CN115795504A - Searchable method and system supporting fuzzy search of Chinese word meaning - Google Patents
Searchable method and system supporting fuzzy search of Chinese word meaning Download PDFInfo
- Publication number
- CN115795504A CN115795504A CN202211463633.7A CN202211463633A CN115795504A CN 115795504 A CN115795504 A CN 115795504A CN 202211463633 A CN202211463633 A CN 202211463633A CN 115795504 A CN115795504 A CN 115795504A
- Authority
- CN
- China
- Prior art keywords
- search
- file
- authorized user
- data owner
- cloud server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a searchable method and a searchable system supporting Chinese semantic fuzzy retrieval, and relates to the field of semantic fuzzy search, wherein an authorized user sends a keyword set to be searched to a data owner through an encryption channel, the data owner issues a key to the authorized user, keyword extraction is carried out on a data file to generate an index, the data owner encrypts a plaintext file to be uploaded to a cloud server to generate a ciphertext file, the cloud server responds to search requirements submitted by the user, the authorized user obtains a search result, and the result is decrypted by using the key to obtain plaintext data; according to the searchable method and the searchable system supporting the fuzzy search of the Chinese word senses, the stored safety indexes are compared with the search trap door through the search algorithm, the inner product calculation of the matrix is carried out, the search result is returned to the authorized user, the fuzzy search of the multi-keyword ciphertext based on the Chinese word senses is completed, the expenditure on the storage space is reduced, and the confidentiality, the usability and the integrity of the scheme are guaranteed.
Description
Technical Field
The invention relates to a word sense fuzzy search technology, in particular to a searchable method and a searchable system supporting Chinese word sense fuzzy retrieval.
Background
The existing searchable encryption technology is mainly and continuously deep around three main aspects of function expansion, efficiency improvement and safety optimization. Users hope to accurately locate a specified target meeting search requirements in large-scale cloud storage files with high search efficiency, and because ambiguity problems caused by user search keyword input errors and word ambiguity exist, the traditional fuzzy search scheme has high storage cost and high search computation complexity and is difficult to meet the storage and search requirements of a large amount of data, so that ciphertext fuzzy search taking the practical application requirements of users as directions becomes a research focus gradually.
Fuzzy search currently includes homonyms, shape-near words, synonyms, etc., where synonyms have high use frequency and wide range in practical application environments and are difficult points for fuzzy semantic search, and existing schemes mostly use english as research objects, and chinese and english have great differences in terms of word-pronunciation shapes, word-meaning logic, etc., and ciphertext fuzzy search of chinese pictographic word-meaning has become a difficult problem to be solved urgently. In addition, most of the existing ciphertext search schemes are single keyword search, the search mode has low accuracy for searching, and is far away from the requirement of high-efficiency and quick search in the practical application environment, and the service for meeting the quick search of multiple keywords needs to be provided urgently.
Disclosure of Invention
The invention aims to provide a searchable method and a searchable system supporting fuzzy search of Chinese word senses, so as to solve the defects in the prior art.
In order to achieve the above purpose, the invention provides the following technical scheme: a searchable method supporting fuzzy retrieval of Chinese word senses comprises a data owner, a cloud server and an authorized user, and specifically comprises the following steps:
an authorized user sends a keyword set to be searched to a data owner through an encrypted channel, the data owner generates a security trap door to return, a search trap door is generated according to a locally stored file ID set, and the search trap door is submitted to a cloud server;
a data owner issues a secret key to an authorized user, extracts key words from a data file, performs Chinese synonym semantic expansion on the extracted key word set, inserts the expanded synonym set into a bloom filter by using a p-stable distributed position sensitive hash function, and generates an index;
a data owner encrypts a plaintext file to be uploaded to a cloud server by using an AES symmetric cryptographic algorithm to generate a ciphertext file;
the data owner uploads the index and the ciphertext file to the cloud server;
the cloud server stores and manages the ciphertext file and the index, responds to a search requirement submitted by a user, obtains a search result according to a search algorithm and returns the search result to an authorized user;
and the authorized user obtains the search result, and the plaintext data is obtained after the result is decrypted by using the key.
Further, the method also comprises the following steps of initializing data:
the data owner obtains the key, the random Hash function key pair and the reversible matrix M by using the self-defined security parameters 1 、M 2 ;
Key, matrix M 1 、M 2 Sending the encrypted text file and the file ID set to an authorized user, encrypting the plaintext file to form a ciphertext file, extracting keywords of the plaintext file, and calculating a synonym set according to the similarity of word senses;
and inserting the synonym set into a bloom filter to construct a security index, uploading the synonym set and the security index to a cloud server together, and waiting for searching by a user.
