Abstract: A management device (500) stores an encryption tag (C(D)) and encrypted data in association with each other. Upon acquiring a search keyword (s) for searching for encrypted data stored in the management device (500) a search device (400) calculates unambiguously determined deterministic information (t) from the search keyword (s) and generates a search query (Q(s)) by executing probabilistic encryption on the search keyword (s) using the deterministic information (t). The search device (400) transmits the search query (Q(s)) to the management device (500). After receiving the search query (Q(s)) from the search device (400) the management device (500) determines whether the search keyword (s) obtained by decrypting the search query (Q(s)) matches a relevant keyword obtained by decrypting the encryption tag (c) stored in the management device (500).
Claims [Claim 1]
A secret search system comprising:
a management apparatus including a management memory unit, and receiving encrypted data and an encrypted tag and storing, in the management memory unit, the encrypted tag and the encrypted data such that the encrypted tag and the encrypted data are associated with each other, the management memory unit being a memory apparatus, the encrypted data being obtained by encrypting storage data, and the encrypted tag being generated by performing encryption of a probabilistic encryption scheme on an associated keyword associated with the storage data; and
a search apparatus to calculate deterministic information when the search apparatus obtains a search keyword for searching for the encrypted data stored in the management memory unit, generate a search query by performing encryption of the probabilistic encryption scheme on the search keyword using the deterministic information, and transmit the search query to the management apparatus, the deterministic information being uniquely determined by the search keyword, wherein
when the management apparatus receives the search query from the search apparatus, the management apparatus determines whether the search keyword obtained by decrypting the search query matches the associated keyword obtained by decrypting the encrypted tag stored in the management memory unit.
[Claim 2]
The secret search system according to claim 1, wherein
when the search keyword obtained by decrypting the search query matches
the associated keyword obtained by decrypting the encrypted tag, the management
apparatus transmits a search result including the encrypted data associated with the encrypted tag, to the search apparatus, and
the search apparatus includes a search memory unit, and when the search apparatus receives the search result from the management apparatus, the search apparatus accumulates the deterministic information in the search memory unit, the search memory unit being a memory apparatus.
[Claim 3]
The secret search system according to claim 2, wherein when the search keyword obtained by decrypting the search query matches the associated keyword obtained by decrypting the encrypted tag, the management apparatus stores, in the management memory unit, the deterministic information and the encrypted data associated with the encrypted tag such that the deterministic information and the encrypted data are associated with each other, the deterministic information being obtained by decrypting the search query.
[Claim 4]
The secret search system according to claim 3, wherein when the search apparatus calculates the deterministic information, the search apparatus determines whether the deterministic information is accumulated in the search memory unit, and when the deterministic information is not accumulated in the search memory unit, the search apparatus transmits the search query to the management apparatus, and when the deterministic information is accumulated in the search memory unit, the search apparatus transmits the deterministic information to the management apparatus, and
when the management apparatus receives the deterministic information from
the search apparatus, the management apparatus obtains the encrypted data associated with the deterministic information from the management memory unit, and transmits a search result including the obtained the encrypted data to the search apparatus.
[Claim 5]
The secret search system according to any one of claims 1 to 4, wherein the search apparatus calculates the deterministic information by performing encryption of a deterministic encryption scheme on the search keyword.
[Claim 6]
The secret search system according to any one of claims 1 to 5, wherein the search apparatus obtains a deterministic instruction instructing whether to use the deterministic information upon encrypting the search keyword, and when an instruction to use the deterministic information is given by the deterministic instruction, the search apparatus performs encryption of the probabilistic encryption scheme on the search keyword using the deterministic information, and when an instruction not to use the deterministic information is given by the deterministic instruction, the search apparatus performs encryption of the probabilistic encryption scheme on the search keyword without using the deterministic information.
i
[Claim 7]
The secret search system according to any one of claims 1 to 6, further comprising a registration apparatus to generate a first random number, generate the encrypted tag by performing encryption of the probabilistic encryption scheme on the
» associated keyword using the first random number, and transmit the encrypted tag and
the encrypted data to the management apparatus, and transmit the first random number to the search apparatus, wherein
the search apparatus generates a second random number and performs encryption of the probabilistic encryption scheme on the search keyword using the second random number, the first random number received from the registration apparatus, and the deterministic information.
