Anti-quantum computing cloud storage method and system based on public asymmetric key pool

A quantum computing and asymmetric technology, applied in the field of cloud storage, can solve problems such as cracking and data worries

Active Publication Date: 2019-01-04
RUBAN QUANTUM TECH CO LTD
View PDF7 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Public cloud customers have worries about data migration to the cloud
[0008] (2) The invention patent document with the publication number CN103236934A uses the user's public key to encrypt the file key. Since the quantum computer can quickly obtain the corresponding private key through the public key, this scheme is easy to be cracked by the quantum computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing cloud storage method and system based on public asymmetric key pool
  • Anti-quantum computing cloud storage method and system based on public asymmetric key pool
  • Anti-quantum computing cloud storage method and system based on public asymmetric key pool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] Figure 7 The timing diagram of the storage method provided by the embodiment of the present invention. Figure 9 It is a flowchart of a storage method provided by an embodiment of the present invention. The anti-quantum computing cloud storage method based on the public asymmetric key pool, the specific steps are as follows:

[0060] Step 1.1: The client uploads the Hash value of the data file and each algorithm ID to the server.

[0061] Before uploading the data file, the user terminal first calculates the Hash value of the data file, and uploads the Hash value to the server. At the same time, the ID of each algorithm (including the file key seed pointer function frfp and the file key function fkf, the same reason below) is also uploaded. In order to reduce the storage pressure, the server will deduplicate the ciphertext of the file, that is, identify duplicate files.

[0062] Step 1.2: The server identifies duplicate files.

[0063] The server considers the Has...

Embodiment 2

[0091] Figure 8 The timing diagram of the reading method provided by the embodiment of the present invention. Figure 10 It is a flow chart of a file reading method provided by an embodiment of the present invention. The file reading method in the anti-quantum computing cloud storage method based on the public asymmetric key pool, the specific steps are as follows:

[0092] Step 2.1: The client initiates a file read request.

[0093] The client sends the Hash value of the file to be read and the ID of each algorithm to the server.

[0094] Step 2.2: The server sends the corresponding information to the client.

[0095] After receiving the file Hash value and algorithm ID, the server finds the information corresponding to the Hash value and algorithm ID, and sends the ciphertext and personal key to the client.

[0096] Step 2.3: The client obtains the file key: the client uses the private key to decrypt the personal key to obtain the random number rf of the file key. Afte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-quantum computing cloud storage method and system based on a public asymmetric key pool. A client side encrypts a data file by using a file key and uploads the data file to a server, and a file key true random number is encrypted by a public key and a file eigenvalue to be uploaded to the server, wherein the public key is generated by a public key true random number. The server receives the stores the relevant data, the user side downloads the encrypted file key true random number and the public key true random number, and the public key true random number andthe key pool device are combined to generate the file key so as to decrypt the obtain the data file. The server side cannot contact all types of keys and data files of the user side. Meanwhile, the public key only open to the quantum key card is applied to encrypt the file key so as to reduce the possibility of key stealing of the malicious software. The quantum computer cannot obtain the user public key and then cannot obtain the corresponding private key so as to reduce the risk of quantum computer decoding.

Description

technical field [0001] The present invention relates to the field of cloud storage, in particular to a cloud storage security control method and system based on a public key pool. Background technique [0002] With the development of science and technology, cloud storage has increasingly become a trend, and various cloud storage technologies emerge in endlessly. In order to ensure the security of cloud storage data, various encryption methods are usually used to ensure data security. For example, through Asymmetric key encryption is used to ensure the security of data. Asymmetric key encryption requires the use of different keys to complete the encryption and decryption operations. One is publicly released, that is, the public key, and the other is kept secretly by the user, that is, the private key. . The information sender uses the public key to encrypt, and the information receiver uses the private key to decrypt. [0003] Since shared storage is mostly used in cloud st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/08
CPCH04L9/0852H04L63/0428H04L63/0442H04L67/06H04L67/1097
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products