Further, the step of the authorized user making a search request is:
an authorized user sends a plurality of search keywords to a data owner, and the data owner carries out word sense expansion and makes a security trap door to return;
authorizing a userAfter the security trap door is obtained, the matrix M obtained by the initialization process is utilized 1 、M 2 Generating a search trapdoor by the file ID set, uploading the search trapdoor to an outsourced cloud server, and completing inner product calculation of the search trapdoor and the security index by the cloud server;
and searching a corresponding ciphertext file according to the inner product sequencing result to serve as a response result to be sent to an authorized user, and decrypting the response result by the authorized user to obtain a plaintext result.
Further, the key is generated by the data owner based on security parameters, which includes:
an AES key for use in a data encryption/decryption process;
h position sensitive hash function required key pairs for inserting keywords into the bloom filter;
two random invertible matrices M 1 、M 2 For enabling encryption of the secure index and search trapdoors;
the data owner has all keys, and an authorized user can obtain the AES key and the two random reversible matrixes M 1 、M 2 。
Further, the index generating step includes:
constructing an empty bloom filter for each file, and extracting file keywords by adopting a TF-IDF algorithm;
editing the extracted keywords into Word vectors by adopting a Word2vec method;
calculating according to the similarity between word vectors, and expanding the word vectors into a synonym set of the keywords;
calculating h mapped hash values of the synonyms after the word expansion according to h position sensitive hash functions, performing two-round hash calculation on the hash values by using a file identifier as a hash seed, and inserting the hash values into a bloom filter;
the bloom filter is divided into a front section and a rear section which are respectively subjected to a reversible matrix M 1 、M 2 And after encryption, constructing a safety index, storing the safety index into a cloud server, and using the safety index for a subsequent search algorithm.
Further, the safety trap door generating step includes:
authorizing a user to submit a set of search keywords to a data owner;
editing the search keywords into Word vectors by the data owner by adopting a Word2vec method according to the search keyword set;
calculating according to the similarity between the word vectors to generate a synonym set, and completing the hash value calculation of the h position sensitive hash function of the synonym set;
and taking the generated hash value as the content of the security trap door and sending the content to an authorized user.
Further, the search trapdoor generating step comprises:
authorizing a user to obtain a security trapdoor returned by a data owner;
performing two rounds of hash calculation on the hash value in the security trapdoor according to the file ID;
inserting the result into a corresponding bloom filter, and dividing the bloom filter into two parts;
and respectively encrypting by using the reversible matrixes to generate a search trapdoor set, and submitting the search trapdoor set to a cloud server side.
Further, the search algorithm compares the stored security index with the search trapdoor to perform inner product calculation of the matrix.
A searchable system supporting fuzzy retrieval of Chinese word senses comprises a data owner module, an authorized user module and a cloud server module, wherein data interaction channels are arranged among the data owner module, the authorized user module and the cloud server module, and data interaction can be carried out.
Compared with the prior art, the searchable method and the searchable system supporting the fuzzy search of the Chinese word senses have the following beneficial effects:
1. according to the searchable method and the searchable system supporting the fuzzy retrieval of the Chinese word senses, the key pair of the h position-sensitive hash functions is only mastered in the hands of the data owner, so that the search of each authorized user can be normally carried out only by calculating and generating a security trap by the data owner, the authorized user cannot search privately under the condition that the data owner is unknown or not allowed, and the security of stored data is improved.
2. According to the searchable method and the searchable system supporting the fuzzy search of the Chinese word senses, the security trap door is separated from the search trap door, the key keeping authority is substantially separated, the reversible matrix held by a user can only complete encryption of the bloom filter inserted with key word elements, if no data owner provides the security trap door, correct search results cannot be obtained, and therefore the search behavior of the user can be verified.
3. According to the searchable method and the searchable system supporting the fuzzy search of the Chinese word senses, the stored safety indexes are compared with the search trapdoors through a search algorithm, the inner product calculation of the matrix is carried out, the encrypted files which are arranged earlier are taken as the search results and returned to authorized users after the inner product values of the search results are sorted, the fuzzy search of the multi-keyword ciphertext based on the Chinese word senses is completed, the expenditure on the storage space is reduced, the search efficiency is high, and the confidentiality, the usability and the integrity of the scheme are guaranteed.
