Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Monitorable privacy communication method based on secret sharing scheme

A communication method and secret sharing technology, applied in the field of monitoring privacy communication, can solve problems such as methods that do not have content censorship

Active Publication Date: 2019-03-19
曹鸣佩
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it has more or less only one aspect of the function, that is, it either has private communication but does not have the method of reviewing the content, or the service provider stores the communication records in plain text to realize the function of content review and cannot avoid service provision. the possibility that the merchant will retain the communication records for other purposes
At this stage, no matter what kind of instant messaging tool, it is not possible to monitor the content under special circumstances on the basis of privacy protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitorable privacy communication method based on secret sharing scheme
  • Monitorable privacy communication method based on secret sharing scheme
  • Monitorable privacy communication method based on secret sharing scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0094] The implementation of the present invention will be illustrated by specific specific examples below, and those skilled in the art can easily understand other advantages and effects of the present invention from the contents disclosed in this specification.

[0095]Those skilled in the art know that the technical scheme of the present invention adopts a mature encryption scheme. For the field of cryptography, the encryption algorithm that has been verified and widely used is mature and effective. Using these mature encryption schemes, it can be realized in the ciphertext Protect the security of the original text in case of leakage.

[0096] In reality, the user side, service provider, and supervisory side do not trust each other, that is, the interaction between the three parties is based on an untrusted model, and any two parties cannot form an offensive and defensive alliance. Therefore, in the process of cooperative decryption by multiple parties, each party is unwill...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a monitorable privacy communication method based on a secret sharing scheme. The privacy communication method comprises a user side, a service provider, and an monitor side. The user side comprises a sender and a receiver. Point-to-point communication or many-to-many communication between the sender and the receiver is adopted. A key agreement is performed between the sender and the receiver through a DH protocol. After the key agreement is completed, a session key formed is divided according to the number of the sender, the receiver, the service provider, and the monitor side, and the divided key is assigned to the sender, the receiver, the service provider, and the monitor side. Then, a group member encrypts the received divided key. The service provider receivesthe encrypted key and the assigned divided key. The monitor side receives the assigned divided key. According to the monitorable privacy communication method based on a secret sharing scheme, the contradiction between the privacy communication of users and the content monitoring from the service provider in the prior art can be solved; privacy communication of users can be protected to the greatest extent; and point-to-point and many-to-many monitorable privacy communication can be achieved.

Description

technical field [0001] The invention relates to the technical field of data communication, in particular to a privacy-monitoring communication method based on a secret sharing scheme. Background technique [0002] Since the invention of the instant messaging tool, it has been widely used, but there are always irreconcilable contradictions in terms of user privacy security and service provider content supervision. The specific manifestation is that users want their communication information to be protected by privacy and refuse to be viewed by others; and service providers often need to review user communication information out of consideration for content security. [0003] Privacy security is currently a concern of citizens, especially for privacy protection in communication, which has become a hot topic of research and discussion. For private communication, there are currently mature private communication protocols, such as a protocol based on the RSA algorithm to exchang...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L12/58
CPCH04L9/0838H04L9/085H04L51/04H04L63/0428H04L63/061
Inventor 曹鸣佩孙雨夕赵吉敏
Owner 曹鸣佩
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products