Ownership authentication and key transmission method without losing entropy in ciphertext duplication elimination scene

A technology of ownership authentication and key, which is applied in the field of information security, can solve the problems that the ownership authentication of all file data cannot be guaranteed, the convergent encryption method cannot guarantee semantic security, and there is no secure key transmission method, so as to achieve semantic security and prevent The effect of privacy leakage and security guarantee

Active Publication Date: 2017-09-08
XIDIAN UNIV
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the patent divides the file data into blocks, and the ownership authentication process is based on the file data blocks. The server needs to challenge a certain number of file data blocks for zero-knowledge verification to realize the ownership authentication. This method can only complete the ownership authentication under certain probability conditions. The ownership authentication of all file data cannot be guaranteed. At the same time, file key distribution is carried out with the help of key distribution assistants. In the specific implementation process, higher security assumptions are required.
[0004] The above are some commonly used methods in client-side ciphertext deduplication scenarios. Among the known client-side ciphertext deduplication methods, the m

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ownership authentication and key transmission method without losing entropy in ciphertext duplication elimination scene
  • Ownership authentication and key transmission method without losing entropy in ciphertext duplication elimination scene
  • Ownership authentication and key transmission method without losing entropy in ciphertext duplication elimination scene

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0032] The following describes the present invention in further detail with reference to the drawings and specific embodiments:

[0033] Reference figure 1 , A method of ownership authentication and key transfer without loss of entropy in ciphertext deduplication scenarios, including the following steps:

[0034] Step 1. U1, the first uploader of the file, preprocesses the plaintext F and uploads the preprocessing result to the server. The implementation steps are as follows figure 2 Shown:

[0035] Step 1a) The first uploader U1 uses the md5 hash function to calculate the index value of the plaintext F h(F)=md5(F);

[0036] Step 1b) The first uploader U1 uses the independent pairwise hash method to calculate the large file digest H of the plaintext F without loss of entropy random (F):

[0037] Step 1b1) The first uploader U1 divides the plaintext F into blocks, and obtains the plaintext F={w 1 ,w 2 ,...,W i ,...,W l }, where w i Represents the plaintext F={w 1 ,w 2 ,...,W i ,...,W l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an ownership authentication and key transmission method without losing entropy in a ciphertext duplication elimination scene and is used for solving the problem that the ownership authentication security is low in the prior art and realizing key secure transmission in the ciphertext duplication elimination scene. The method comprises the realization steps that a first file uploader preprocesses a file and uploads a preprocessing result to a server; a follow-up uploader and the server carry out file ownership authentication interaction, if the file ownership authentication is successful, the server marks the follow-up uploader as a file owner and informs the follow-up uploader to delete a local file, thereby realizing client ciphertext duplication elimination, otherwise, the file ownership authentication is unsuccessful; and the file owner with successful file ownership authentication can access a file ciphertext of the server. According to the method, the file ownership authentication security is ensured, the file encryption key secure transmission is effectively realized, the user data privacy is protected, the operation quantity for ciphertext duplication elimination interaction is reduced, and the method can be used for carrying out duplication elimination on client ciphertext data in cloud storage.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to an ownership authentication and key transfer method, in particular to an ownership authentication and key transfer method without loss of entropy in a ciphertext deduplication scenario, which can be used in cloud storage services for clients Scenarios where encrypted file data is deduplicated. Background technique [0002] With the increasing application of cloud storage services, in order to save network bandwidth and storage resources, more and more enterprises and individuals begin to use cloud storage servers to store local file data. Among them, before the user uploads the file to the cloud storage server, in order to ensure data privacy and security, the user will choose to encrypt the file before uploading. This makes it impossible for different users who have the same file to upload their own encrypted data to deduplicate the cloud storage server, resulting in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/08G06F21/62
Inventor 何司蒙杨超姜奇李金库马建峰李丹平卢璐
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products