A Resource Sharing Method of Untrustworthy Cloud Center Based on Hill Computation and Chaos
A resource sharing and chaotic technology, applied in the field of cloud security, can solve problems such as key leakage, key leakage, hacker attacks, etc., and achieve the effect of reducing the possibility of guessing and cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] In order to better understand the present invention, the present invention will be further described below in conjunction with the accompanying drawings and embodiments, but the embodiments of the present invention are not limited thereto.
[0040] Embodiment: client A shares a resource with client B by using an algorithm based on Hill encryption algorithm and chaos theory, and the resource is a string "abcd".
[0041] 1. Client A encrypts resources and uploads them to the cloud center
[0042] Client A maps the shared string resource to a numerical array s={97,98,99,100}, and the mapping method is to take the ascii code of the string "abcd";
[0043] 1.1 Client A generates initial key k 1 , k 1 It is a quaternion (S1={}, u=3.5699457, x=0.5, n=2), where u, x, n are random numbers, and the value range of u is 3.5699456<u<=4, and the value of x The value range is: 0<x<1, n is 2, and S1 is a randomly generated n*n reversible square matrix;
[0044] 1.2 Client A calls t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


