Anti-quantum computing cloud storage security control method and system based on public key pool
A security control and key pool technology, applied in the field of cloud storage, can solve problems such as cracking and data worries
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] Figure 6 The timing diagram of the storage method provided by the embodiment of the present invention. Figure 8 It is a flow chart of a storage method provided by an embodiment of the present invention, a security control method for anti-quantum cloud storage based on a public key pool, and the specific steps are as follows:
[0053] Step 1.1: The client uploads the Hash value of the data file and each algorithm ID to the server.
[0054] Before uploading the data file, the user terminal first calculates the Hash value of the data file, and uploads the Hash value to the server. At the same time, the ID of each algorithm (including the file key seed pointer function frfp and the file key function fkf, the same reason below) is also uploaded. In order to reduce the storage pressure, the server will deduplicate the ciphertext of the file, that is, identify duplicate files.
[0055] Step 1.2: The server identifies duplicate files.
[0056] The server considers the Has...
Embodiment 2
[0082] Figure 7 The timing diagram of the storage method provided by the embodiment of the present invention. Figure 9 It is a flow chart of a file reading method provided by an embodiment of the present invention, a quantum-resistant cloud storage security control method based on a public key pool, and the specific steps are as follows:
[0083] Step 2.1: The client initiates a file read request.
[0084] The client sends the Hash value of the file to be read and the ID of each algorithm to the server.
[0085] Step 2.2: The server sends the corresponding information to the client.
[0086] After receiving the Hash value and algorithm ID of the file, the server finds the information corresponding to the Hash value and algorithm ID, and sends the ciphertext, personal key and public key random number to the client.
[0087] Step 2.3: The client gets the file key.
[0088] The client obtains the public key key through the random number of the public key key. The specific p...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com