Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Inspectable Privacy Communication Method Based on Secret Sharing Scheme

A communication method and a technology of secret sharing, which is applied in the field of monitorable private communication, can solve problems such as methods that do not have content review, and achieve the effects of reducing storage complexity, ensuring privacy, and protecting rights and interests

Active Publication Date: 2021-07-20
曹鸣佩
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it has more or less only one aspect of the function, that is, it either has private communication but does not have the method of reviewing the content, or the service provider stores the communication records in plain text to realize the function of content review and cannot avoid service provision. the possibility that the merchant will retain the communication records for other purposes
At this stage, no matter what kind of instant messaging tool, it is not possible to monitor the content under special circumstances on the basis of privacy protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Inspectable Privacy Communication Method Based on Secret Sharing Scheme
  • An Inspectable Privacy Communication Method Based on Secret Sharing Scheme
  • An Inspectable Privacy Communication Method Based on Secret Sharing Scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0094] The implementation of the present invention will be illustrated by specific specific examples below, and those skilled in the art can easily understand other advantages and effects of the present invention from the contents disclosed in this specification.

[0095] It is well known to those skilled in the art that the technical solution of the present invention adopts a mature encryption scheme. For the field of cryptography, the encryption algorithm that has been verified and widely used is mature and effective. Using these mature encryption schemes, it can be realized in the ciphertext Protect the security of the original text in case of leakage.

[0096]In reality, the user side, service provider, and supervisory side do not trust each other, that is, the interaction between the three parties is based on an untrusted model, and any two parties cannot form an offensive and defensive alliance. Therefore, in the process of cooperative decryption by multiple parties, eac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A monitorable privacy communication method based on a secret sharing scheme. The privacy communication method includes the user side, the service provider and the monitoring side. The user side includes the sender and the receiver. The sender and the receiver use point-to-point communication or In many-to-many communication, the sender and receiver conduct secret key negotiation through the DH protocol; after the secret key negotiation is completed, the session key will be formed according to the sender, receiver's team members, service provider and monitoring Split the secret key according to the number of parties; distribute the split secret key to the sender, receiver team members, service provider and supervisor, and the team members encrypt the received split secret key; the service provider Receive the encrypted key of the group members and the assigned split key; the monitoring party receives the assigned split key. The invention solves the contradiction between the existing user's private communication and the service provider's content monitoring, protects the user's private communication to the greatest extent, and realizes point-to-point and many-to-many private communications that can be monitored.

Description

technical field [0001] The invention relates to the technical field of data communication, in particular to a privacy-monitoring communication method based on a secret sharing scheme. Background technique [0002] Since the invention of the instant messaging tool, it has been widely used, but there are always irreconcilable contradictions in terms of user privacy security and service provider content supervision. The specific manifestation is that users want their communication information to be protected by privacy and refuse to be viewed by others; and service providers often need to review user communication information out of consideration for content security. [0003] Privacy security is currently a concern of citizens, especially for privacy protection in communication, which has become a hot topic of research and discussion. For private communication, there are currently mature private communication protocols, such as a protocol based on the RSA algorithm to exchang...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04L12/58
CPCH04L9/0838H04L9/085H04L51/04H04L63/0428H04L63/061
Inventor 曹鸣佩孙雨夕赵吉敏
Owner 曹鸣佩
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products