CN113810416A - Public key searchable encryption method based on SM2 public key encryption algorithm - Google Patents
Public key searchable encryption method based on SM2 public key encryption algorithm Download PDFInfo
- Publication number
- CN113810416A CN113810416A CN202111094000.9A CN202111094000A CN113810416A CN 113810416 A CN113810416 A CN 113810416A CN 202111094000 A CN202111094000 A CN 202111094000A CN 113810416 A CN113810416 A CN 113810416A
- Authority
- CN
- China
- Prior art keywords
- public key
- keyword
- algorithm
- receiver
- sender
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/903—Querying
- G06F16/90335—Query processing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Analysis (AREA)
- Computational Linguistics (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to a public key searchable encryption method based on SM2 public key encryption algorithm, and provides an encryption system comprising a system administrator, a sender, a receiver and a cloud end, four entities; a system administrator calls an initialization Setup algorithm to determine system parameters and shares the system parameters to other entities; and the sender and the receiver respectively call S-KGen and R-KGen to produce public and private keys. And then, the sender calls the PEKS to generate a cipher text of the keyword, and the keyword cipher text and the corresponding data cipher text are uploaded to the cloud. Then, the receiver can call the TraDo to generate a keyword trapdoor and initiate a data retrieval request to the cloud. And finally, the cloud calls Test to search a keyword ciphertext matched with the keyword trapdoor in the database, and then returns the corresponding data ciphertext to the receiver. The invention adopts SM2 public key encryption algorithm, has the characteristics of safety, advancement and autonomous control, and the generation process of the keyword trapdoor does not need to involve bilinear pairwise operation.
Description
Technical Field
The invention relates to the field, in particular to a public key searchable encryption method based on an SM2 public key encryption algorithm.
Background
With the rapid development of cloud computing, a large number of users store personal data in a cloud server, so that the local storage pressure is effectively relieved, complicated data management is avoided, and convenience is provided for using data. However, the external cloud server has a Honest and Curious (curous-But-host) feature, which can correctly store the user data, But also attempt to view the data content, and seriously threatens the personal data privacy of the user. The traditional symmetric/public key encryption is a common data privacy protection method, and a user encrypts data first when uploading the data, so that the confidentiality of the data can be effectively guaranteed, and a cloud server is prevented from maliciously acquiring data contents. When the user searches data, the method downloads all the data uploaded to the server to the local, executes decryption operation and then searches. Downloading all data to local occupies a large amount of bandwidth resources, which is easy to cause server congestion; meanwhile, the decrypted and downloaded ciphertext data occupy a large amount of local computing resources and affect the service quality of data retrieval. Searchable Encryption (SE) is a special public key Encryption technology, can fully utilize huge computing power/storage resources of a cloud server, provides convenient data retrieval service on the premise of ensuring data security, and saves a large amount of local computing overhead, storage space and network communication cost for users. Although a large number of searchable encryption schemes are proposed at present, the searchable encryption schemes based on domestic commercial cryptographic algorithms are not published, and the development requirements of autonomous and controllable cryptographic core technologies in China are not met.
Disclosure of Invention
In view of this, the present invention aims to provide a public key searchable encryption method based on the SM2 public key encryption algorithm, so as to implement an encryption scheme with high security, low computation overhead, and low communication cost.
In order to achieve the purpose, the invention adopts the following technical scheme:
a public key searchable encryption method based on SM2 public key encryption algorithm provides an encryption system comprising a system administrator, a sender, a receiver and a cloud end, and comprises the following steps;
a system administrator calls an initialization Setup algorithm to determine a system parameter pp and shares the system parameter pp to other entities;
the sender and the receiver respectively call S-KGen and R-KGen to produce public and private keys;
sender calls PEKS to generate keyword ciphertext ctwThe keyword ciphertext ctwUploading the corresponding data ciphertext Edata to a cloud;
trando can be called by a receiver to generate keyword trapdoor twSending a data retrieval request to the cloud end, calling Test by the cloud end to search in the database and find the keyword trapdoor twMatched keyword ciphertext ctwAnd then returning the corresponding data cipher text Edata to the receiving party.
