Method and device for document ownership certification
A technology of ownership and documentation, applied in the direction of electrical components, transmission systems, etc., can solve problems such as failure to reach the safety level, prominent efficiency problems, forged certification data, etc., and achieve high detection rate, guaranteed detection rate, and high efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0154] Phase 1: Initialization: The cloud storage server has the original file F, and divides the file into many blocks of the same size for storage.
[0155] Step 101: After the cloud storage server receives the request for storing the specified file sent by the client user, if it detects that the file has been stored locally, it selects a random number R c , and run the algorithm KeyDeriving(sk, R c )→{Key session , R seed1 , R seed2}, generate a session key (Key session ) and seed random number (R seed1 and R seed2 );
[0156] KeyDeriving(sk,R c ) is used to select two seed random numbers R seed1 ←(random){0, 1} k and R seed2 ←(random){0, 1}k , and generate the session key Key session = Hash sk (R c ), where sk is the symmetric key shared between the cloud storage server and the client, and R c ←(random){0, 1} k ; Output session key and seed random number: output(Key session , R seed1 , R seed2 );
[0157] (random) {0, 1} k Indicates that a string of 0 a...
Embodiment 2
[0187] Phase 1:
[0188] The cloud storage server divides the file F into f blocks b 1 ,... b f , and may distribute and store the f block files in f logically independent storage locations.
[0189] Step 201: When the cloud storage server that owns the original file F receives the request from the client to store the file, if it detects that the file has already been stored locally, then determine the symmetric key sk shared with the corresponding client, and generate a random number R c ←(random){0, 1} k , and then run the algorithm KeyDeriving(sk, R c ) to generate the new session key Key required for this challenge response session and two seed random numbers R seed1 and R seed2 ;
[0190] Step 202, the cloud storage server then sends the random number R c sent to the client, the client will run the same algorithm KeyDeriving(sk, R c ) to get the same session key Key session , and jointly calculate a hash value through the new session key and the current timestam...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