4. The searchable method and the searchable system supporting the fuzzy search of the Chinese word senses do not need a user to additionally store a fuzzy word set, save storage space, support simultaneous search of multiple key words and fuzzy semantic search, have a file integrity checking function, and aim to improve user search experience, improve key word search efficiency in encrypted data and realize safe sharing of data.
Drawings
In order to more clearly illustrate the embodiments of the present application or technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments described in the present invention, and other drawings can be obtained by those skilled in the art according to the drawings.
FIG. 1 is a system model diagram of a searchable method and system supporting fuzzy search of Chinese word senses according to an embodiment of the present invention;
FIG. 2 is a data flow diagram of a searchable method and system supporting fuzzy search of Chinese word senses according to an embodiment of the present invention;
fig. 3 is a schematic block diagram of a searchable system supporting fuzzy search of chinese word senses according to an embodiment of the present invention.
Description of the reference numerals:
1. a data owner module; 2. an authorized user module; 3. and a cloud server module.
Detailed Description
In order to make the technical solutions of the present invention better understood, those skilled in the art will now describe the present invention in further detail with reference to the accompanying drawings.
The first embodiment is as follows:
referring to fig. 1-3, a searchable method supporting fuzzy search of chinese word senses includes a data owner, a cloud server and an authorized user, and specifically includes the following steps:
s1, an authorized user sends a keyword set of Chinese words to be searched to a data owner through an encrypted channel, the data owner generates a security trapdoor to return, a search trapdoor is generated according to a locally stored file ID set, and the search trapdoor is submitted to a cloud server;
s2, a data owner issues a secret key to an authorized user, chinese word keyword extraction is carried out on a data file, chinese synonym semantic expansion is carried out on an extracted keyword set, the expanded synonym set is inserted into a bloom filter by utilizing a p-stable distributed position sensitive hash function, and an index is generated;
s3, the data owner encrypts the plaintext file to be uploaded to the cloud server by using an AES symmetric cryptographic algorithm to generate a ciphertext file;
s4, the data owner uploads the index and the ciphertext file to the cloud server;
s5, the cloud server stores and manages the ciphertext file and the index, responds to a search requirement submitted by a user, obtains a search result according to a search algorithm and returns the search result to an authorized user;
s6, the authorized user obtains the search result, and the Chinese word meaning plaintext data is obtained after the result is decrypted by using the secret key.
Further comprising performing data initialization: data owner obtains password by using self-defined security parametersKey, random Hash function key pair and reversible matrix M 1 、M 2 Key, matrix M 1 、M 2 And sending the data and the file ID set to an authorized user, encrypting the plaintext file to form a ciphertext file, extracting keywords of the plaintext file, calculating a synonym set according to the similarity of the word senses, inserting the synonym set into a bloom filter to construct a security index, uploading the security index and the synonym set to a cloud server together, and waiting for the user to search.
The steps of the authorized user for providing the search request are as follows: the authorized user sends a plurality of search keywords to the data owner, the data owner carries out word sense expansion and makes a security trap door to return, and after obtaining the security trap door, the authorized user utilizes the matrix M obtained in the initialization process 1 、M 2 And generating a search trapdoor by the file ID set, uploading the search trapdoor to an outsourced cloud server, completing inner product calculation of the search trapdoor and the security index by the search trapdoor, searching a corresponding ciphertext file according to an inner product sequencing result, sending the ciphertext file as a response result to an authorized user, and decrypting the ciphertext file by the authorized user to obtain a plaintext result.
The key is generated by the data owner based on security parameters, including: AES key for data encryption/decryption, key pair required by h position-sensitive hash function for inserting keywords into bloom filter, two random reversible matrixes M 1 、M 2 For implementing the encryption of the security index and search trapdoor, the data owner having all keys, the AES keys and the two random invertible matrices M being available to authorized users 1 、M 2 。
The index generating step includes:
an empty bloom filter is constructed for each file, the bloom filter for extracting the key words of the file by adopting the TF-IDF algorithm has small storage space and high search efficiency, and only whether target data exist can be checked through binary bit storage data, but the stored data content cannot be obtained, so that the method has good confidentiality and is a good method for realizing index construction;
then editing the extracted keywords into Word vectors by adopting a Word2vec method, calculating according to the similarity between the Word vectors, and expanding the Word vectors into a synonym set of the keywords, wherein the size of the bloom filter is unchanged, so that the synonym set with the increased number after expansion does not have adverse effect on a storage space, and meanwhile, the Word sense fuzzy effect on the keywords can be realized;
calculating h mapped hash values of the synonyms after the word expansion according to h position sensitive hash functions, performing two-round hash calculation on the hash values by using file identifiers as hash seeds, and inserting the hash values into the bloom filters, wherein the purpose of the two-round hash calculation is to ensure that the mapping contents of the same keyword in different bloom filters are different, so that the risk of statistical analysis attack is reduced;
finally, the bloom filter is divided into a front section and a rear section which pass through a reversible matrix M respectively 1 、M 2 And after encryption, constructing a safety index, storing the safety index into a cloud server, and using the safety index for a subsequent search algorithm.
