A decentralized key management method based on homomorphic encryption

A technology of homomorphic encryption and key management, applied in key distribution to regulate user behavior and enhance control

Active Publication Date: 2017-08-15
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Provide key management resource pool for cloud computing platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A decentralized key management method based on homomorphic encryption
  • A decentralized key management method based on homomorphic encryption
  • A decentralized key management method based on homomorphic encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The participants in key management are:

[0056] (1) Users: users of cloud computing services.

[0057] (2) Department: The higher-level department to which the user belongs.

[0058] (3) Encryption proxy: provide users with data encryption services

[0059] (4) Key management center: a third-party key management center for cloud computing, which provides key management services for cloud services.

[0060] (5) Cloud service: the cloud service instance obtained by the user.

[0061] Homomorphic encryption can perform ciphertext calculation without decryption, and has broad application prospects. At present, fully homomorphic encryption can perform arbitrary ciphertext calculations, but its efficiency is very low and cannot be used in real systems. However, single homomorphism has the characteristics of high efficiency and has practical value. In this technical solution, a decentralized key management scheme will be designed using single homomorphic encryption. Two...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a decentralized key management method based on homomorphic encryption. The method comprises the following steps of 1, user main key generation; 2, cloud service example key generation; 3, key distribution by aiming at different data examples. The decentralized key management method has the positive effects that the homomorphically encrypted ciphertext computing characteristic is utilized for realizing safe key management, the key authority of a key management center is decentralized, and the control authority of a user is improved. The key management center can complete cloud computing service key distribution under the condition without obtaining the user main key; the variability of cloud service keys and the key distribution function of fine granularity are realized, and different keys can be distributed according to different cloud service types and business data types; a department audit can monitor data and business behaviors at any time; the key management center can only complete the key management function, and a user main key and a cloud computing service key cannot be obtained.

Description

technical field [0001] The invention relates to a method for managing decentralized keys based on homomorphic encryption. Background technique [0002] 1. Features of cloud computing key management [0003] Cloud computing is a computing model in which virtualized resources that can be dynamically scaled are provided to users in the form of services through the Internet. In the cloud computing mode, users do not need to build or manage these resources, but can directly use the resources provided by the cloud computing service provider on an as-needed basis. Cloud computing regards IT resources, data, and applications as a service and provides them to users through the network. This is a change in service methods and a change in the shared data model. The main features of key management in the cloud environment in this mode are: [0004] (1) There are various levels of users, and different levels of security requirements for passwords and keys. Security requirements includ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0643H04L9/0819H04L9/302H04L9/3249H04L63/06H04L63/064H04L67/10
Inventor 汤殿华安红章白健何远杭
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products