Further, the initializing Setup algorithm specifically includes:
inputting a safety parameter lambda, randomly selecting a large prime number q, and determining a nonsingular elliptic curve E: y2=x3+ ax + b (mod q), wherein,selecting prime n-order cyclic group from all points E and infinity pointsAnd a generatorRandom selectionAnd calculate G1=αG;
Further, the S-KGen algorithm specifically includes: inputting system parameter pp, and randomly selectingCalculating Ps=dsG,P′s=dsG1Outputting the private key sk of the senders=dsPublic key pks=Ps。
Further, the R-KGen algorithm specifically includes: inputting system parameter pp, randomly selecting k-order polynomialAnd whereinAlgorithm output receiver private key skr=(p1(x),p2(x) Public key pk)r=(D0,…,Dk) Wherein D ist=ctG+c′tG1(t=0,…,k)。
Further, the PEKS algorithm specifically includes: inputting system parameter pp and sender private key sks=dsReceiver public key pkr=(D0,…,Dk) And a keyword w; random selection Calculating C1=rG、C′1=rG1、Bw=e(Qw,G+G1)、αw=KDF(Bw,plen)、Andwherein plen is the bit length of the random plaintext pt; ciphertext ct of output keyword ww=(C1,C′1,C2,C3)。
Further, the TraDo algorithm specifically includes: inputting system parameter pp and receiving party private key skr=(p1(x),p2(x) Public key pk of sender), the public key pk of senders=(Ps,P′s) And a keyword w; calculating p1,w=p1(w),p2,w=p2(w) and tw=p1,wPs+p2, wP′s. Algorithm output keyword trapdoor tw。
Further, the Test algorithm specifically includes: inputting system parameter pp, keyword trapdoor t of receiverwAnd keyword ciphertext ctwCalculating B'w=e(tw,C1+C′1),α′w=KDF(B′w,plen), If C3=C′3And if so, outputting 1 by the algorithm to indicate that the keyword ciphertext and the trapdoor are successfully matched, and otherwise, outputting 0.
Compared with the prior art, the invention has the following beneficial effects:
the method adopts an SM2 public key encryption algorithm, has the characteristics of safety, advancement and autonomous control, and ensures that the scheme of the invention has the characteristics of high safety, low calculation overhead, low communication cost and the like because bilinear pairing operation is not required in the generation process of the keyword trapdoor.
Drawings
FIG. 1 is a schematic flow diagram of the process of the present invention.
Detailed Description
The invention is further explained below with reference to the drawings and the embodiments.
Referring to fig. 1, the present invention provides a public key searchable encryption method based on SM2 public key encryption algorithm, and provides an encryption system including a system administrator, a sender, a receiver and a cloud, and includes the following steps;
a system administrator calls an initialization Setup algorithm to determine a system parameter pp and shares the system parameter pp to other entities;
the sender and the receiver respectively call S-KGen and R-KGen to produce public and private keys;
sender calls PEKS to generate keyword ciphertext ctwThe keyword ciphertext ctwUploading the corresponding data ciphertext Edata to a cloud;
trando can be called by a receiver to generate keyword trapdoor twSending a data retrieval request to the cloud end, calling Test by the cloud end to search in the database and find the keyword trapdoor twMatched keyword ciphertext ctwAnd then returning the corresponding data cipher text Edata to the receiving party.
In this embodiment, the adopted symbols and definitions are as follows:
q: large prime number.
k: the order of the polynomial.
Fq: a finite field containing q elements.
a,b:FqThe elements in (1), which define FqAn elliptic curve E above.
E(Fq):FqThe set of all rational points of the upper elliptic curve E, including the point of infinity O.
#E(Fq):E(Fq) The number of points, called elliptic curve E (F)q) The order of (a).
