Cloud outsourcing key sharing device and method
A key sharing and key technology, which is applied to secure communication devices and key distribution, can solve problems such as low efficiency, participant information privacy, security threats, cloud computing that cannot meet the individual needs of users, and prevent fraud effect of behavior
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0052] Such as figure 1 As shown, in this scheme, in the key distribution stage, the distributor encrypts the key sub-share and digitally signs the ciphertext, and then uses a one-way hash function to perform a one-way hash operation on the key, and sends the result to the cloud tenant. In the key reconstruction stage, the cloud tenant sends sub-shares to the cloud service provider, and the cloud service provider verifies the cloud tenant data through a signature verification algorithm. Next, the cloud service provider uses fully homomorphic technology to operate on the ciphertext, and The final result is returned to the cloud tenant. In the decryption verification phase, the cloud tenant decrypts the calculation result and verifies the correctness of the cloud service provider's calculation result through a one-way hash function. In the entire cloud outsourcing key sharing process, cloud tenants only need a small amount of decryption and verification operations, and there is...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

