CN108011713A - 一种云存储中基于同态加密的密文检索方法 - Google Patents
一种云存储中基于同态加密的密文检索方法 Download PDFInfo
- Publication number
- CN108011713A CN108011713A CN201711138161.7A CN201711138161A CN108011713A CN 108011713 A CN108011713 A CN 108011713A CN 201711138161 A CN201711138161 A CN 201711138161A CN 108011713 A CN108011713 A CN 108011713A
- Authority
- CN
- China
- Prior art keywords
- user
- node
- document
- encrypted
- tree
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711138161.7A CN108011713B (zh) | 2017-11-16 | 2017-11-16 | 一种云存储中基于同态加密的密文检索方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711138161.7A CN108011713B (zh) | 2017-11-16 | 2017-11-16 | 一种云存储中基于同态加密的密文检索方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108011713A true CN108011713A (zh) | 2018-05-08 |
CN108011713B CN108011713B (zh) | 2020-11-20 |
Family
ID=62052543
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711138161.7A Active CN108011713B (zh) | 2017-11-16 | 2017-11-16 | 一种云存储中基于同态加密的密文检索方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108011713B (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109344637A (zh) * | 2018-10-24 | 2019-02-15 | 北京理工大学 | 一种可搜索和保护隐私的数据共享云辅助电子医疗系统 |
CN109818729A (zh) * | 2019-01-28 | 2019-05-28 | 东北大学 | 基于Paillier同态加密的隐私保护平均距离查询方法 |
CN109889522A (zh) * | 2019-02-25 | 2019-06-14 | 重庆邮电大学 | 一种基于区块链的物联网信息安全保护方法 |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104023051A (zh) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | 云存储中多用户多个关键词可搜索的加密方法 |
CN104022866A (zh) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | 云存储中多用户密文关键词可搜索的加密方法 |
CN104780161A (zh) * | 2015-03-23 | 2015-07-15 | 南京邮电大学 | 一种云存储中支持多用户的可搜索加密方法 |
CN105024802A (zh) * | 2015-07-13 | 2015-11-04 | 西安理工大学 | 云存储中基于双线性对的多用户多关键词可搜索加密方法 |
CN105049196A (zh) * | 2015-07-13 | 2015-11-11 | 西安理工大学 | 云存储中指定位置的多个关键词可搜索的加密方法 |
CN106407822A (zh) * | 2016-09-14 | 2017-02-15 | 华南理工大学 | 一种关键词、多关键词可搜索加密方法和系统 |
CN106815350A (zh) * | 2017-01-19 | 2017-06-09 | 安徽大学 | 一种云环境中动态的密文多关键词模糊搜索方法 |
CN106874379A (zh) * | 2017-01-05 | 2017-06-20 | 中国科学院软件研究所 | 一种面向密文云存储的多维区间检索方法与系统 |
CN107231369A (zh) * | 2017-06-23 | 2017-10-03 | 成都鼎智汇科技有限公司 | 一种基于云计算的高效数据处理方法 |
CN107231370A (zh) * | 2017-06-23 | 2017-10-03 | 成都鼎智汇科技有限公司 | 一种基于云计算的数据监控方法 |
CN107257342A (zh) * | 2017-06-23 | 2017-10-17 | 成都鼎智汇科技有限公司 | 一种基于云计算的数据安全处理方法 |
-
2017
- 2017-11-16 CN CN201711138161.7A patent/CN108011713B/zh active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104023051A (zh) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | 云存储中多用户多个关键词可搜索的加密方法 |
CN104022866A (zh) * | 2014-05-22 | 2014-09-03 | 西安理工大学 | 云存储中多用户密文关键词可搜索的加密方法 |
CN104780161A (zh) * | 2015-03-23 | 2015-07-15 | 南京邮电大学 | 一种云存储中支持多用户的可搜索加密方法 |
CN105024802A (zh) * | 2015-07-13 | 2015-11-04 | 西安理工大学 | 云存储中基于双线性对的多用户多关键词可搜索加密方法 |
CN105049196A (zh) * | 2015-07-13 | 2015-11-11 | 西安理工大学 | 云存储中指定位置的多个关键词可搜索的加密方法 |
CN106407822A (zh) * | 2016-09-14 | 2017-02-15 | 华南理工大学 | 一种关键词、多关键词可搜索加密方法和系统 |
CN106874379A (zh) * | 2017-01-05 | 2017-06-20 | 中国科学院软件研究所 | 一种面向密文云存储的多维区间检索方法与系统 |
CN106815350A (zh) * | 2017-01-19 | 2017-06-09 | 安徽大学 | 一种云环境中动态的密文多关键词模糊搜索方法 |
CN107231369A (zh) * | 2017-06-23 | 2017-10-03 | 成都鼎智汇科技有限公司 | 一种基于云计算的高效数据处理方法 |
CN107231370A (zh) * | 2017-06-23 | 2017-10-03 | 成都鼎智汇科技有限公司 | 一种基于云计算的数据监控方法 |
CN107257342A (zh) * | 2017-06-23 | 2017-10-17 | 成都鼎智汇科技有限公司 | 一种基于云计算的数据安全处理方法 |
Non-Patent Citations (2)
Title |
---|
董秋香等: ""加密数据上的计算密码学技术研究综述"", 《计算机应用研究》 * |
