IN2014CH00681A - - Google Patents
Download PDFInfo
- Publication number
- IN2014CH00681A IN2014CH00681A IN681CH2014A IN2014CH00681A IN 2014CH00681 A IN2014CH00681 A IN 2014CH00681A IN 681CH2014 A IN681CH2014 A IN 681CH2014A IN 2014CH00681 A IN2014CH00681 A IN 2014CH00681A
- Authority
- IN
- India
- Prior art keywords
- user terminal
- proxy server
- user
- trapdoor
- server
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A method and system for a multi-user searchable encryption system over ordered keywords is disclosed. The system includes a key generation server which issues a primary key to a user terminal device and a secondary key to a proxy server. A trapdoor is sent by the user terminal and received by the proxy server. The trapdoor is encrypted at the proxy server. The proxy server receives cypher text from the user terminal and sends the cypher text to the database server. A search keyword inputted by the user at the user terminal is used to perform a lookup in encrypted data. REF FIG: 1
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN681CH2014 IN2014CH00681A (en) | 2014-02-13 | 2014-02-13 | |
US14/614,241 US9515994B2 (en) | 2014-02-13 | 2015-02-04 | Keyword ordered storage, search and retrieval on encrypted data for multiuser scenario |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN681CH2014 IN2014CH00681A (en) | 2014-02-13 | 2014-02-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2014CH00681A true IN2014CH00681A (en) | 2015-08-14 |
Family
ID=53775977
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN681CH2014 IN2014CH00681A (en) | 2014-02-13 | 2014-02-13 |
Country Status (2)
Country | Link |
---|---|
US (1) | US9515994B2 (en) |
IN (1) | IN2014CH00681A (en) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10007803B2 (en) | 2012-10-26 | 2018-06-26 | Infosys Limited | Searching over encrypted keywords in a database |
US9894042B2 (en) * | 2015-07-24 | 2018-02-13 | Skyhigh Networks, Inc. | Searchable encryption enabling encrypted search based on document type |
CN105915520B (en) * | 2016-04-18 | 2019-02-12 | 深圳大学 | File storage, search method and storage system based on public key searchable encryption |
CN107491497B (en) * | 2017-07-25 | 2020-08-11 | 福州大学 | Multi-user multi-keyword sequencing searchable encryption system supporting query in any language |
US11550833B2 (en) * | 2017-10-24 | 2023-01-10 | University Of Louisiana At Lafayette | Architecture for semantic search over encrypted data in the cloud |
US10474755B2 (en) | 2017-11-03 | 2019-11-12 | Bank Of America Corporation | Robotics assisted production support utility |
CN112042150B (en) | 2018-05-08 | 2024-02-23 | 三菱电机株式会社 | Registration device, server device, concealment search system, concealment search method, and computer-readable recording medium |
CN109543434B (en) * | 2018-11-28 | 2020-10-09 | 深圳市墨者安全科技有限公司 | Block chain information encryption method, decryption method, storage method and device |
CN109495254A (en) * | 2018-12-05 | 2019-03-19 | 广东工业大学 | One kind can search for symmetric encryption method, device and equipment |
CN110069944A (en) * | 2019-04-03 | 2019-07-30 | 南方电网科学研究院有限责任公司 | Searchable encrypted data retrieval method and system |
CN111556495B (en) * | 2020-03-19 | 2022-04-05 | 西安电子科技大学 | A multi-user searchable encryption method and encryption system in a car networking environment |
CN114398539B (en) * | 2021-12-13 | 2024-07-02 | 西安邮电大学 | Double-server cooperation searchable encryption method, system, computer equipment and terminal |
CN114900318B (en) * | 2022-06-02 | 2024-04-19 | 浙江工商大学 | Searchable encryption method based on key agreement protocol and verifiable one-round communication |
US12184626B2 (en) * | 2022-08-11 | 2024-12-31 | Intelligent Voice Limited | Private search service |
US12184625B2 (en) * | 2022-08-11 | 2024-12-31 | Intelligent Voice Limited | Private search service |
