location-based inquiry service.For the angle of user, he wishes do not sticking one's chin out
In the case of positional information, just can enjoy the location-based inquiry service that mobile cloud service provider provides,
And oneself need not spend too many calculation cost.Therefore, current problem demanding prompt solution is summarized as follows:
(1) fine-grained access privilege control: data storage of mainly seeking survival is that maintain secrecy can not to the positional information in high in the clouds
Seeing, only main those users specified of data just can get clear and definite positional information;
(2) efficiently and the distance of secret protection calculates and compares: in location-based inquiry, distance calculate and
It is relatively two most basic functions.Advocate peace the position of data user except requiring not expose during calculating data
Outside information, it is also contemplated that to the calculation cost problem of user.Because the communication that the user in mobile high in the clouds commonly uses
Instrument is mobile phone, and computing capability ratio is relatively low, and communication cost is higher.
The secret protection serviced based on position enquiring about mobile high in the clouds processes problem, and industry has carried out exerting in a large number
Power, gives attribute base encryption technology, homomorphic encryption algorithm and location-based secret protection vlan query protocol VLAN, but
It is that these methods existing all exist defect more or less, such as: (1) decryption time is the highest and cannot solve
Actual application problem, and in most of the cases, some application only need several addition or multiplication operation to solve
Certainly;(2) it is not suitable for solving based on the Privacy Protection in position enquiring;(3) only non-when user density
When often height and user behavior pattern are unpredictable, this technology could protect privacy of user;(4) data are advocated peace data
Need mutual frequently between user, cause their calculation cost and communication cost the highest ...
In sum, and for mobile cloud platform, most of users use smart mobile phone to access social networks,
Its computing capability and communication capacity are all limited.
Summary of the invention
Goal of the invention: it is an object of the invention to solve the deficiencies in the prior art, it is provided that a kind of towards shifting
Dynamic cloud platform location-based secret protection inquiry processing method, i.e. a kind of advocates peace data user position letter in data
The method for safely carrying out that distance on breath calculates and distance compares.
Technical scheme: the one of the present invention is towards mobile cloud platform location-based secret protection query processing side
Method, comprises the following steps successively:
(1) system initialization;
(2) data master site encryption;
(3) user key generates;
(4) user key checking;
(5) customer location encryption;
(6) distance calculates;
(7) distance compares;
(8) Query Result obtains.
Further, in described step (1), the detailed process of system initialization is:
Believable authoritative institution TA selects and announces an exponent number is p, and producing unit is g0Bilinear Groups G0, secret
Thickly produce a random number v0 ∈ Zp, based on above parameter, master key and PKI at authoritative institution's TA calculating,
Master keyAnd PKI
Further, in described step (2), the detailed process of data master site encryption is:
(21) first data master produces encryption key K for encrypting its positional information y=(y1,y2), data master is random
And produce two Big prime ρ in confidence1And ρ2, calculate n=ρ1·ρ2, φ (n)=(ρ1-1)(ρ2-1);
(22) select a positive number g relatively prime with n, and two secret positive number m, x < n is denoted as K 'y=<m, x>,
The encryption key of data master is Ky, it is calculated as Ky=gen (K 'y)=mg(x modφ(n))modn;
(23) positional information after data main encryption is designated as ye=(ye1,ye2), it is calculated as follows:
(24) data main definition access rights tree is Tp, and to each node x in tree, all define a multinomial
qx, its exponent number dx=tx-1, txBeing the threshold value of node x, if node x is and door, then tx is node x
Child nodes number, if or door, then tx is 1, the total number of general 1≤tx≤child nodes;
From the beginning of root node R, the raw random number s ∈ Z of data main productp, and q is setR(0)=s, then selects it
His numerical value makes, for any other node x, have qx(0)=qparent(x)(index (x)), wherein parent (x)
It it is the father node of x;Then, calculating auxiliary ciphertext AC is
Wherein
KAC=< m Ys,x+Ys>;
AC is auxiliary ciphertext, is used for realizing the access privilege control of positional information;KACIt is stored in assisting close
Key form in literary composition, C, CiAnd Ci' represent some ciphertext parameters of attribute, AttTIt is authority tree TpIn
Attribute node set, att (i) represents the property value that attribute node i is stored, and H () is hash function;
(25) last, data chief commander (ye, AC) upload to mobile high in the clouds together and store.
Further, the specific operation process that in described step (3), user key generates is:
When there being new user to ask addition system, this user is by its property set AQIt is sent to TA, TA and uses step
(1) PKI and the master key that produce in calculate and this user property collection AQClosely-related private key SKQ, so
After by this private key SKQIt is sent to this user;
Wherein,
d0,ri∈ZpIt is random number, AQIt it is the property set of user.
