Anti-quantum computing cloud storage method and system based on public asymmetric key pool
A quantum computing and asymmetric technology, applied in the field of cloud storage, can solve problems such as cracking and data worries
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] Figure 7 The timing diagram of the storage method provided by the embodiment of the present invention. Figure 9 It is a flowchart of a storage method provided by an embodiment of the present invention. The anti-quantum computing cloud storage method based on the public asymmetric key pool, the specific steps are as follows:
[0060] Step 1.1: The client uploads the Hash value of the data file and each algorithm ID to the server.
[0061] Before uploading the data file, the user terminal first calculates the Hash value of the data file, and uploads the Hash value to the server. At the same time, the ID of each algorithm (including the file key seed pointer function frfp and the file key function fkf, the same reason below) is also uploaded. In order to reduce the storage pressure, the server will deduplicate the ciphertext of the file, that is, identify duplicate files.
[0062] Step 1.2: The server identifies duplicate files.
[0063] The server considers the Has...
Embodiment 2
[0091] Figure 8 The timing diagram of the reading method provided by the embodiment of the present invention. Figure 10 It is a flow chart of a file reading method provided by an embodiment of the present invention. The file reading method in the anti-quantum computing cloud storage method based on the public asymmetric key pool, the specific steps are as follows:
[0092] Step 2.1: The client initiates a file read request.
[0093] The client sends the Hash value of the file to be read and the ID of each algorithm to the server.
[0094] Step 2.2: The server sends the corresponding information to the client.
[0095] After receiving the file Hash value and algorithm ID, the server finds the information corresponding to the Hash value and algorithm ID, and sends the ciphertext and personal key to the client.
[0096] Step 2.3: The client obtains the file key: the client uses the private key to decrypt the personal key to obtain the random number rf of the file key. Afte...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com