[Claim 8]
The secret search system according to any one of claims 1 to 7, wherein the management apparatus receives a deletion request for deleting the encrypted data stored in the management memory unit, and deletes the encrypted data from the management memory unit based on the deletion request.
[Claim 9]
A secret search method for a secret search system including a management apparatus including a management memory unit; and a search apparatus, the management memory unit being a memory apparatus, wherein
the management apparatus receives encrypted data and an encrypted tag and stores, in the management memory unit, the encrypted tag and the encrypted data such that the encrypted tag and the encrypted data are associated with each other, the encrypted data being obtained by encrypting storage data, and the encrypted tag being generated by performing encryption of a probabilistic encryption scheme on an associated keyword associated with the storage data,
the search apparatus calculates deterministic information when the search apparatus obtains a search keyword for searching for the encrypted data stored in the
management memory unit, generates a search query by performing encryption of the probabilistic encryption scheme on the search keyword using the deterministic information, and transmits the search query to the management apparatus, the deterministic information being uniquely determined by the search keyword, and
when the management apparatus receives the search query from the search apparatus, the management apparatus determines whether the search keyword obtained by decrypting the search query matches the associated keyword obtained by decrypting the encrypted tag stored in the management memory unit.
[Claim 10]
A secret search program for a secret search system including a management apparatus including a management memory unit; and a search apparatus, the management memory unit being a memory apparatus, the secret search program causing a computer to perform:
a data storage process of receiving encrypted data and an encrypted tag and storing, in the management memory unit, the encrypted tag and the encrypted data such that the encrypted tag and the encrypted data are associated with each other, the encrypted data being obtained by encrypting storage data, and the encrypted tag being generated by performing encryption of a probabilistic encryption scheme on an associated keyword associated with the storage data,
a search query generation process of calculating deterministic information when a search keyword for searching for the encrypted data stored in the management memory unit is obtained, generating a search query by performing encryption of the probabilistic encryption scheme on the search keyword using the deterministic information, and transmitting the search query to the management apparatus, the
deterministic information being uniquely determined by the search keyword, and
a determination process of determining, when the search query is received from the search apparatus, whether the search keyword obtained by decrypting the search query matches the associated keyword obtained by decrypting the encrypted tag stored in the management memory unit.
[Claim 11]
A secret search system comprising:
a management apparatus including a management memory unit, and receiving encrypted data and an encrypted tag and storing, in the management memory unit, the encrypted tag and the encrypted data such that the encrypted tag and the encrypted data are associated with each other, the management memory unit being a memory apparatus, the encrypted data being obtained by encrypting storage data, and the encrypted tag being generated by encrypting an associated keyword associated with the storage data; and
a search apparatus to calculate deterministic information when the search apparatus obtains a search keyword for searching for the encrypted data stored in the management memory unit, generate a search query by performing encryption of a probabilistic encryption scheme on the search keyword using the deterministic information, and transmit the search query to the management apparatus, the deterministic information being uniquely determined by the search keyword, wherein
when the management apparatus receives the search query from the search apparatus, the management apparatus determines whether the search keyword obtained by decrypting the search query matches the associated keyword obtained by decrypting the encrypted tag stored in the management memory unit.
[Claim 12]
The secret search system according to claim 11, wherein
when the search keyword obtained by decrypting the search query matches
the associated keyword obtained by decrypting the encrypted tag, the management
apparatus transmits a search result including the encrypted data associated with the
encrypted tag, to the search apparatus, and
the search apparatus includes a search memory unit, and when the search
apparatus receives the search result from the management apparatus, the search
apparatus accumulates the deterministic information in the search memory unit, the
search memory unit being a memory apparatus.