Further, in described step (4), the specific operation process of user key checking is:
User obtains the private key SK produced by step (3)Q, the then PKI PK of joint step (1) and step
Suddenly auxiliary ciphertext AC of (2), is calculated secret parameter Ys;
Wherein, user defines iteration function DecryptNode (AC, a SKQ, x), x is the node in tree;
If the property set of user meets the authority tree of the main definition of data, then start to call from root node R
DecryptNode(AC,SKQ, R), this iteration function will provide an effective outputOtherwise it is output as sky;By calculatingObtain secret parameter Ys。
Further, in described step (5), the detailed process of customer location encryption is as follows:
The positional information assuming user is x=(x1,x2), user utilizes calculated secret ginseng in step (4)
Number YsEncrypting its positional information, this secret parameter is designated as △=Ys, position computations is as follows:
xe=(xe1,xe2)
=(x1,x2)·△·g△
=(x1·△·g△,x2·△·g△)
If whether user inquires about both distances less than τ, then also need to be encrypted comparing parameter τ.
Further, the concrete steps that in described step (6), distance calculates:
First cloud service provider obtains the key of encryption from the auxiliary ciphertext that data Your Majesty passes
KAC=< m ', x ' >, utilizes KAC to calculate K 'AC=m ' gx′Modn, then obtains data and advocates peace the encryption of user
Distance between positional information, calculation is
Further, the concrete steps that in described step (7), distance compares:
The range information that cloud service provider is encrypted according to step (6) gained, directly with the standard of comparison encrypted
Parameter τe=τ △ g△Carry out the comparison of size, i.e. dise-τeWhether≤0 set up, and directly exports comparative result.
Further, the concrete steps that in described step (8), Query Result obtains:
If user's request is distance comparison query, directly Query Result can be obtained from step (7);If request
Be that distance calculates inquiry, use step (4) secret parameter Y that producessStep (6) is produced encryption
Distance results is decrypted calculating, available distance value i.e. dis=dis in plain texte·(△·g△)-1。
Beneficial effect: compared with prior art, the invention have the advantages that
(1) present invention propose one very useful towards mobile cloud platform service based on position enquiring mould
Type, and extract the primary demand of system user.
(2) present invention is on the basis of RSA Algorithm, the key group of two parameters of the employing position to data master
Information is encrypted, and the secret parameter then utilizing CPABE technology to produce is encrypted camouflage to this key group,
Make the most legal user could obtain decruption key.
(3) RSA Algorithm is transformed by the present invention so that new AES can be supported to add well
Distance on close positional information calculates and distance compares operation, thus takes full advantage of the calculating in mobile high in the clouds
Resource, greatly reduces calculation cost and the communication cost of user mobile phone end, and significantly improves query processing
Efficiency.
Shown on Zong, in the present invention handling process based on position enquiring can not expose data advocate peace data use
In the case of the positional information of family, mobile cloud service provider process distance calculating and distance compares operation and asks
Asking, obtain ciphertext result, be subsequently transmitted to data user, the most legal data user could obtain
To result in plain text.
Accompanying drawing explanation
Fig. 1 is the disposed of in its entirety flow chart of the present invention;
Fig. 2 is the service model schematic diagram of the present invention;
Fig. 3 is access rights tree schematic diagram in implementing.
Detailed description of the invention
Below technical solution of the present invention is described in detail, but protection scope of the present invention is not limited to described
Embodiment.
As shown in Figure 1 to Figure 3, the one of the present invention is towards mobile cloud platform location-based secret protection Directory Enquiries
Reason method, includes eight steps: the encryption of system initialization, data master site, key generate, Yong Humi successively
Key checking, customer location encryption, distance calculating, distance compare and Query Result acquisition, are embodied as step such as
Shown in lower:
Step one, system initialization:
One believable authoritative institution TA selects and announces an exponent number to be p, and producing unit is g0Bilinear Groups
G0, produce a random number v the most in confidence0∈Zp.Based on these parameters, TA calculates master key
And PKI
Step 2, data master site are encrypted:
The positional information randomly generating data master is y=(18308031,46804031), specifically comprises the following steps that
(21) data master produces two Big prime ρ at random and in confidence1=9857 and ρ2=4783, calculate
N=ρ1·ρ2=47146031, φ (n)=(ρ1-1)(ρ2-1)=47131392.
(22) select a positive number g=5599 relatively prime with n, and two secret positive number m, x < n is denoted as
K′y=< m, x >=< 69,3401 >.The encryption key K of data masteryIt is calculated as
Ky=gen (K 'y)=mg(x modφ(n))Modn=2519503053.