The safety trap door generating step comprises the following steps:
an authorized user submits a search keyword set to a data owner, the data owner edits search keywords into Word vectors by adopting a Word2vec method according to the search keyword set, generates a synonym set according to similarity calculation among the Word vectors, completes hash value calculation of h position sensitive hash functions of the synonym set, takes the generated hash values as contents of a security trap and sends the contents to the authorized user, and only grasps a key pair of the h position sensitive hash functions in the hand of the data owner, so that the search of the authorized user can be normally carried out only by calculating the security trap by the data owner each time, the authorized user can not search privately under the condition that the data owner is unknown or not allowed, and the security of stored data is improved.
The search trapdoor generating step comprises:
the method comprises the steps that an authorized user obtains a security trap door returned by a data owner, two rounds of hash calculation are carried out on hash values in the security trap door according to file IDs, the same key words among the trap doors of different files are guaranteed to be different, results are inserted into corresponding bloom filters, the bloom filters are divided into two parts, encryption is carried out through reversible matrixes respectively, a search trap door set is generated and submitted to a cloud server side, the security trap door and the search trap door are separated, key keeping authority is substantially separated, the reversible matrix held by the user can only complete encryption on the bloom filters with key word elements inserted, if no data owner provides the security trap door, correct search results cannot be obtained, and therefore the search behavior of the user can be verified.
The search algorithm compares the stored security index with the search trapdoor, matrix inner product calculation is carried out, after the same keyword passes through the same insertion mode, the influence on bit positions of the bloom filter is the same, for binary bits with the same mapping content of the search keyword, the value is 1, the inner product calculation result is also 1, different bits are 0, for the generated search result, the larger the inner product value is, the higher the same degree with the search keyword is, therefore, after the inner product values of the search result are sorted, the encrypted file which is arranged earlier is taken as the search result to be returned to an authorized user, the fuzzy search of the multi-keyword ciphertext based on Chinese meaning is completed, the expense on the storage space is reduced, the search efficiency is better, and the confidentiality, the usability and the integrity of the scheme are ensured.
A searchable system supporting fuzzy retrieval of Chinese word senses comprises a data owner module, an authorized user module and a cloud server module, wherein data interaction channels are arranged among the data owner module, the authorized user module and the cloud server module and can be used for data interaction;
the data owner module is to:
generating a key according to the security parameters, and randomly generating a reversible matrix M of a Hash function key pair 1 、M 2 ;
The file ID, the key and the reversible matrix M 1 、M 2 Sending the information to an authorized user through a secure channel;
extracting keywords from plaintext file, expanding synonym set, and using file ID, hash function key pair and reversible matrix M 1 、M 2 Constructing a security index;
encrypting the plaintext file by using the key, and uploading the encrypted ciphertext file and the security index to the cloud server;
when the authorized user generates a search request, receiving search keywords sent by the authorized user, expanding the search keywords into a synonym set through the word sense, constructing a security trapdoor by using a Hash function key pair, and returning the security trapdoor to the authorized user.
The authorized user module is to:
obtaining a document ID, a key and a reversible matrix M from a data owner 1 、M 2 ;
Sending the search keyword to the data owner, obtaining the returned security trap door, and then using the file ID and the reversible matrix M 1 、M 2 Generating a search trapdoor and submitting the search trapdoor to a cloud server;
and acquiring a result set retrieved by the cloud server, wherein the file is still in an encrypted state, and decrypting the file by using the key to acquire a plaintext file result.
The cloud server module is used for:
storing the ciphertext file and the security index uploaded by the data owner;
and after the authorized user submits the search trap door, extracting the stored security index, comparing the security index with the search trap door to execute inner product calculation, sequencing the file numbers according to the inner product size, and searching ciphertext files corresponding to the front lambda numbers as search ciphertext results to return to the authorized user.
