Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for extracting ciphertext based on random matrix

A random matrix and ciphertext technology, applied in the field of data security, can solve problems such as good protection of data confidentiality, and achieve the effect of ensuring confidentiality and availability

Inactive Publication Date: 2016-03-02
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the existing re-encryption technologies, many of them are encrypted twice for symmetric keys. Because the original file is relatively large, symmetric encryption is required in consideration of efficiency; in order to realize functions such as signature and access control, it is necessary to The encryption algorithm that introduces the public key system, such as attribute encryption ABE, the source of the secondary encryption is generally a symmetric key, and the ciphertext obtained through symmetric encryption will be directly stored in the cloud server, which is curious based on the cloud server. The assumption that data confidentiality cannot be well protected by a symmetric encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for extracting ciphertext based on random matrix

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] Step 1: Generate a random matrix according to the requirements, which will be kept secretly by the authorization center. The introduction of the random matrix is ​​to save the generation of each random extraction vector, thereby improving efficiency; each row in the matrix is ​​required to have no For repeated elements, all elements in the matrix must be sufficiently random. In this step, an n×n secret matrix will be obtained;

[0024] Step 2: Determine a segmentation granularity g (such as 2KB) as the size of the ciphertext component. According to the size f of the ciphertext file, the size of the segmentation granularity should also be different. According to this segmentation granularity, the file is divided into m encrypted files. Text components, where m=f / g, in this step, m ciphertext components will be output;

[0025] Step 3: Label the m ciphertext components output in step 2 starting from 1, and label the last file block as m. The labeling is to provide a basis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for extracting a ciphertext based on a random matrix. The method mainly comprises ciphertext segmentation and ciphertext recombination, which are separately used for sequentially segmenting a ciphertext into blocks with the same size and randomly combining different blocks to form components of two ciphertexts, wherein the randomization is accomplished by a random matrix. The method can well ensure the confidentiality, integrity and availability of data, and is suitable for the application scenarios of data sharing in cloud computing.

Description

technical field [0001] The invention relates to the field of data security, in particular to a method for extracting ciphertext files. Background technique [0002] With the increasing development of Internet technology, a large amount of data is generated on the network every day, how to ensure the security of these data has become a big problem; at the same time, the application of cloud computing is also hindered by the risk of data confidentiality, to solve these The most direct idea of ​​the problem is to encrypt the data to ensure the confidentiality of the data. In addition, integrity and availability are also characteristics that secure data should have. In the application scenario of data sharing in cloud computing, data confidentiality, integrity, and availability are even more required. [0003] At present, there have been many related issues regarding data security in the above scenarios, such as file credibility deletion, access control, integrity verification,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/32
CPCH04L9/0656H04L9/3249
Inventor 陈伟王燚刘鑫忠
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA