Cloud storage data verification method and system based on elliptic curve cryptography

An elliptic curve encryption and data verification technology, which is applied in the field of cloud storage data verification method and system based on elliptic curve encryption, can solve problems affecting data verification efficiency, etc.

Inactive Publication Date: 2018-02-16
GUANGDONG UNIV OF TECH +1
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In practical applications, the choice of encryption algorit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage data verification method and system based on elliptic curve cryptography
  • Cloud storage data verification method and system based on elliptic curve cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] refer to figure 1 , a cloud storage data verification method based on elliptic curve encryption, comprising the following steps:

[0052] Generate the user's private key and user's public key through the key generation algorithm based on elliptic curve;

[0053] Generate a label set according to the input data file and the user's private key, and send the label set, the input data file and the user's public key to the cloud server;

[0054] The verifier receives the challenge request sent by the user, combines the tag set and the input data file, generates a challenge set and sends it to the cloud server;

[0055] After receiving the challenge set, the cloud server combines the label set, the input data file and the user's public key to generate a proof set and return it to the verifier;

[0056] The verifier performs evidence verification according to the evidence set, challenge set and the user's public key, obtains the verification result of the evidence and return...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud storage data verification method and system based on elliptic curve cryptography. The method comprises the following steps: generating a private key of a user and a public key of the user through an elliptic curve based key generation algorithm; generating a tag set according to input data files and the private key of the user, and sending the tag set, the input data files and the public key of the user to a cloud server; enabling a verifier to receive a challenge request launched by the user, generating a challenge set in combination with the tag set and the input data files, and sending the challenge set to the cloud server; after the cloud server receives the challenge set, generating an evidence set in combination with the tag set, the input data files and the public key of the user, and returning the evidence set to the verifier; and enabling the verifier to perform evidence verification according to the evidence set, the challenge set and the public key of the user to obtain a verification result of evidences, and returning the verification result to the user. The cloud storage data verification method and system disclosed by the invention havethe advantages of security and high efficiency, and can be widely applied to the field of cloud storage.

Description

technical field [0001] The invention relates to the technical field of cloud storage, in particular to a method and system for verifying cloud storage data based on elliptic curve encryption. Background technique [0002] With the vigorous development of computer technology, the application of cloud computing is becoming more and more extensive. Users store data on cloud servers, which not only reduces the storage burden brought by local storage, but also makes data accessible to users anytime and anywhere. At the same time, the security of data on cloud servers has become the most concerned issue for users when using cloud storage. Cloud service providers are semi-trusted. Even if they can provide devices with higher security, unauthorized third parties may maliciously tamper with them, steal users' stored data, or cause data damage due to incorrect operations by administrators. Therefore, data integrity verification is particularly important. [0003] At present, the da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/32H04L29/08H04L29/06
CPCH04L9/3066H04L9/32H04L63/1441H04L67/1097
Inventor 凌捷吴颖豪任明峰罗玉谢锐殷启军
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products