Method for extracting ciphertext based on random matrix
A random matrix and ciphertext technology, applied in the field of data security, can solve problems such as good protection of data confidentiality, and achieve the effect of ensuring confidentiality and availability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0023] Step 1: Generate a random matrix according to the requirements, which will be kept secretly by the authorization center. The introduction of the random matrix is to save the generation of each random extraction vector, thereby improving efficiency; each row in the matrix is required to have no For repeated elements, all elements in the matrix must be sufficiently random. In this step, an n×n secret matrix will be obtained;
[0024] Step 2: Determine a segmentation granularity g (such as 2KB) as the size of the ciphertext component. According to the size f of the ciphertext file, the size of the segmentation granularity should also be different. According to this segmentation granularity, the file is divided into m encrypted files. Text components, where m=f / g, in this step, m ciphertext components will be output;
[0025] Step 3: Label the m ciphertext components output in step 2 starting from 1, and label the last file block as m. The labeling is to provide a basis...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