O: a particular point on the elliptic curve is called the infinity point or the null point.
n: order of generator G (n is # E (F)q) Prime factor of).
KDF: a key derivation function.
p1(x),p2(x) The method comprises the following steps A polynomial of order k as the private key of the receiving party.
Dt: the public key of the receiver, where t is 0, …, k.
ds: the sender's private key.
Ps: the sender's public key.
In the embodiment, the adopted algorithm comprises six parts of system establishment (Setup), sender key generation (S-KGen), receiver key generation (S-KGen), keyword ciphertext generation (PEKS), keyword trapdoor generation (Trando) and Test (Test). The method comprises the following specific steps:
Algorithm 2. Key Generation (S-KGen): inputting system parameter pp by algorithm, and randomly selectingCalculating Ps=dsG,P′s=dsG1The algorithm outputs the private key sk of the senders=dsPublic key pks=Ps。
Algorithm 3. Key Generation (R-KGen): inputting system parameter pp by algorithm, and randomly selecting polynomial of k orderAndwhereinAlgorithm output receiver private key skr=(p1(x),p2(x) Public key pk)r=(D0,…,Dk) Wherein D ist=ctG+c′tG1(t=0,…,k)。
Algorithm 4. keyword ciphertext generation (PEKS): inputting system parameter pp and sender private key sk by algorithms=dsReceiver public key pkr=(D0,…,Dk) And a keyword w. Random selectionCalculating C1=rG、C′1=rG1、Bw=e(Qw,G+G1)、αw=KDF(Bw,plen)、Andwhere plen is the bit length of the random plaintext pt. Ciphertext ct of algorithm output keyword ww=(C1,C′1,C2,C3)。
Algorithm 5. keyword trapdoor generation (Trando): inputting system parameter pp and receiving party private key sk by algorithmr=(p1(x),p2(x) Public key pk of sender), the public key pk of senders=(Ps,P′s) And a keyword w. Calculating p1,w=p1(w),p2,w=p2(w) and tw=p1,wPs+p2, wP′s. Algorithm output keyword trapdoor tw。
Algorithm 6. Test: inputting system parameter pp and key word trapdoor t of receiver by algorithmwAnd keyword ciphertext ctwCalculating B'w=e(tw,C1+C′1),α′w=KDF(B′w,plen),If C3=C′3And if so, outputting 1 by the algorithm to indicate that the keyword ciphertext and the trapdoor are successfully matched, and otherwise, outputting 0.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing is directed to preferred embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow. However, any simple modification, equivalent change and modification of the above embodiments according to the technical essence of the present invention are within the protection scope of the technical solution of the present invention.
Claims (7)
1. A public key searchable encryption method based on SM2 public key encryption algorithm is characterized in that an encryption system is provided and comprises a system administrator, a sender, a receiver and a cloud end, and the method specifically comprises the following steps;
a system administrator calls an initialization Setup algorithm to determine a system parameter pp and shares the system parameter pp to other entities;
the sender and the receiver respectively call S-KGen and R-KGen to produce public and private keys;
sender calls PEKS to generate keyword ciphertext ctwThe keyword ciphertext ctwUploading the corresponding data ciphertext Edata to a cloud;
trando can be called by a receiver to generate keyword trapdoor twSending a data retrieval request to the cloud end, calling Test by the cloud end to search in the database and find the keyword trapdoor twMatched keyword ciphertext ctwAnd then returning the corresponding data cipher text Edata to the receiving party.
