File ownership proof method based on convergence encryption

A technology of convergent encryption and ownership, applied in the field of communication security, it can solve the problems that the protocol is no longer secure, increase the client computing overhead, etc., and achieve the effect of increasing the difficulty, reducing the computing overhead, and reducing the communication overhead.

Inactive Publication Date: 2015-12-09
XIDIAN UNIV
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this type of method is that the file is still represented by a short fixed message. When this information is leaked or stolen, the protocol will no longer be secure.
In addition, the user needs to construct a Merkle hash tree according to the file before the protocol starts, which increases the calculation overhead of the client when the file is large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File ownership proof method based on convergence encryption
  • File ownership proof method based on convergence encryption
  • File ownership proof method based on convergence encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings.

[0026] refer to figure 1 , the implementation steps of the present invention are as follows:

[0027] Step 1, the key generation center KGC generates system parameters.

[0028] (1a) Set the safety parameter α≥160 of the system according to the actual requirements;

[0029] (1b) The key generation center KGC selects a value greater than 2 according to the security parameter α of the system α The prime number q of , construct the first multiplicative cyclic group G with q as order 1 , the second multiplicative cyclic group G 2 and the third multiplicative cyclic group G T , and make them satisfy from G 1 and G 2 Group to G T The bilinear mapping relation e of the group, that is, from the first multiplicative cyclic group G 1 Neutralize the second multiplicative cyclic group G 2 Take an element A and B as input respectively, then from the third multiplicative c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file ownership proof method based on convergence encryption, which mainly solves the problem in the prior art that the security of taking a hash value as an ownership evidence is bad. The implementation steps are as follows: step 1 of generating a system parameter, a server key and a user key by a key generation center; step 2 of detecting whether the user is a first user that uploads files by the server; step 3 of performing block encryption on the files by the first uploading user and uploading the files; step 4 of issuing an ownership proof request by the server, generating an inquiry value and transmitting the inquiry value to the client; step 5 of performing ownership proof the client receives the inquiry value; step 6 of performing ownership verification after the server receives a reply by the server, and after that, continuing to upload a bidirectional authentication between the user and the client. According to the file ownership proof method based on the convergence encryption provided by the invention, a signature of an original data block is adopted as an evidence of owning the files, thus the security of the evidence can be improved, the network upload bandwidth and cloud server storage overhead can be reduced, and the method can be used for supporting a cloud storage system across client data deduplication.

Description

technical field [0001] The invention belongs to the field of communication security, and mainly relates to a method for proving file ownership, which can be used in a cloud storage system supporting data deduplication across clients, so as to reduce network upload bandwidth overhead and cloud storage server storage overhead. Background technique [0002] With the rapid development of cloud storage business, the amount of data stored by users has shown explosive growth. In order to maximize the utilization of upload bandwidth and reduce storage space overhead, cloud storage service providers should try their best to avoid duplication of data uploads. Data deduplication is a technical method widely used in cloud storage systems at present. For files or data blocks with the same content, the cloud storage server only keeps one copy. Data deduplication can be performed on the server, client side, or both. Among them, client-side deduplication has the good characteristics of re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L63/0869H04L9/3247H04L63/0435H04L63/062H04L67/06
Inventor 张跃宇毛峥李晖陈杰庞婷杨碧云林晨
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products