Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security duplicate removal method based on threshold blind signature

A technology of data security and blind signature, applied in secure communication devices and key distribution, can solve the problem of large computational overhead for signature verification, and achieve the effect of low communication overhead and low computational overhead

Active Publication Date: 2019-07-02
CHANGCHUN UNIV OF SCI & TECH
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the existing problem that n key management nodes are used to blindly sign messages at the same time, a large amount of information needs to be exchanged between key management nodes, and the calculation overhead of verifying signatures is relatively large, the present invention provides a blind signature based on threshold Data security deduplication method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security duplicate removal method based on threshold blind signature
  • Data security duplicate removal method based on threshold blind signature
  • Data security duplicate removal method based on threshold blind signature

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0023] Specific implementation mode 1. Combination figure 1 and figure 2 Describe this embodiment, the data security deduplication method based on the threshold blind signature, the entities involved in the present invention: master key node, n sub-key nodes, client (user), cloud storage node.

[0024] Master key node: The master key node must be safe and reliable, generate the master key and public key, publicize the public key, generate part of the private key of each sub-key node, and share it securely with the sub-key node .

[0025] Key sub-node: There are multiple key sub-nodes, which receive part of the private key generated by the master key node, use it to sign the blinded message of the client, and return the result to the client.

[0026] Client (user): The client blinds the message, sends it to the sub-key node, then combines t (t≤n) blind signatures, obtains the encryption key after deblinding, and finally encrypts the data with the encryption key and sends it ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security duplicate removal method based on a threshold blind signature. The invention relates to the field of digital signatures in information security, and solves theproblems that n key management nodes are adopted to perform blind signing on messages at the same time, a large amount of information needs to be interacted among the key management nodes, and the calculation overhead for verifying signatures is large. System initialization is firstly performed, and a main key node generates a public key and a public key; the n sub-key nodes are numbered as k1, k2,..., kn, and a t-1-order polynomial is constructed: f(x)=a0+a1x+...+a<t-1>x<t-1>; partial private keys corresponding to each sub-key node: f(k1), f(k2),...,f(kn), are calculated and safely transmitted to the sub-key nodes; and then the client blinds the message, and sends the blinded message to the sub-key node. And the sub-key node signs the message and returns the message to the client. And theclient uploads the ciphertext data to the cloud server. According to the method provided by the invention, a single-point fault problem does not exist, the main key node can be offline after initialization is completed, and the n sub-key nodes only need at least t available sub-key nodes to complete subsequent steps.

Description

technical field [0001] The invention relates to the field of digital signatures in information security, in particular to a method for safely deduplicating data based on threshold blind signatures, which is used to solve the problem of safe deduplication of ciphertext data. Background technique [0002] As more and more data is backed up by the data center disaster recovery system, storage efficiency has become an urgent problem to be solved, mainly storage space utilization and data transmission efficiency. Therefore, it is necessary to introduce data deduplication technology to delete a large amount of redundant data. On the other hand, in order to ensure the confidentiality of data, users must encrypt the data before storing and transmitting it. However, the encrypted ciphertext of the same data is usually different, which brings great challenges to data deduplication. How to realize the safe deduplication of encrypted data become an important direction of future research...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/08H04L9/32H04L29/06H04L29/08
CPCH04L63/0428H04L63/062H04L9/0643H04L9/0819H04L9/0894H04L9/3242H04L9/3257H04L67/1097
Inventor 祁晖李锦青底晓强杜金雷从立钢任维武毕琳解男男蒋振刚
Owner CHANGCHUN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products