(23) positional information after data main encryption is designated as ye=(ye1,ye2)=(30214506,7328596).
(24) data main definition access rights tree is TpAs it is shown on figure 3, then, calculating auxiliary ciphertext AC is
Wherein, KAC=< m Ys,x+Ys>=< 19825887,6440215 >, Ys=6436814.
(25) last, data chief commander (ye, AC) upload to mobile high in the clouds together and store.
Step 3, user key generate:
One American friend request of data master accesses the positional information of data master, and by its property set
AQ={ American, Friend} are sent to TA, TA and use PKI and master key to calculate and this user property
Collect closely-related private key SKQ, such as following formula:
Wherein, d0,ri∈ZpIt is random number, AQIt it is the property set of user.Last TA is by this private key SKQSend
To this user;
Step 4, user key are verified:
(41) user defines iteration function DecryptNode (AC, SKQ, x), wherein x is authority tree TpIn one
Individual node.If the property set of user meets the authority tree of the main definition of data, then call from root node
DecryptNode(AC,SKQ, R), available
(42) by calculatingObtain secret parameter Ys=6436814.
Step 5, (customer location encryption):
The positional information randomly generating user is x=(42232704,32788893), and user utilizes gained secret to join
Number YsEncrypting its positional information, this secret parameter is designated as △=Ys, position computations is as follows:
xe=(3573600,1434994)
If whether both user's requesting queries distance is less than τ=56500, then also need to be encrypted as τ
τe=544183253000.
Step 6, distance calculate:
First cloud service provider obtains the key K of encryption from the auxiliary ciphertext that data Your Majesty passesAC, utilize KAC
Calculate data advocate peace user encryption position information between distance, for dise=325920875836518.
Step 7, distance compare:
Cloud service provider compares diseWith τeSize, for dise>τe, both distances can be obtained 56500
In unit distance.
Step 8, Query Result obtain:
If user's request is distance comparison query, Query Result directly can be obtained from step 7;If request
Being that distance calculates inquiry, the ciphertext result that step 6 is obtained by the secret parameter using step 4 to produce is decrypted
Calculate, available distance value in plain text, i.e. dis=dise·(△·g△)-1=33838839.
In said process, distance calculates, and distance compares the time cost spent with Query Result acquisition and is respectively
1.1074ms, 1.1752ms and 0.13171ms.
Claims (9)
1. one kind towards mobile cloud platform location-based secret protection inquiry processing method, it is characterised in that:
Comprise the following steps successively:
(1) system initialization;
(2) data master site encryption;
(3) user key generates;
(4) user key checking;
(5) customer location encryption;
(6) distance calculates;
(7) distance compares;
(8) Query Result obtains.
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side
Method, it is characterised in that: in described step (1), the detailed process of system initialization is:
Believable authoritative institution TA selects and announces an exponent number is p, and producing unit is g0Bilinear Groups G0, secret
Thickly produce a random number v0 ∈ Zp, based on above parameter, master key and PKI at authoritative institution's TA calculating,
Master keyAnd PKI
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side
Method, it is characterised in that: in described step (2), the detailed process of data master site encryption is:
(21) first data master produces encryption key K for encrypting its positional information y=(y1,y2), data master with
Machine and in confidence two Big prime ρ of generation1And ρ2, calculate n=ρ1·ρ2, φ (n)=(ρ1-1)(ρ2-1);
Wherein, y1Represent longitude, y2Represent latitude;
(22) a positive number g relatively prime with n and two secret positive number m and x is selected, and m, x < n, note
It is K 'y=< m, x >, the encryption key of data master is Ky, it is calculated as Ky=gen (K 'y)=mg(xmodφ(n))modn;
(23) positional information after data main encryption is designated as ye=(ye1,ye2), it is calculated as follows:
(24) data main definition access rights tree is Tp, and to tree in each node x, all define one multinomial
Formula qx, its exponent number dx=tx-1, txIt it is the threshold value of node x;From the beginning of root node R, data main product is raw
Random number s ∈ Zp, and q is setR(0)=s, then selects other numerical value to make for any other node x,
There is qx(0)=qparent(x)(index (x)), wherein parent (x) is the father node of x;Then, auxiliary is calculated close
Literary composition AC isWherein
KAC=< m Ys,x+Ys〉;
In above-mentioned, AC is the access privilege control that auxiliary ciphertext realizes positional information, KACIt is stored in auxiliary
Key form in ciphertext, C, CiAnd Ci' represent some ciphertext parameters of attribute, AttTIt is authority tree TpIn
Attribute node set, att (i) represents the property value that attribute node i is stored, and H () is hash function;
(25) last, data chief commander (ye, AC) upload to mobile high in the clouds together and store.