CN116599771B (en) * | 2023-07-14 | 2023-09-22 | 浙江云针信息科技有限公司 | Data hierarchical protection transmission method and device, storage medium and terminal |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA1318404C (en) | 1988-10-11 | 1993-05-25 | Michael J. Hawley | Method and apparatus for indexing files in a computer system |
KR100346262B1 (en) | 1999-08-27 | 2002-07-26 | 엘지전자주식회사 | Method of multimedia data keyword self formation |
US7113594B2 (en) | 2001-08-13 | 2006-09-26 | The Board Of Trustees Of The Leland Stanford University | Systems and methods for identity-based encryption and related cryptographic techniques |
US7921450B1 (en) * | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
FR2898747A1 (en) * | 2006-03-15 | 2007-09-21 | Gemplus Sa | DECHIFFRABLE CHERCHABLE ENCRYPTION PROCESS, SYSTEM FOR SUCH ENCRYPTION |
JP5365072B2 (en) * | 2007-12-11 | 2013-12-11 | ソニー株式会社 | KEY GENERATION DEVICE, ENCRYPTION DEVICE, RECEPTION DEVICE, KEY GENERATION METHOD, ENCRYPTION METHOD, KEY PROCESSING METHOD, AND PROGRAM |
KR101190059B1 (en) | 2008-12-12 | 2012-10-16 | 한국전자통신연구원 | Method for data encryption and method for conjunctive keyword search of encrypted data |
KR101302137B1 (en) | 2009-12-16 | 2013-09-16 | 한국전자통신연구원 | Method for Searchable Symmetric Encryption |
CN102713995B (en) * | 2010-01-15 | 2015-06-24 | 三菱电机株式会社 | Confidential search system and encryption processing system |
US8930691B2 (en) | 2011-08-16 | 2015-01-06 | Microsoft Corporation | Dynamic symmetric searchable encryption |
US9449167B2 (en) | 2012-09-12 | 2016-09-20 | Infosys Limited | Method and system for securely accessing different services based on single sign on |
US10007803B2 (en) | 2012-10-26 | 2018-06-26 | Infosys Limited | Searching over encrypted keywords in a database |
-
2014
- 2014-02-13 IN IN681CH2014 patent/IN2014CH00681A/en unknown
-
2015
- 2015-02-04 US US14/614,241 patent/US9515994B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US20150229611A1 (en) | 2015-08-13 |
US9515994B2 (en) | 2016-12-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2014CH00681A (en) | ||
WO2016060722A3 (en) | Homomorphic encryption in a healthcare network environment, system and methods | |
EP4271016A3 (en) | Enhanced authentication based on secondary device interactions | |
PH12019501078A1 (en) | Data processing method, apparatus, and system for auto insurance business | |
GB2571049A (en) | Method and system for search pattern oblivious dynamic symmetric searchable encryption | |
MY196178A (en) | Method And Nodes For Integrating Networks | |
GB2541566A (en) | Improved method, system and software for searching, identifying, retrieving and presenting electronic documents | |
WO2014182606A8 (en) | Approximate privacy indexing for search queries on online social networks | |
EP4270273A3 (en) | Geo-location based event gallery | |
GB2542053A (en) | Automatically generating a semantic mapping for a relational database | |
JP2015035072A5 (en) | ||
PH12016501475A1 (en) | Method, apparatus and computer program | |
PH12018501016B1 (en) | Information recommendation method and apparatus | |
MX2017005801A (en) | Roaming content wipe actions across devices. | |
PH12018501967A1 (en) | Method and device for linking to account and providing service process | |
MX368494B (en) | Information pushing method and device. | |
MX2015002050A (en) | Method and apparatus for sending and receiving article information. | |
SG11201909119YA (en) | Search method and apparatus and non-temporary computer-readable storage medium | |
MY190884A (en) | Data caching method and apparatus | |
MY198719A (en) | Method and device for sharing wireless access point | |
MX358531B (en) | Method and apparatus for searching for files on storage device, and router. | |
MY184704A (en) | A system and method for authenticating a user based on user behaviour and environmental factors | |
PH12017550127A1 (en) | Privacy enhanced personal search index | |
PH12019501277A1 (en) | Method and device for implementing service operations based on images | |
GB2549878A (en) | Techniques for implementing location based device services |