[Claim 13]
The secret search system according to claim 12, wherein when the search keyword obtained by decrypting the search query matches the associated keyword obtained by decrypting the encrypted tag, the management apparatus stores, in the management memory unit, the deterministic information and the encrypted data associated with the encrypted tag such that the deterministic information and the encrypted data are associated with each other, the deterministic information being obtained by decrypting the search query.
[Claim 14]
The secret search system according to claim 13, wherein
when the search apparatus calculates the deterministic information, the search
apparatus determines whether the deterministic information is accumulated in the search
memory unit, and when the deterministic information is not accumulated in the search memory unit, the search apparatus transmits the search query to the management apparatus, and when the deterministic information is accumulated in the search memory unit, the search apparatus transmits the deterministic information to the management apparatus, and
when the management apparatus receives the deterministic information from the search apparatus, the management apparatus obtains the encrypted data associated with the deterministic information from the management memory unit, and transmits a search result including the obtained the encrypted data to the search apparatus.
[Claim 15]
The secret search system according to any one of claims 11 to 14, wherein the search apparatus calculates the deterministic information by performing encryption of a deterministic encryption scheme on the search keyword.
[Claim 16]
The secret search system according to any one of claims 11 to 15, wherein the search apparatus obtains a deterministic instruction instructing whether to use the deterministic information upon encrypting the search keyword, and when an instruction to use the deterministic information is given by the deterministic instruction, the search apparatus performs encryption of the probabilistic encryption scheme on the search keyword using the deterministic information, and when an instruction not to use the deterministic information is given by the deterministic instruction, the search apparatus performs encryption of the probabilistic encryption scheme on the search keyword without using the deterministic information.
[Claim 17]
The secret search system according to any one of claims 11 to 16, further comprising a registration apparatus to generate a counter value, generate the encrypted tag by encrypting the associated keyword using the counter value, and transmit the encrypted tag and the encrypted data to the management apparatus, wherein
the search apparatus generates a random number and performs encryption of the probabilistic encryption scheme on the search keyword, using the random number and the counter value generated by the registration apparatus.
[Claim 18]
The secret search system according to claim 17, wherein the search apparatus performs encryption of the probabilistic encryption scheme on the search keyword using the random number and the counter value, to generate a first ciphertext to determine whether the first ciphertext matches the encrypted tag, and a second ciphertext for calculating the deterministic information using the encrypted tag that matches the first ciphertext.
[Claim 19]
A secret search method for a secret search system including a management apparatus including a management memory unit; and a search apparatus, the management memory unit being a memory apparatus, wherein
the management apparatus receives the encrypted data and an encrypted tag and stores, in the management memory unit, the encrypted tag and the encrypted data such that the encrypted tag and the encrypted data are associated with each other, the
encrypted data being obtained by encrypting storage data, and the encrypted tag being generated by encrypting an associated keyword associated with the storage data,
the search apparatus calculates deterministic information when the search apparatus obtains a search keyword for searching for the encrypted data stored in the management memory unit, generates a search query by performing encryption of a probabilistic encryption scheme on the search keyword using the deterministic information, and transmits the search query to the management apparatus, the deterministic information being uniquely determined by the search keyword, and
when the management apparatus receives the search query from the search apparatus, the management apparatus determines whether the search keyword obtained by decrypting the search query matches the associated keyword obtained by decrypting the encrypted tag stored in the management memory unit.
[Claim 20]
A secret search program for a secret search system including a management apparatus including a management memory unit; and a search apparatus, the management memory unit being a memory apparatus, the secret search program causing a computer to perform:
a data storage process of receiving encrypted data and an encrypted tag and 1 storing, in the management memory unit, the encrypted tag and the encrypted data such that the encrypted tag and the encrypted data are associated with each other, the encrypted data being obtained by encrypting storage data, and the encrypted tag being generated by encrypting an associated keyword associated with the storage data,
a search query generation process of calculating deterministic information > when a search keyword for searching for the encrypted data stored in the management
memory unit is obtained, generating a search query by performing encryption of a probabilistic encryption scheme on the search keyword using the deterministic information, and transmitting the search query to the management apparatus, the deterministic information being uniquely determined by the search keyword, and
a determination process of determining, when the search query is received from the search apparatus, whether the search keyword obtained by decrypting the search query matches the associated keyword obtained by decrypting the encrypted tag stored in the management memory unit.
