Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anonymous Traitor Tracking Method Based on Compressive Sensing

A compressed sensing and rebel technology, applied in the field of information security, can solve the problems of not considering ciphertext authentication, not considering user anonymous authentication, security issues, etc.

Active Publication Date: 2020-02-21
XIDIAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The shortcomings of this method are: the solution proposed in this document belongs to the solution that the cloud will not modify the data stored on the cloud. Since the problem of ciphertext authentication is not considered, it cannot prevent malicious attackers from tampering with the ciphertext, and The sparse matrix that constitutes the information operator needs to be shared with the receiving user, which cannot prevent the receiving user from leaking the sparse matrix. At the same time, the problem of energy leakage is not considered. The signal data is vulnerable to energy attacks, which will cause serious security problems in practical applications. question
The shortcomings of this method are: the construction process only considers the deletion of users, does not consider the problem of user addition and recovery, and does not consider the problem of user anonymous authentication, and at the same time cannot determine the identity of the traitor through one input and output. Identity information cannot be directly used in the encryption process of dynamically deleting and restoring users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous Traitor Tracking Method Based on Compressive Sensing
  • Anonymous Traitor Tracking Method Based on Compressive Sensing
  • Anonymous Traitor Tracking Method Based on Compressive Sensing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0128] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0129] refer to figure 1 , to further describe in detail the specific steps for realizing the present invention.

[0130] Step 1, initialization.

[0131] The data provider DS randomly selects two large prime numbers p, q, satisfying q|(p-1), q>N, where | represents the modulo operation, N represents the total number of users to be registered at the data provider DS, p Indicates public parameters.

[0132] The data provider DS selects a safe hash function and a pseudo-random normal distribution matrix generator, and broadcasts the selected safe hash function and pseudo-random normal distribution matrix generator to user groups.

[0133] Using the pending registration share calculation formula, the data provider DS calculates each pending registration share value.

[0134] The formula for calculating the share to be registered is as follows:

[0135] f(i)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an anonymous rebel tracing method based on compressed sensing. The method comprises the realization steps of 1, carrying out initialization; 2, carrying out registration by a user; 3, recording user identity information by a data supplier DS; 4, carrying out preprocessing; 5, encrypting data through compressed sensing; 6, broadcasting ciphertexts; 7, carrying out subscription by the user; 8, authenticating an anonymous identity; 9, issuing a session key; 10, issuing a decryption key; 11, decrypting the ciphertexts; 12, tracking identity information of an anonymous rebel;13, repealing the user; 14, recovering the repealed user; and 15, increasing a new user. According to the method, the ciphertext integrity protection and energy leakage problems in an existing compressed sensing encryption scheme are solved, moreover, when the anonymous rebel leaks the key to the other user, a rebel user can be traced, the integrated security of a system is improved, and the method can be applied to efficient encryption transmission of sensitive data in the Internet of things or a cloud encryption system.

Description

technical field [0001] The invention belongs to the technical field of information security, and further relates to an anonymous traitor tracking method based on compressed sensing in the technical field of encryption. Based on compressed sensing, the present invention proposes an encryption method that can be used for ciphertext authentication and energy encryption in an online database, and realizes tracking of anonymous treacherous users. Background technique [0002] Signal sampling is an essential means to connect the analog physical world to the digital information world. For many years, the theoretical basis of signal sampling has been the well-known Nyquist sampling theorem. The theorem states that a signal can only be accurately reconstructed if the sampling rate is more than twice the signal bandwidth. However, with the increase of people's demand for information, the bandwidth of the signal carrying information is getting wider and wider, such as ultra-wideband ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/32H04L29/06
CPCH04L9/0643H04L9/0819H04L9/0869H04L9/0894H04L9/3242H04L63/0428H04L63/062H04L63/08
Inventor 高军涛张鹏贾文娟
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products