Unlock instant, AI-driven research and patent intelligence for your innovation.

Cloud outsourcing key sharing device and method

A key sharing and key technology, which is applied to secure communication devices and key distribution, can solve problems such as low efficiency, participant information privacy, security threats, cloud computing that cannot meet the individual needs of users, and prevent fraud effect of behavior

Inactive Publication Date: 2018-11-13
HENAN NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Regardless of whether it is a key reconstruction scheme with the participation of a trusted person or a scheme without a trusted person’s participation in the key reconstruction scheme, there is a serious problem: in the process of key reconstruction, protective measures cannot be taken in advance to ensure that the participants do not Motivation to deviate from the protocol, in this way, the privacy and security of participants' information are threatened, and correct results cannot be obtained
[0010] (1) The existing key sharing technology requires a lot of time-consuming calculations in the key distribution and reconstruction stages, and it is not well applicable to smart phones, tablet computers, PDAs and other devices with weak computing power and relatively small memory space , unable to meet the individual needs of users and adapt to the current rapid development of cloud computing;
[0011] (2) Existing methods to ensure that cloud tenants abide by the agreement honestly use commitment schemes, zero-knowledge proofs, and multi-party coin-tossing protocols, which require multiple rounds of interactions between tenants and are not very practical;
[0012] (3) The existing method of verifying the calculation results of cloud service providers adopts probabilistic proof or non-interactive argumentation, and the verification method is complex and inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud outsourcing key sharing device and method
  • Cloud outsourcing key sharing device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Such as figure 1 As shown, in this scheme, in the key distribution stage, the distributor encrypts the key sub-share and digitally signs the ciphertext, and then uses a one-way hash function to perform a one-way hash operation on the key, and sends the result to the cloud tenant. In the key reconstruction stage, the cloud tenant sends sub-shares to the cloud service provider, and the cloud service provider verifies the cloud tenant data through a signature verification algorithm. Next, the cloud service provider uses fully homomorphic technology to operate on the ciphertext, and The final result is returned to the cloud tenant. In the decryption verification phase, the cloud tenant decrypts the calculation result and verifies the correctness of the cloud service provider's calculation result through a one-way hash function. In the entire cloud outsourcing key sharing process, cloud tenants only need a small amount of decryption and verification operations, and there is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a device for sharing a cloud outsourcing key. The device comprises the following units: a key distribution unit for transmitting results to cloud tenants in a manner that a distributor encrypts key sub-shares, signs a ciphertext digital, and then uses a one-way hash function for the one-way hash operation of a key; a cloud outsourcing computing unit for transmitting the sub-shares to a cloud service provider through the cloud tenants so that the cloud service provider verifies data of the cloud tenants by a signature verification algorithm, and then the cloud service provider uses a fully homomorphic technology to operate the ciphertext and returns the final results to the cloud tenants; and an decryption verification unit for decrypting the computing results by the cloud tenants and verifying the accuracy of the cloud service provider through the one-way hash function. The present invention also provides a method for sharing the cloud outsourcing key.

Description

technical field [0001] The invention relates to the technical field of encryption in cloud outsourcing services, in particular to a cloud outsourcing key sharing device and method. Background technique [0002] Key sharing is an important research content in the field of network security, and it is also the cornerstone of many security protocols. In classical key sharing protocols, it is assumed that some participants are honest and others are malicious. The honest person always abides by the agreement, and the malicious person can deviate from the agreement at will. There are two types of classical key sharing algorithms: one is a scheme in which a trusted person participates in key reconstruction; the other is a scheme in which no trusted person participates in key reconstruction and all participants themselves complete it. Whether it is a key reconstruction scheme with the participation of a trusted person or a scheme without the participation of a trusted person, there...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/08
CPCH04L9/085H04L9/3242H04L9/3247H04L63/06H04L67/10
Inventor 张恩刘亚鹏段新涛彭杰孙林朱文焌王英杰代丽萍罗冰李锐申晓雪
Owner HENAN NORMAL UNIV