魏润琪: ""基于全同态加密算法的密文检索模型的设计与实现"", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109344637A (zh) * | 2018-10-24 | 2019-02-15 | 北京理工大学 | 一种可搜索和保护隐私的数据共享云辅助电子医疗系统 |
CN109344637B (zh) * | 2018-10-24 | 2021-08-24 | 北京理工大学 | 一种可搜索和保护隐私的数据共享云辅助电子医疗系统 |
CN109818729A (zh) * | 2019-01-28 | 2019-05-28 | 东北大学 | 基于Paillier同态加密的隐私保护平均距离查询方法 |
CN109818729B (zh) * | 2019-01-28 | 2021-10-29 | 东北大学 | 基于Paillier同态加密的隐私保护平均距离查询方法 |
CN109889522A (zh) * | 2019-02-25 | 2019-06-14 | 重庆邮电大学 | 一种基于区块链的物联网信息安全保护方法 |
CN109889522B (zh) * | 2019-02-25 | 2022-02-11 | 重庆邮电大学 | 一种基于区块链的物联网信息安全保护方法 |
Also Published As
Publication number | Publication date |
---|---|
CN108011713B (zh) | 2020-11-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108494768B (zh) | 一种支持访问控制的密文搜索方法及系统 | |
Wang et al. | Secure ranked keyword search over encrypted cloud data | |
Wang et al. | Enabling secure and efficient ranked keyword search over outsourced cloud data | |
JP4958246B2 (ja) | 高速検索可能な暗号化のための方法、装置およびシステム | |
CN103107889B (zh) | 一种可搜索的云计算环境数据加密存储系统和方法 | |
CN108881195A (zh) | 基于云环境的数据安全共享方法和装置 | |
CN103944711B (zh) | 一种云存储密文检索方法及其系统 | |
CN104780161A (zh) | 一种云存储中支持多用户的可搜索加密方法 | |
CN108737374A (zh) | 一种区块链中数据存储的隐私保护方法 | |
WO2015055762A1 (en) | System and method for dynamic, non-interactive, and parallelizable searchable symmetric encryption | |
CN105610793A (zh) | 一种外包数据加密存储与密文查询系统及其应用方法 | |
CN106302411A (zh) | 基于Windows平台的支持文件加密的安全云存储方法及系统 | |
Cui et al. | Ciphertext-policy attribute-based encrypted data equality test and classification | |
CN106874516A (zh) | 一种云存储中基于kcb树和布隆过滤器的高效密文检索方法 | |
CN109361644A (zh) | 一种支持快速搜索和解密的模糊属性基加密方法 | |
KR20120068524A (ko) | 데이터 관리 장치 및 데이터 관리 방법 | |
CN108011713A (zh) | 一种云存储中基于同态加密的密文检索方法 | |
CN107294701B (zh) | 具有高效密钥管理的多维密文区间查询装置及查询方法 | |
Al-Sakran | Accessing secured data in cloud computing environment | |
Zheng et al. | Symmetric searchable encryption scheme that supports phrase search | |
CN104794243B (zh) | 基于文件名的第三方密文检索方法 | |
CN105007258B (zh) | 一种快速关键字可搜索公钥加密方法 | |
Barouti et al. | Symmetrically-private database search in cloud computing | |
CN109672525B (zh) | 一种具有前向索引的可搜索公钥加密方法及系统 | |
KR100951034B1 (ko) | 암호문 크기를 줄이기 위한 공개키 기반의 검색가능암호문생성 방법과, 그에 따른 공개키 기반의 데이터 검색 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 210023, 66 new model street, Gulou District, Jiangsu, Nanjing Applicant after: NANJING University OF POSTS AND TELECOMMUNICATIONS Applicant after: JIANGSU PROVINCE XINTONG INTELLIGENT TRAFFIC SCIENCE & TECHNOLOGY DEVELOPMENT Co.,Ltd. Address before: 210023 Jiangsu city of Nanjing province Nanjing City Yuen Road Ya Dong New District No. 9 Applicant before: NANJING University OF POSTS AND TELECOMMUNICATIONS Applicant before: JIANGSU PROVINCE XINTONG INTELLIGENT TRAFFIC SCIENCE & TECHNOLOGY DEVELOPMENT Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP02 | Change in the address of a patent holder |
Address after: 210023, No. 66, new exemplary Road, Nanjing, Jiangsu Patentee after: NANJING University OF POSTS AND TELECOMMUNICATIONS Patentee after: JIANGSU PROVINCE XINTONG INTELLIGENT TRAFFIC SCIENCE & TECHNOLOGY DEVELOPMENT Co.,Ltd. Address before: 210023, 66 new model street, Gulou District, Jiangsu, Nanjing Patentee before: NANJING University OF POSTS AND TELECOMMUNICATIONS Patentee before: JIANGSU PROVINCE XINTONG INTELLIGENT TRAFFIC SCIENCE & TECHNOLOGY DEVELOPMENT Co.,Ltd. |
|
CP02 | Change in the address of a patent holder |