A method, system and related device for verifying the correctness of a set of ciphertext files

A correctness verification and ciphertext file technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as inability to verify data correctness, large computing overhead, and inability to verify ciphertext file collections

Active Publication Date: 2022-02-25
QINGDAO UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, most of the schemes that have been proposed to support the correctness verification of ciphertext file sets are based on MAC (Message Authentication Code), but MAC cannot resist replay attacks, that is, it cannot verify whether the searched ciphertext file set is the latest
If the cloud server does not update the data that should be updated or returns the data before the update after the update, the MAC authentication mechanism is adopted, and the data user cannot verify the correctness of the data
In order to solve this problem, some schemes propose RSA accumulators or bilinear map accumulators based on the public key system to verify and update data, but public key operations will cause a large amount of computational overhead, making verification a task. burden

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, system and related device for verifying the correctness of a set of ciphertext files
  • A method, system and related device for verifying the correctness of a set of ciphertext files
  • A method, system and related device for verifying the correctness of a set of ciphertext files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The core of the present application is to provide a method for verifying the correctness of a ciphertext file set, which can avoid a large amount of calculation overhead and reduce the verification burden when verifying the correctness of a ciphertext file set. Another core of the present application is to provide a system, device, and computer-readable storage medium for verifying the correctness of a set of ciphertext files.

[0038] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for verifying the correctness of a ciphertext file set provided by this application includes: receiving the ciphertext file set and the corresponding authentication label sent by the cloud server; wherein, the authentication label is to substitute a preset private key into a specific label generation function, Obtained by pseudo-random operation, pseudo-random permutation and corresponding accumulation operation; use the ciphertext file set and the preset initial verification label to calculate the verification label corresponding to the ciphertext file set; compare the authentication label and the verification label to verify the ciphertext file The correctness of the collection. In this method, the authentication label is obtained by substituting the preset private key into a specific label generation function through pseudo-random operation, pseudo-random permutation and corresponding accumulation operation, which can avoid a large amount of calculation overhead and reduce the verification burden. The present application also provides a system, device and computer-readable storage medium for verifying the correctness of a set of ciphertext files, all of which have the above beneficial effects.

Description

technical field [0001] The present application relates to the field of verifying the correctness of a set of ciphertext files, in particular to a method, system, device and computer-readable storage medium for verifying the correctness of a set of ciphertext files. Background technique [0002] At present, most of the schemes that have been proposed to support the verification of the correctness of the ciphertext file set are based on MAC (Message Authentication Code), but MAC cannot resist replay attacks, that is, it cannot verify whether the searched ciphertext file set is up-to-date. If the cloud server does not update the data that should be updated or returns the data before the update after the update, the MAC authentication mechanism is adopted, and the data user cannot verify the correctness of the data. In order to solve this problem, some schemes propose RSA accumulators or bilinear map accumulators based on the public key system to verify and update data, but publ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/20
CPCH04L63/12H04L9/0656
Inventor 于佳葛新瑞郝蓉
Owner QINGDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products