2. The public key searchable encryption method based on the SM2 public key encryption algorithm according to claim 1, wherein the initialization Setup algorithm is specifically:
a safety parameter lambda is input and,randomly selecting a large prime number q, and determining a nonsingular elliptic curve E: y is2=x3+ ax + b (mod q), wherein,selecting prime n-order cyclic group from all points E and infinity pointsAnd a generatorRandom selectionAnd calculate G1=αG;
3. The public key searchable encryption method based on the SM2 public key encryption algorithm according to claim 1, wherein the S-KGen algorithm is specifically: inputting system parameter pp, and randomly selectingCalculating Ps=dsG,P′s=dsG1Outputting the private key sk of the senders=dsPublic key pks=Ps。
4. The public key searchable encryption method based on the SM2 public key encryption algorithm according to claim 1, wherein the R-KGen algorithm is specifically: input deviceSystem parameter pp, randomly selecting k-order polynomialAnd whereinAlgorithm output receiver private key skr=(p1(x),p2(x) Public key pk)r=(D0,...,Dk) Where Dt ═ ctG+c′tG1(t=0,...,k)。
5. The public key searchable encryption method based on the SM2 public key encryption algorithm according to claim 1, wherein the PEKS algorithm is specifically: inputting system parameter pp and sender private key sks=dsReceiver public key pkr=(D0,...,Dk) And a keyword w; random selectionComputingBw=e(Qw,G+G1)、αw=KDF(Bw,plen)、Andwherein plen is the bit length of the random plaintext pt; ciphertext ct of output keyword ww=(C1,C′1,C2,C3)。
6. The public key searchable encryption method based on the SM2 public key encryption algorithm according to claim 1, wherein the TraDo algorithm is specifically: inputting system parameter pp and receiving party private key skr=(p1(x),p2(x) P), sender public key β ks=(Ps,P′s) And a keyword w; calculating p1,w=p1(w),p2,w=p2(w) and tw=p1,wPs+p2,wP′s. Algorithm output keyword trapdoor tw。
7. The public key searchable encryption method based on the SM2 public key encryption algorithm according to claim 1, wherein the Test algorithm is specifically: inputting system parameter pp, keyword trapdoor t of receiverwAnd keyword ciphertext ctwCalculating B'w=e(tw,C1+C′1),α′w=KDF(B′w,plen),If C3=C′3And if so, outputting 1 by the algorithm to indicate that the keyword ciphertext and the trapdoor are successfully matched, and otherwise, outputting 0.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111094000.9A CN113810416B (en) | 2021-09-17 | 2021-09-17 | Public key searchable encryption method based on SM2 public key encryption algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111094000.9A CN113810416B (en) | 2021-09-17 | 2021-09-17 | Public key searchable encryption method based on SM2 public key encryption algorithm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113810416A true CN113810416A (en) | 2021-12-17 |
CN113810416B CN113810416B (en) | 2023-07-04 |
Family
ID=78939698
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111094000.9A Active CN113810416B (en) | 2021-09-17 | 2021-09-17 | Public key searchable encryption method based on SM2 public key encryption algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113810416B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115021934A (en) * | 2022-05-31 | 2022-09-06 | 福建师范大学 | Authentication searchable encryption system and method based on BB signature |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789044A (en) * | 2017-02-20 | 2017-05-31 | 西南石油大学 | Cloud storage ciphertext data public key can search for encryption method on lattice under master pattern |
CN107222483A (en) * | 2017-06-07 | 2017-09-29 | 中山大学 | A kind of method of the electronic document network memory management of many access levels |
CN108924103A (en) * | 2018-06-22 | 2018-11-30 | 广东石油化工学院 | The on-line/off-line of identity-based towards cloud storage can search for encryption method |
CN109086615A (en) * | 2018-08-03 | 2018-12-25 | 上海海事大学 | A kind of support multiple key search public key encryption method of anti-keyword guessing attack |
CN111431705A (en) * | 2020-03-06 | 2020-07-17 | 电子科技大学 | Reverse password firewall method suitable for searchable encryption |
CN111930881A (en) * | 2020-10-10 | 2020-11-13 | 南京理工大学 | Connection keyword authentication searchable encryption method based on state cryptographic algorithm |
