Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Ciphertext conversion method in heterogeneous storage system, decryption method and decryption system

A technology of ciphertext conversion and heterogeneous storage, applied in transmission systems, digital transmission systems, and key distribution, which can solve the problems of not knowing other users, affecting work progress, and unable to designate authorized visitors.

Active Publication Date: 2017-08-22
STATE GRID CORP OF CHINA +2
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] If the traditional asymmetric encryption algorithm or identity-based encryption algorithm is applied to the cloud storage system, you will encounter such a problem: when the user encrypts data, he does not know which other users will request to access his data in the future, so he cannot Designate authorized visitors
This simple method will bring a relatively large calculation burden and cumbersome operation process to the design company. When the amount of data is large, it will seriously reduce the efficiency of the storage system, and then affect the work progress of both parties.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext conversion method in heterogeneous storage system, decryption method and decryption system
  • Ciphertext conversion method in heterogeneous storage system, decryption method and decryption system
  • Ciphertext conversion method in heterogeneous storage system, decryption method and decryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0030] The following introduces the basic knowledge of mathematics and cryptography involved in the secure ciphertext conversion method:

[0031] 1. Bilinear pairing

[0032] Define a function mapping e(.,.), the group G that maps the elements in the group G T in, namely:

[0033] e: G×G→G T ;

[0034] For a large prime number p, the bilinear pairing satisfies the following properties:

[0035] (1), bilinear characteristics: for g, h∈G; a, b∈Z p ,Z p Represents the set {0, 1, 2, ..., p-1}, there is: e(g a , h b ) = e(g, h) ab ;

[0036] (2), non-degenerate: there is at least one element g in the G group, so that the calculated e(g, g) is G T a generator of a grou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a ciphertext conversion method in a heterogeneous storage system, a decryption method and a decryption system, wherein the ciphertext conversion method comprises the steps of: on the basis of the identity ID of an authorized visitor appointed by a data owner, and the public key pair and the private key pair of the system, obtaining an identity-based decryption private key associated with the identity ID of the authorized visitor; on the basis of the access strategy appointed by the data owner and the identity-based decryption private key, obtaining a conversion key through an attribute-based encryption method; and, on the basis of the conversion key, converting an identity-based ciphertext to obtain an attribute-based ciphertext. By means of the ciphertext conversion method in the heterogeneous storage system, the decryption method and the decryption system provided by the invention, on the premise that a plaintext is not leaked, the identity-based ciphertext is converted into the attribute-based ciphertext; the fact that two encryption systems independently operate and are not influenced mutually can be ensured; and thus, a safe and effective way is provided for sharing secret data by users of two sets of storage systems having different encryption algorithms.

Description

technical field [0001] The present invention relates to encrypted data migration technology, and more specifically, to a ciphertext conversion method, a decryption method and a system in a heterogeneous storage system. Background technique [0002] Since the development of modern cryptography technology, various cryptosystems have been produced to meet different purposes. According to whether the keys held by the two communicating parties are the same, cryptosystems can be divided into two categories: symmetric cryptosystems and asymmetric cryptosystems. Symmetric encryption uses symmetric cipher coding technology, and its feature is that the same key is used for file encryption and decryption, that is, the encryption key can also be used as the decryption key. This method is called a symmetric encryption algorithm in cryptography. Unlike symmetric encryption algorithms, asymmetric encryption algorithms require two keys: a public key (public key) and a private key (private ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0825H04L9/0847H04L63/0428
Inventor 邓桦周云雅罗伟付暾
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products