Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-quantum computing cloud storage security control method and system based on public key pool

A security control and key pool technology, applied in the field of cloud storage, can solve problems such as cracking and data worries

Active Publication Date: 2019-01-04
RUBAN QUANTUM TECH CO LTD
View PDF6 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Public cloud customers have worries about data migration to the cloud
[0008] (2) The invention patent document with the publication number CN103236934A uses the user's public key to encrypt the file key. Since the quantum computer can quickly obtain the corresponding private key through the public key, this scheme is easy to be cracked by the quantum computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing cloud storage security control method and system based on public key pool
  • Anti-quantum computing cloud storage security control method and system based on public key pool
  • Anti-quantum computing cloud storage security control method and system based on public key pool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Figure 6 The timing diagram of the storage method provided by the embodiment of the present invention. Figure 8 It is a flow chart of a storage method provided by an embodiment of the present invention, a security control method for anti-quantum cloud storage based on a public key pool, and the specific steps are as follows:

[0053] Step 1.1: The client uploads the Hash value of the data file and each algorithm ID to the server.

[0054] Before uploading the data file, the user terminal first calculates the Hash value of the data file, and uploads the Hash value to the server. At the same time, the ID of each algorithm (including the file key seed pointer function frfp and the file key function fkf, the same reason below) is also uploaded. In order to reduce the storage pressure, the server will deduplicate the ciphertext of the file, that is, identify duplicate files.

[0055] Step 1.2: The server identifies duplicate files.

[0056] The server considers the Has...

Embodiment 2

[0082] Figure 7 The timing diagram of the storage method provided by the embodiment of the present invention. Figure 9 It is a flow chart of a file reading method provided by an embodiment of the present invention, a quantum-resistant cloud storage security control method based on a public key pool, and the specific steps are as follows:

[0083] Step 2.1: The client initiates a file read request.

[0084] The client sends the Hash value of the file to be read and the ID of each algorithm to the server.

[0085] Step 2.2: The server sends the corresponding information to the client.

[0086] After receiving the Hash value and algorithm ID of the file, the server finds the information corresponding to the Hash value and algorithm ID, and sends the ciphertext, personal key and public key random number to the client.

[0087] Step 2.3: The client gets the file key.

[0088] The client obtains the public key key through the random number of the public key key. The specific p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anti-quantum cloud storage security control method and system based on a public key pool. The user side uploads the data file encrypted by a file key to a server, wherein the file key is generated by combination of the file key true random number generated by the quantum key card and the key pool device; the server receives the stores the user side relevant data; and the user side downloads the personal key, the public key true random number and the encrypted data file and generates the file key by using combination of the file key true random number and the key pool device so as to decrypt and obtain the data film. The server side cannot contact all the keys and the plaintext data files of the user side and the user side only discloses the encrypted public keyand stores the public key by the key card, and the key card is the independent hardware isolation equipment and the possibility of key stealing by the malicious software or the malicious operation canbe greatly reduced. The quantum computer cannot obtain the user public key and then cannot obtain the corresponding private key so that the scheme is not liable to be decoded by the quantum computer.

Description

technical field [0001] The invention relates to the field of cloud storage, in particular to a quantum-resistant cloud storage security control method and system based on a public key pool. Background technique [0002] With the development of science and technology, cloud storage has increasingly become a trend, and various cloud storage technologies emerge in endlessly. In order to ensure the security of cloud storage data, various encryption methods are usually used to ensure data security. For example, through Asymmetric key encryption is used to ensure the security of data. Asymmetric key encryption requires the use of different keys to complete the encryption and decryption operations. One is publicly released, that is, the public key, and the other is kept secretly by the user, that is, the private key. . The information sender uses the public key to encrypt, and the information receiver uses the private key to decrypt. [0003] Since shared storage is mostly used i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0825H04L9/0852H04L9/0869H04L63/045H04L67/1097
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products