CN112560075A (en) * | 2021-02-22 | 2021-03-26 | 西南石油大学 | Lightweight searchable encryption method and device based on elliptic curve |
-
2021
- 2021-09-17 CN CN202111094000.9A patent/CN113810416B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789044A (en) * | 2017-02-20 | 2017-05-31 | 西南石油大学 | Cloud storage ciphertext data public key can search for encryption method on lattice under master pattern |
CN107222483A (en) * | 2017-06-07 | 2017-09-29 | 中山大学 | A kind of method of the electronic document network memory management of many access levels |
CN108924103A (en) * | 2018-06-22 | 2018-11-30 | 广东石油化工学院 | The on-line/off-line of identity-based towards cloud storage can search for encryption method |
CN109086615A (en) * | 2018-08-03 | 2018-12-25 | 上海海事大学 | A kind of support multiple key search public key encryption method of anti-keyword guessing attack |
CN111431705A (en) * | 2020-03-06 | 2020-07-17 | 电子科技大学 | Reverse password firewall method suitable for searchable encryption |
CN111930881A (en) * | 2020-10-10 | 2020-11-13 | 南京理工大学 | Connection keyword authentication searchable encryption method based on state cryptographic algorithm |
CN112560075A (en) * | 2021-02-22 | 2021-03-26 | 西南石油大学 | Lightweight searchable encryption method and device based on elliptic curve |
Non-Patent Citations (3)
Title |
---|
刘书勇;付义伦;: "基于PKI技术的可搜索云加密存储***", 软件导刊, vol. 17, no. 02, pages 181 - 185 * |
宋衍;韩臻;陈栋;赵进华;: "支持关键词任意连接搜索的属性加密方案", 通信学报, vol. 37, no. 08, pages 1 - 9 * |
徐海琳;陆阳;: "高效无双线性对的带关键词搜索的基于证书加密方案", 计算机应用, vol. 38, no. 02, pages 379 - 385 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115021934A (en) * | 2022-05-31 | 2022-09-06 | 福建师范大学 | Authentication searchable encryption system and method based on BB signature |
Also Published As
Publication number | Publication date |
---|---|
CN113810416B (en) | 2023-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2736109C1 (en) | Devices and method of matching keys | |
TWI672932B (en) | Post-quantum asymmetric key generation method and system, encryption method, decryption method, and encrypted communication system based on prime array | |
US9379891B2 (en) | Method and system for ID-based encryption and decryption | |
CN105610793B (en) | A kind of outsourcing data encryption storage and cryptogram search system and its application process | |
CN107483383A (en) | A kind of data processing method, terminal and background server | |
US11757625B2 (en) | Multi-factor-protected private key distribution | |
Liang et al. | The hybrid encryption algorithm of lightweight data in cloud storage | |
CN111902809A (en) | Ciphertext searching method, device and equipment based on CP-ABE under fog calculation and storage medium | |
CN103607278A (en) | Safe data cloud storage method | |
TW201921887A (en) | Computer-implemented system and method for highly secure, high speed encryption and transmission of data | |
US20140237239A1 (en) | Techniques for validating cryptographic applications | |
CN115622702A (en) | Public key authentication searchable encryption method without bilinear pairing operation | |
CN113810416B (en) | Public key searchable encryption method based on SM2 public key encryption algorithm | |
CN117527223B (en) | Distributed decryption method and system for quantum-password-resistant grid | |
CN113193958B (en) | Quantum key service method and system | |
CN112560075B (en) | Lightweight searchable encryption method and device based on elliptic curve | |
US11539535B2 (en) | Generating an authentication result by using a secure base key | |
CN116707804B (en) | Method and equipment for enhancing FF1 format reserved encryption security | |
Al-Odat et al. | A big data storage scheme based on distributed storage locations and multiple authorizations | |
CN114362912A (en) | Identification password generation method based on distributed key center, electronic device and medium | |
US10050943B2 (en) | Widely distributed parameterization | |
CN117155615A (en) | Data encryption transmission method, system, electronic equipment and storage medium | |
CN108768994B (en) | Data matching method and device and computer readable storage medium | |
CN114928440A (en) | SM 9-based authentication searchable encryption method and system | |
CN112637233B (en) | Safe averaging method based on multi-user data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |