Client-side deduplication method
A technology of deduplication and client-side, applied in the field of information security, can solve the problems of factors that ensure the freshness of authentication, the security of the scheme is difficult to prove, and cannot resist replay attacks. sexual effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] Symbols and abbreviations:
[0041] F is the file owned by FU, the first file uploader;
[0042] τ is the first file encryption key randomly generated by the first file uploader FU;
[0043] C F The ciphertext of the first file obtained by encrypting F for the first file uploader FU;
[0044] δ is the first key extracted from F by the first file uploader FU;
[0045] C τ The ciphertext obtained by encrypting the first file encryption key τ for the first file uploader;
[0046] SHA-1 is a secure hash algorithm (Secure Hash Algorithem);
[0047] MLE is the information locking encryption algorithm;
[0048] hash(F) is the hash value of file F;
[0049] F'is the file owned by the subsequent file uploader SU;
[0050] hash(F') is the hash value of file F';
[0051] β is the random number generated by the server;
[0052] δ'is the second key extracted from F'by the subsequent file uploader SU;
[0053] τ'decrypts C for the subsequent file uploader SU τ The obtained second file encryption key; ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