While certain exemplary embodiments of the present invention have been described above by way of illustration only, it will be apparent to those of ordinary skill in the art that the described embodiments may be modified in various different ways without departing from the spirit and scope of the invention. Accordingly, the drawings and description are illustrative in nature and should not be construed as limiting the scope of the invention.
Claims (9)
1. A searchable method supporting fuzzy retrieval of Chinese word senses comprises a data owner, a cloud server and an authorized user, and is characterized by comprising the following steps:
an authorized user sends a keyword set to be searched to a data owner through an encrypted channel, the data owner generates a security trap door to return, a search trap door is generated according to a locally stored file ID set, and the search trap door is submitted to a cloud server;
a data owner issues a key to an authorized user, key word extraction is carried out on a data file, synonym sense expansion is carried out on an extracted key word set, and the expanded synonym set is inserted into a bloom filter by utilizing a position sensitive hash function with p-stable distribution to generate an index;
a data owner encrypts a plaintext file to be uploaded to a cloud server by using an AES symmetric cryptographic algorithm to generate a ciphertext file;
the data owner uploads the index and the ciphertext file to the cloud server together;
the cloud server stores and manages the ciphertext file and the index, responds to a search requirement submitted by a user, obtains a search result according to a search algorithm and returns the search result to an authorized user;
and the authorized user obtains the search result, and the plaintext data is obtained after the result is decrypted by using the key.
2. The searchable method supporting fuzzy search of chinese word senses according to claim 1, further comprising performing data initialization:
the data owner obtains the key, the random Hash function key pair and the reversible matrix M by using the self-defined security parameters 1 、M 2 ;
Key, matrix M 1 、M 2 Sending the encrypted text file and the file ID set to an authorized user, encrypting the plaintext file to form a ciphertext file, extracting keywords of the plaintext file, and calculating a synonym set according to the similarity of word senses;
and inserting the synonym set into a bloom filter to construct a security index, uploading the synonym set and the security index to a cloud server together, and waiting for searching by a user.
3. The searchable method supporting fuzzy search of the chinese word sense according to claim 2, wherein said step of requesting by the authorized user is:
an authorized user sends a plurality of search keywords to a data owner, and the data owner carries out word sense expansion and makes a security trap door to return;
after the authorized user obtains the security trap door, the matrix M obtained by the initialization process is utilized 1 、M 2 Generating a search trapdoor by the file ID set, uploading the search trapdoor to an outsourced cloud server, and completing inner product calculation of the search trapdoor and a safety index by the cloud server;
and searching a corresponding ciphertext file according to the inner product sequencing result to serve as a response result to be sent to an authorized user, and decrypting the response result by the authorized user to obtain a plaintext result.
4. The searchable method supporting fuzzy search of chinese word senses according to claim 2, wherein said key is generated by a data owner based on security parameters, comprising:
an AES key for use in a data encryption/decryption process;
h position sensitive hash function required key pairs for inserting keywords into the bloom filter;
two random invertible matrices M 1 、M 2 For enabling encryption of the security index and search trapdoor;
the data owner has all keys, and an authorized user can obtain the AES key and the two random reversible matrixes M 1 、M 2 。
5. The searchable method supporting fuzzy search of the chinese word sense according to claim 1, wherein the index generating step comprises:
constructing an empty bloom filter for each file, and extracting file keywords by adopting a TF-IDF algorithm;
editing the extracted keywords into Word vectors by adopting a Word2vec method;
calculating according to the similarity between word vectors, and expanding the word vectors into a synonym set of the keywords;
calculating h mapped hash values of the synonyms after the word expansion according to h position sensitive hash functions, performing two-round hash calculation on the hash values by using a file identifier as a hash seed, and inserting the hash values into a bloom filter;
the bloom filter is divided into a front section and a rear section which pass through a reversible matrix M respectively 1 、M 2 And after encryption, constructing a safety index, storing the safety index into a cloud server, and using the safety index for a subsequent search algorithm.
6. The searchable method according to claim 5, wherein said security trapdoor generation step comprises:
authorizing a user to submit a set of search keywords to a data owner;
editing the search keywords into Word vectors by the data owner by adopting a Word2vec method according to the search keyword set;
calculating according to the similarity between the word vectors to generate a synonym set, and completing hash value calculation of the h position sensitive hash function of the synonym set;
and taking the generated hash value as the content of the security trap door and sending the content to an authorized user.