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side
Method, it is characterised in that: the specific operation process that in described step (3), user key generates is:
When there being new user to ask addition system, this user is by its property set AQIt is sent to TA, TA and uses step
(1) PKI and the master key that produce in calculate and this user property collection AQClosely-related private key SKQ, so
After by this private key SKQIt is sent to this user;
Wherein,
d0,ri∈ZpIt is random number, AQIt it is the property set of user.
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side
Method, it is characterised in that: in described step (4), the specific operation process of user key checking is:
User obtains the private key SK produced by step (3)Q, the then PKI PK of joint step (1) and step
Suddenly auxiliary ciphertext AC of (2), is calculated secret parameter Ys;
Wherein, user defines iteration function DecryptNode (AC, a SKQ, x), x is the node in tree;
If the property set of user meets the authority tree of the main definition of data, then start to call from root node R
DecryptNode(AC,SKQ, R), this iteration function will provide an effective outputOtherwise it is output as sky;By calculatingObtain secret parameter Ys。
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side
Method, it is characterised in that: in described step (5), the detailed process of customer location encryption is as follows:
The positional information assuming user is x=(x1,x2), user utilizes calculated secret ginseng in step (4)
Number YsEncrypting its positional information, this secret parameter is designated as Δ=Ys, position computations is as follows:
xe=(xe1,xe2)
=(x1,x2)·Δ·gΔ
=(x1·Δ·gΔ,x2·Δ·gΔ)
If whether user inquires about both distances less than τ, then also need to be encrypted comparing parameter τ.
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side
Method, it is characterised in that: the concrete steps that in described step (6), distance calculates:
First cloud service provider obtains the key of encryption from the auxiliary ciphertext that data Your Majesty passes
KAC=< m ', x ' >, utilizes KACCalculate K 'AC=m ' gx′Modn, then obtains data and advocates peace the encryption of user
Distance between positional information, calculation is
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side
Method, it is characterised in that: the concrete steps that in described step (7), distance compares:
The range information that cloud service provider is encrypted according to step (6) gained, directly with the standard of comparison encrypted
Parameter τe=τ Δ gΔCarry out the comparison of size, i.e. dise-τeWhether≤0 set up, and directly exports comparative result.
The most according to claim 1 towards mobile cloud platform location-based secret protection query processing side
Method, it is characterised in that: the concrete steps that in described step (8), Query Result obtains:
If user's request is distance comparison query, directly Query Result can be obtained from step (7);If request
Be that distance calculates inquiry, use step (4) secret parameter Y that producessStep (6) is produced encryption
Distance results is decrypted calculating, available distance value i.e. dis=dis in plain texte·(Δ·gΔ)-1。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610153059.3A CN105848139B (en) | 2016-03-17 | One kind is towards the mobile location-based secret protection inquiry processing method of cloud platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610153059.3A CN105848139B (en) | 2016-03-17 | One kind is towards the mobile location-based secret protection inquiry processing method of cloud platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105848139A true CN105848139A (en) | 2016-08-10 |
CN105848139B CN105848139B (en) | 2019-07-16 |
Family
ID=
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107749865A (en) * | 2017-12-07 | 2018-03-02 | 安徽大学 | A kind of location privacy querying method based on homomorphic cryptography |
CN111010273A (en) * | 2019-12-23 | 2020-04-14 | 山东师范大学 | Attribute-based encryption and decryption method and system based on position decryption |
CN112929153A (en) * | 2021-02-23 | 2021-06-08 | 上海麟羿信息科技有限公司 | Data multi-stage encryption system and method based on complete homomorphic encryption |
CN113468440A (en) * | 2021-07-01 | 2021-10-01 | 陕西科技大学 | Anonymous query method for protecting location privacy based on SF-blind filtering protocol |
CN114302321A (en) * | 2021-12-07 | 2022-04-08 | 同济大学 | Privacy protection positioning method for hiding anchor node position information |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012160760A1 (en) * | 2011-05-25 | 2012-11-29 | パナソニック株式会社 | Information processing device and information processing method |
CN103957109A (en) * | 2014-05-22 | 2014-07-30 | 武汉大学 | Cloud data privacy protection security re-encryption method |
CN104363215A (en) * | 2014-11-04 | 2015-02-18 | 河海大学 | Encryption method and system based on attributes |
