Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-quantum computing cloud storage method and system based on alliance chain and implicit certificate

A quantum computing and implicit certificate technology, applied in the field of alliance chain, can solve the problems of anti-tampering, low anti-repudiation ability, data worries, user data decryption, etc., to avoid key leakage, improve security, and improve security sexual effect

Pending Publication Date: 2020-03-27
RUBAN QUANTUM TECH CO LTD +1
View PDF13 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Public cloud customers have worries about data migration to the cloud
[0008] 2. The current cloud storage directly and simply uses the public key cryptosystem, which cannot resist the attack of quantum computing
(1) The key management center is vulnerable to attacks and the entire cloud storage network is paralyzed
(2) Since the key management center controls all keys, if the key management center loses control and illegally decrypts user data, the consequences will be serious
(3) The key management center records the key usage of the cloud storage network for billing and other business activities, but the record's anti-tampering and anti-repudiation capabilities are not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing cloud storage method and system based on alliance chain and implicit certificate
  • Anti-quantum computing cloud storage method and system based on alliance chain and implicit certificate
  • Anti-quantum computing cloud storage method and system based on alliance chain and implicit certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0121] Example 1: Query whether the file exists:

[0122] User queries whether file F exists.

[0123] Step 1: User proposes a transaction.

[0124] User performs Hash calculation on file F to obtain HF.

[0125] User sends a transaction to N Endorsers, and the transaction tx can be expressed as {proposal, userSig'}.

[0126] The proposal can be expressed as {IDU, chaincodeID, txPayload, timestamp}. The chaincode chaincodeID is the number of the smart contract function; txPayload is the parameter of the function, which can be expressed as txPayload=HF. timestamp is the initiation time of the transaction.

[0127] userSig is the User's signature on the proposal. Set SIGN=ECDSA to get userSig=SIGN(proposal, SKU)={UR, US}.

[0128] User extracts the server public key pkU and pkSU from the key card, and calculates PKUR for offset calculation, which can be expressed as PKUR=H(IDU||HF||timestamp||pkU||pkSU). H(*) is a hash function that maps integers to points on an elliptic ...

Embodiment 2

[0143] Embodiment 2: The first user uploads a file:

[0144] Step 1: User1 proposes a transaction.

[0145] Suppose the first uploader of a file F is User1, the public and private key of User1 is PKU1 / SKU1, and the server public key stored in the key card is pkU1 / pkSU1.

[0146] After User1 finds that the file F does not exist through the query in Embodiment 1, he sends a transaction to N Endorsers, and the transaction tx can be expressed as {proposal, userSig'}.

[0147] User1 generates a random number KF as a file key.

[0148] User1 generates a file characteristic value according to the file, and uses the file characteristic value to encrypt the file key KF to obtain the data key DKF. The calculation method of the file feature value is a predefined algorithm, which can be but not limited to Hash calculation, file compression or other file feature calculation algorithms.

[0149] User1 generates a personal key PKF1. The process is as follows:

[0150] (1) User1 uses the...

Embodiment 3

[0184] Embodiment 3: The second user uploads a file:

[0185] Step 1: User2 proposes a transaction.

[0186] Let User2 be the non-first uploader of a certain file F, let User2’s public and private key be PKU2 / SKU2, and the server’s public key stored in the key card be pkU2 / pkSU2.

[0187] After User2 discovers the existence of the file F through the query in Embodiment 1, it generates a file characteristic value according to the file, and uses the file characteristic value to decrypt the data key DKF to obtain the file key KF. Then make the personal key PKF2 according to the file key KF, the specific steps are as follows:

[0188] (1) User2 uses the personal public key PKU2 and the ECIES algorithm to encrypt the file key KF to obtain ENC(KF, PKU2) = (KFR2, KFc2, KFt2).

[0189] (2) User2 extracts the server public keys pkU2 and pkSU2 from the key card, and calculates PKKFR2 for offset calculation, which can be expressed as PKKFR2=H(HF||pkU2||pkSU2).

[0190] (3) Calculate t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anti-quantum computing cloud storage method and system based on an alliance chain and an implicit certificate. The method is implemented among alliance chain members communicating with each other. The alliance chain members comprise client members and server members; the server side members comprise an Endorser, an Orderer and a Committer which are used for providing corresponding services; each party is configured with a key fob; a server public key pool, a server secret sharing private key pool and a client public key pool are stored in the server secret key card.Client private keys, private key parameters, server public keys and client public key pointer random numbers are stored in the client secret key cards; and an identity label and an implicit certificate are stored in the client secret key card. According to the method, file query is carried out on the cloud storage server based on the alliance chain and the implicit certificate, corresponding filetransmission is carried out according to the query result, the file transmission comprises uploading and downloading from the cloud storage server, and the file storage security is further improved.

Description

technical field [0001] This application relates to the field of consortium chains, in particular to a quantum computing-resistant cloud storage method and system based on consortium chains and implicit certificates. Background technique [0002] Blockchain is a brand-new distributed infrastructure and computing paradigm. It uses an ordered chained data structure to store data, uses consensus algorithms to update data, and uses cryptography to ensure data security. In blockchain-based transactions, ensuring the data security of transactions and the privacy of customers is a necessary condition for the further development of blockchain. For this reason, cryptography technology, especially public key cryptography, has been widely used in blockchain. The alliance chain is a branch of the blockchain, so it is also a distributed and decentralized public database. The difference from other chains is that it is aimed at members of specific groups and limited third parties. A pre-s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q40/04G06N10/00G06F21/62
CPCG06Q40/04G06N10/00G06F21/6227G06F2221/2107
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products