| # | Name | Date |
|---|---|---|
| 1 | 201847024068-IntimationOfGrant31-03-2023.pdf | 2023-03-31 |
| 1 | 201847024068-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [28-06-2018(online)].pdf | 2018-06-28 |
| 2 | 201847024068-PatentCertificate31-03-2023.pdf | 2023-03-31 |
| 2 | 201847024068-STATEMENT OF UNDERTAKING (FORM 3) [28-06-2018(online)].pdf | 2018-06-28 |
| 3 | 201847024068-REQUEST FOR EXAMINATION (FORM-18) [28-06-2018(online)].pdf | 2018-06-28 |
| 3 | 201847024068-FORM 3 [01-12-2022(online)].pdf | 2022-12-01 |
| 4 | 201847024068-PROOF OF RIGHT [28-06-2018(online)].pdf | 2018-06-28 |
| 4 | 201847024068-FORM 3 [14-06-2022(online)].pdf | 2022-06-14 |
| 5 | 201847024068-PRIORITY DOCUMENTS [28-06-2018(online)].pdf | 2018-06-28 |
| 5 | 201847024068-FER.pdf | 2021-10-17 |
| 6 | 201847024068-POWER OF AUTHORITY [28-06-2018(online)].pdf | 2018-06-28 |
| 6 | 201847024068-ABSTRACT [28-04-2021(online)].pdf | 2021-04-28 |
| 7 | 201847024068-FORM 18 [28-06-2018(online)].pdf | 2018-06-28 |
| 7 | 201847024068-CLAIMS [28-04-2021(online)].pdf | 2021-04-28 |
| 8 | 201847024068-FORM 1 [28-06-2018(online)].pdf | 2018-06-28 |
| 8 | 201847024068-COMPLETE SPECIFICATION [28-04-2021(online)].pdf | 2021-04-28 |
| 9 | 201847024068-DRAWING [28-04-2021(online)].pdf | 2021-04-28 |
| 9 | 201847024068-DRAWINGS [28-06-2018(online)].pdf | 2018-06-28 |
| 10 | 201847024068-DECLARATION OF INVENTORSHIP (FORM 5) [28-06-2018(online)].pdf | 2018-06-28 |
| 10 | 201847024068-FER_SER_REPLY [28-04-2021(online)].pdf | 2021-04-28 |
| 11 | 201847024068-COMPLETE SPECIFICATION [28-06-2018(online)].pdf | 2018-06-28 |
| 11 | 201847024068-FORM 3 [28-04-2021(online)].pdf | 2021-04-28 |
| 12 | 201847024068-CLAIMS UNDER RULE 1 (PROVISIO) OF RULE 20 [28-06-2018(online)].pdf | 2018-06-28 |
| 12 | 201847024068-FORM-26 [28-04-2021(online)].pdf | 2021-04-28 |
| 13 | 201847024068-OTHERS [28-04-2021(online)].pdf | 2021-04-28 |
| 13 | Correspondence by Agent_Form1_02-07-2018.pdf | 2018-07-02 |
| 14 | 201847024068-FORM 3 [16-10-2020(online)].pdf | 2020-10-16 |
| 14 | 201847024068-RELEVANT DOCUMENTS [05-07-2018(online)].pdf | 2018-07-05 |
| 15 | 201847024068-FORM 3 [15-02-2019(online)].pdf | 2019-02-15 |
| 15 | 201847024068-MARKED COPIES OF AMENDEMENTS [05-07-2018(online)].pdf | 2018-07-05 |
| 16 | 201847024068-AMMENDED DOCUMENTS [05-07-2018(online)].pdf | 2018-07-05 |
| 16 | 201847024068-FORM 3 [28-11-2018(online)].pdf | 2018-11-28 |
| 17 | 201847024068-Amendment Of Application Before Grant - Form 13 [05-07-2018(online)].pdf | 2018-07-05 |