7. The searchable method supporting fuzzy search of chinese word senses according to claim 1, wherein said search trapdoor generating step comprises:
the authorized user obtains a security trap door returned by the data owner;
performing two rounds of hash calculation on the hash value in the security trap door according to the file ID;
inserting the result into a corresponding bloom filter, and dividing the bloom filter into two parts;
and respectively encrypting by using the reversible matrixes to generate a search trapdoor set, and submitting the search trapdoor set to a cloud server side.
8. The searchable method supporting fuzzy search of Chinese word senses according to claim 1, wherein the search algorithm compares the stored security index with a search trapdoor to perform inner product calculation of a matrix.
9. A searchable system supporting fuzzy retrieval of Chinese word senses is characterized by comprising a data owner module, an authorized user module and a cloud server module, wherein data interaction channels are arranged among the data owner module, the authorized user module and the cloud server module and data interaction can be carried out.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211463633.7A CN115795504A (en) | 2022-11-22 | 2022-11-22 | Searchable method and system supporting fuzzy search of Chinese word meaning |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211463633.7A CN115795504A (en) | 2022-11-22 | 2022-11-22 | Searchable method and system supporting fuzzy search of Chinese word meaning |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115795504A true CN115795504A (en) | 2023-03-14 |
Family
ID=85439833
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211463633.7A Pending CN115795504A (en) | 2022-11-22 | 2022-11-22 | Searchable method and system supporting fuzzy search of Chinese word meaning |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115795504A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116881739A (en) * | 2023-09-07 | 2023-10-13 | 山东省计算中心(国家超级计算济南中心) | Ciphertext security retrieval method oriented to similarity of spatial keywords |
-
2022
- 2022-11-22 CN CN202211463633.7A patent/CN115795504A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116881739A (en) * | 2023-09-07 | 2023-10-13 | 山东省计算中心(国家超级计算济南中心) | Ciphertext security retrieval method oriented to similarity of spatial keywords |
CN116881739B (en) * | 2023-09-07 | 2023-12-01 | 山东省计算中心(国家超级计算济南中心) | Ciphertext security retrieval method oriented to similarity of spatial keywords |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108334612B (en) | Shape-near Chinese character full-text fuzzy retrieval method aiming at ciphertext domain | |
CN107480163B (en) | Efficient ciphertext image retrieval method supporting privacy protection in cloud environment | |
Zhang et al. | SE-PPFM: A searchable encryption scheme supporting privacy-preserving fuzzy multikeyword in cloud systems | |
CN106776904B (en) | The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment | |
US8930691B2 (en) | Dynamic symmetric searchable encryption | |
CN112800088A (en) | Database ciphertext retrieval system and method based on bidirectional security index | |
CN109885640B (en) | Multi-keyword ciphertext sorting and searching method based on alpha-fork index tree | |
CN106936771A (en) | A kind of secure cloud storage method and system based on graded encryption | |
US20170262546A1 (en) | Key search token for encrypted data | |
CN109739945B (en) | Multi-keyword ciphertext sorting and searching method based on mixed index | |
CN103049466A (en) | Full-text search method and system based on distributed cipher-text storage | |
CN110727951B (en) | Lightweight outsourcing file multi-keyword retrieval method and system with privacy protection function | |
CN112328606A (en) | Keyword searchable encryption method based on block chain | |
Li et al. | Multi-keyword fuzzy search over encrypted cloud storage data | |
CN115795504A (en) | Searchable method and system supporting fuzzy search of Chinese word meaning | |
CN115757676A (en) | Fuzzy searchable encryption method and device and electronic equipment | |
Mittal et al. | Privacy preserving synonym based fuzzy multi-keyword ranked search over encrypted cloud data | |
CN103414555A (en) | Array key management method based on IO block encryption | |
CN114528370B (en) | Dynamic multi-keyword fuzzy ordering searching method and system | |
CN109672525B (en) | Searchable public key encryption method and system with forward index | |
CN109165226B (en) | Searchable encryption method for ciphertext large data set | |
CN112328626B (en) | Searchable encryption method facing cloud environment and supporting fuzzy keyword sequencing | |
CN113158245A (en) | Method, system, equipment and readable storage medium for searching document | |
CN108319670A (en) | The dynamic ranking searching method that can verify that based on cloud computing | |
CN109582818B (en) | Music library cloud retrieval method based on searchable encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |