Unlock instant, AI-driven research and patent intelligence for your innovation.

A Resource Sharing Method of Untrustworthy Cloud Center Based on Hill Computation and Chaos

A resource sharing and chaotic technology, applied in the field of cloud security, can solve problems such as key leakage, key leakage, hacker attacks, etc., and achieve the effect of reducing the possibility of guessing and cracking

Active Publication Date: 2021-05-14
SOUTH CHINA UNIV OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method ensures that the cloud center cannot obtain the original resource content, there are two risks in this method
First of all, although the person to be shared is the person you trust, as the number of people to be shared increases, the risk of key key leakage increases. In many cases, the key leakage is not the leaker's own will, but accidental or hacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Resource Sharing Method of Untrustworthy Cloud Center Based on Hill Computation and Chaos
  • A Resource Sharing Method of Untrustworthy Cloud Center Based on Hill Computation and Chaos
  • A Resource Sharing Method of Untrustworthy Cloud Center Based on Hill Computation and Chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to better understand the present invention, the present invention will be further described below in conjunction with the accompanying drawings and embodiments, but the embodiments of the present invention are not limited thereto.

[0040] Embodiment: client A shares a resource with client B by using an algorithm based on Hill encryption algorithm and chaos theory, and the resource is a string "abcd".

[0041] 1. Client A encrypts resources and uploads them to the cloud center

[0042] Client A maps the shared string resource to a numerical array s={97,98,99,100}, and the mapping method is to take the ascii code of the string "abcd";

[0043] 1.1 Client A generates initial key k 1 , k 1 It is a quaternion (S1={}, u=3.5699457, x=0.5, n=2), where u, x, n are random numbers, and the value range of u is 3.5699456<u<=4, and the value of x The value range is: 0<x<1, n is 2, and S1 is a randomly generated n*n reversible square matrix;

[0044] 1.2 Client A calls t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an untrustworthy cloud center resource sharing method based on Hill operation and chaos; in the method, the client A invokes the chaotic encryption and decryption function, and encrypts the resource s with the initial key k1; creates a target key k 2 , calculate the process key k3; encrypt the target key k2 with the public key of client B to obtain the encrypted key PBK; send the process key k3 and the encrypted key PBK to the cloud center; the cloud center records A resource sharing list; the cloud center responds to the client B's download request through a quick response; after the client B obtains the PBK and e2 from the cloud center, it finally obtains the decrypted shared resource. The sharing process of the present invention does not require the client to participate in specific encryption operations; and it ensures that the sharer can view the plaintext information of the resource but does not have the ability to modify the plaintext information of the resource, which solves the problem of high algorithm complexity and pressure on the client when sharing encrypted resources. big problem.

Description

technical field [0001] The invention relates to an encrypted resource sharing method of an untrustworthy cloud, in particular to a method for sharing resources of an untrustworthy cloud center based on Hill calculation and chaos, and belongs to the technical field of cloud security. Background technique [0002] For the encrypted key to be shared, as the number of people to be shared increases, the possibility of the key being leaked increases. At the same time, the person who has the key has the ability to modify the original text, which is insufficient in security. [0003] A more reasonable approach is to use only one unique symmetric key Key for the encryption of the original document, and only one encrypted resource on the server. When resources need to be shared, the document key Key is encrypted with the public key of the target party and uploaded to the server. After obtaining it, the target party decrypts it with its own private key to obtain the key of the document...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/08
CPCH04L9/001H04L9/0825H04L9/0869
Inventor 李拥军彭昊潘宇聪谢嵘
Owner SOUTH CHINA UNIV OF TECH