| 18 | 201847024068-FORM 3 [28-11-2018(online)].pdf | 2018-11-28 |
| 18 | 201847024068-AMMENDED DOCUMENTS [05-07-2018(online)].pdf | 2018-07-05 |
| 19 | 201847024068-FORM 3 [15-02-2019(online)].pdf | 2019-02-15 |
| 19 | 201847024068-MARKED COPIES OF AMENDEMENTS [05-07-2018(online)].pdf | 2018-07-05 |
| 20 | 201847024068-FORM 3 [16-10-2020(online)].pdf | 2020-10-16 |
| 20 | 201847024068-RELEVANT DOCUMENTS [05-07-2018(online)].pdf | 2018-07-05 |
| 21 | 201847024068-OTHERS [28-04-2021(online)].pdf | 2021-04-28 |
| 21 | Correspondence by Agent_Form1_02-07-2018.pdf | 2018-07-02 |
| 22 | 201847024068-CLAIMS UNDER RULE 1 (PROVISIO) OF RULE 20 [28-06-2018(online)].pdf | 2018-06-28 |
| 22 | 201847024068-FORM-26 [28-04-2021(online)].pdf | 2021-04-28 |
| 23 | 201847024068-COMPLETE SPECIFICATION [28-06-2018(online)].pdf | 2018-06-28 |
| 23 | 201847024068-FORM 3 [28-04-2021(online)].pdf | 2021-04-28 |
| 24 | 201847024068-FER_SER_REPLY [28-04-2021(online)].pdf | 2021-04-28 |
| 24 | 201847024068-DECLARATION OF INVENTORSHIP (FORM 5) [28-06-2018(online)].pdf | 2018-06-28 |
| 25 | 201847024068-DRAWING [28-04-2021(online)].pdf | 2021-04-28 |
| 25 | 201847024068-DRAWINGS [28-06-2018(online)].pdf | 2018-06-28 |
| 26 | 201847024068-COMPLETE SPECIFICATION [28-04-2021(online)].pdf | 2021-04-28 |
| 26 | 201847024068-FORM 1 [28-06-2018(online)].pdf | 2018-06-28 |
| 27 | 201847024068-CLAIMS [28-04-2021(online)].pdf | 2021-04-28 |
| 27 | 201847024068-FORM 18 [28-06-2018(online)].pdf | 2018-06-28 |
| 28 | 201847024068-ABSTRACT [28-04-2021(online)].pdf | 2021-04-28 |
| 28 | 201847024068-POWER OF AUTHORITY [28-06-2018(online)].pdf | 2018-06-28 |
| 29 | 201847024068-FER.pdf | 2021-10-17 |
| 29 | 201847024068-PRIORITY DOCUMENTS [28-06-2018(online)].pdf | 2018-06-28 |
| 30 | 201847024068-FORM 3 [14-06-2022(online)].pdf | 2022-06-14 |
| 30 | 201847024068-PROOF OF RIGHT [28-06-2018(online)].pdf | 2018-06-28 |
| 31 | 201847024068-REQUEST FOR EXAMINATION (FORM-18) [28-06-2018(online)].pdf | 2018-06-28 |
| 31 | 201847024068-FORM 3 [01-12-2022(online)].pdf | 2022-12-01 |
| 32 | 201847024068-STATEMENT OF UNDERTAKING (FORM 3) [28-06-2018(online)].pdf | 2018-06-28 |
| 32 | 201847024068-PatentCertificate31-03-2023.pdf | 2023-03-31 |
| 33 | 201847024068-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [28-06-2018(online)].pdf | 2018-06-28 |
| 33 | 201847024068-IntimationOfGrant31-03-2023.pdf | 2023-03-31 |
| 1 | 219THFILETPOSEARCHSTRATEGYE_28-10-2020.pdf |