CN104902027A (en) * | 2015-06-12 | 2015-09-09 | 电子科技大学 | Cloud storage service-oriented dynamic data integrity auditing program |
CN105100083A (en) * | 2015-07-06 | 2015-11-25 | 河海大学 | Attribute-based encryption method and attribute-based encryption system capable of protecting privacy and supporting user Undo |
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012160760A1 (en) * | 2011-05-25 | 2012-11-29 | パナソニック株式会社 | Information processing device and information processing method |
CN103957109A (en) * | 2014-05-22 | 2014-07-30 | 武汉大学 | Cloud data privacy protection security re-encryption method |
CN104363215A (en) * | 2014-11-04 | 2015-02-18 | 河海大学 | Encryption method and system based on attributes |
CN104902027A (en) * | 2015-06-12 | 2015-09-09 | 电子科技大学 | Cloud storage service-oriented dynamic data integrity auditing program |
CN105100083A (en) * | 2015-07-06 | 2015-11-25 | 河海大学 | Attribute-based encryption method and attribute-based encryption system capable of protecting privacy and supporting user Undo |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107749865A (en) * | 2017-12-07 | 2018-03-02 | 安徽大学 | A kind of location privacy querying method based on homomorphic cryptography |
CN107749865B (en) * | 2017-12-07 | 2019-11-15 | 安徽大学 | A kind of location privacy querying method based on homomorphic cryptography |
CN111010273A (en) * | 2019-12-23 | 2020-04-14 | 山东师范大学 | Attribute-based encryption and decryption method and system based on position decryption |
CN111010273B (en) * | 2019-12-23 | 2022-04-15 | 山东师范大学 | Attribute-based encryption and decryption method and system based on position decryption |
CN112929153A (en) * | 2021-02-23 | 2021-06-08 | 上海麟羿信息科技有限公司 | Data multi-stage encryption system and method based on complete homomorphic encryption |
CN112929153B (en) * | 2021-02-23 | 2022-07-22 | 上海麟羿信息科技有限公司 | Data multi-stage encryption system and method based on complete homomorphic encryption |
CN113468440A (en) * | 2021-07-01 | 2021-10-01 | 陕西科技大学 | Anonymous query method for protecting location privacy based on SF-blind filtering protocol |
CN114302321A (en) * | 2021-12-07 | 2022-04-08 | 同济大学 | Privacy protection positioning method for hiding anchor node position information |
CN114302321B (en) * | 2021-12-07 | 2022-10-14 | 同济大学 | Privacy protection positioning method for hiding anchor node position information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111835500B (en) | Searchable encryption data secure sharing method based on homomorphic encryption and block chain | |
CN109246096B (en) | Multifunctional fine-grained access control method suitable for cloud storage | |
CN112765650A (en) | Attribute-based searchable encryption block chain medical data sharing method | |
CN105871543A (en) | Attribute-based multi-keyword ciphertext retrieval method under background of multiple data owners | |
CN108092972B (en) | Multi-authorization-center attribute-based searchable encryption method | |
CN105007161B (en) | A kind of fuzzy keyword public key search encryption method of trapdoor None- identified | |
CN108156138A (en) | A kind of fine granularity calculated for mist can search for encryption method | |
CN110022309B (en) | Safe and efficient data sharing method in mobile cloud computing system | |
CN105049196A (en) | Searchable encryption method of multiple keywords at specified location in cloud storage | |
CN110390203B (en) | Strategy hidden attribute-based encryption method capable of verifying decryption authority | |
CN105024802A (en) | Bilinear pairing-based multi-user multi-keyword searchable encryption method in cloud storage | |
CN112543099B (en) | Certificateless searchable encryption method based on edge calculation | |
CN108092766A (en) | A kind of cipher text searching method for verifying authority and its system | |
CN104135473A (en) | A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption | |
CN115987592A (en) | Block chain-based mobile medical internet of things fine-grained access control method and system | |
Liu et al. | EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination | |
WO2018070932A1 (en) | System and method for querying an encrypted database for documents satisfying an expressive keyword access structure | |
CN110443069B (en) | Method, system and equipment for protecting privacy of mobile social network | |
CN114338025A (en) | Ciphertext equivalence testing method in cloud environment | |
CN109740383B (en) | Privacy protection control method for fog computing-oriented medical system | |
CN107294701A (en) | The multidimensional ciphertext interval query device and querying method managed with efficient key | |
CN114567465A (en) | Searchable encryption method for classified medical data based on block chain | |
CN106301776A (en) | Many authorization center outsourcing attribute base encryption method of a kind of keyword search and system | |
Ruan et al. | A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management | |
CN109412809B (en) | SDN information access control method based on authenticatable hierarchical attribute encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |