Unlock instant, AI-driven research and patent intelligence for your innovation.

An Identity-Based Authorized Third-Party Data Integrity Proof Method

A data integrity and identity technology, applied in the field of information security, can solve the problems of huge cost of certificate library management and maintenance, communication overhead and implementation complexity, inability to meet user needs, etc. Communication overhead and the effect of protecting user privacy

Active Publication Date: 2019-02-12
四川杰通交通科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the user cannot complete the verification process by himself and does not want any third party to verify his own data, the above two types of solutions will not be able to meet the user's needs
[0006] In addition, most of the existing verification schemes are based on the traditional public key certificate architecture. When users or third parties perform data integrity verification, they need to query the public key certificate first, which brings additional communication overhead and implementation complexity to the verification.
At the same time, the management and maintenance of the certificate library is also costly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Identity-Based Authorized Third-Party Data Integrity Proof Method
  • An Identity-Based Authorized Third-Party Data Integrity Proof Method
  • An Identity-Based Authorized Third-Party Data Integrity Proof Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be specifically described below.

[0023] 1.1 Preliminary knowledge - bilinear mapping.

[0024] Let G 1 is a p (p is a large prime number) factorial cyclic group with generator g, G 2 is a multiplicative cyclic group of the same order. A bilinear pairing is a mapping that satisfies the following properties [26] e:G 1 ×G 1 →G 2 .

[0025] (1) Bilinearity: for any There is e(g 1 2 , g 2 b ) = e(g 1 , g 2 ) ab .

[0026] (2) Non-degenerate: e(g, g)≠1.

[0027] (3) Computability: There is always an efficient algorithm to compute the mapping e.

[0028] 1.2 Meaning of symbols used.

[0029]

[0030]

[0031]

[0032]

[0033]

[0034]

[0035] H, H 1 , h is an encrypted hash function, is a pseudorandom function, and S is a random permutation function.

[0036] 1.3 Identity-based authorized third-party data integrity certification protocol, including 5 stages.

[0037] 1. Key and authorization generation. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based authorized third party data integrity proving method. The method is designed based on double-line pair and identity encryption technologies. By embedding user authorization evidence into generation of a data block tag to be stored, the purpose that only the third party with user authorization can complete remote data integrity checking is achieved. The invention puts forward an identity-based authorized third party proving method beyond the existing remote data private verification and public verification, and meets the need for privacy protection while realizing user-entrusted verification. In addition, the method ensures the fairness between a data owning party and a data storing party. The data storing party inspects a data block-tag pair uploaded by the data owning party in order to prevent malicious users from uploading wrong data and unreasonable claim over the storing party caused thereby.

Description

technical field [0001] The present invention relates to information security technology. Background technique [0002] Cloud computing is an important direction for the development of information technology and a basic technology in the era of big data. It has become a hot spot in the development of the current information industry due to its powerful computing and storage capabilities and its ability to provide users with on-demand services, and it has been gradually applied in practice. [0003] As an important part of cloud computing, cloud storage has begun to be widely accepted and used. Users can store data on remote cloud servers according to their own needs, so as to reduce the burden of hardware purchase and maintenance, and at the same time gain the convenience of accessing at any time. However, precisely because users do not actually store data, this uncontrollability brings data security risks to users. [0004] The cloud service provider may not store user da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/123
Inventor 赵洋熊虎陈阳任华强包文意岳峰王士雨吴世坤
Owner 四川杰通交通科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More