Unlock instant, AI-driven research and patent intelligence for your innovation.

Cloud data semi-quantum security sharing method and system based on proxy re-encryption

A proxy re-encryption and data sharing technology, applied in digital transmission systems, public keys and key distribution for secure communications, can solve difficult data sharing, inability to flexibly achieve fine-grained secret data sharing, complexity and Difficulty increase and other problems, to achieve the effect of anti-chosen plaintext attack security, fine-grained secret data sharing, and anti-chosen ciphertext attack security

Active Publication Date: 2020-08-04
上海鲸孚科技有限公司
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is currently no scheme for quantum proxy re-encryption
[0005] Through the above analysis, the existing problems and defects of the prior art are as follows: (1) The classic proxy re-encryption scheme provided by the prior art cannot realize one-time encryption, especially when the same data is shared multiple times
Poor security against chosen plaintext attacks and chosen ciphertext attacks during each sharing of the same data
[0006] (2) Some previous data sharing schemes cannot flexibly realize fine-grained secret data sharing
[0007] (3) The existing quantum secret sharing technology requires the preparation of multi-particle entangled states, or requires quantum Fourier transform and d-level quantum systems, resulting in increased complexity and difficulty in communication
It is difficult to achieve fine-grained data sharing for a specific data
[0010] (3) Most of the existing quantum secret sharing technologies rely on the entanglement characteristics of entangled states to realize secret sharing, so it is necessary to prepare multi-particle entangled states that are more complex than Bell states, or to perform Bell state measurements, Z-based measurements, or Reflecting more complex measurements or operations, the difficulty of implementation is greatly increased, and current technical means are almost impossible to achieve; there are also some quantum secret sharing schemes that use quantum Fourier transform to achieve quantum secret sharing. Quantum Fourier transform has high theoretical efficiency. However, in the specific implementation, it is necessary to realize the complex quantum circuit composed of multiple H gates and controlled revolving gates (such as the simplest controlled S gate and T gate) of the d-level quantum system, which is more difficult to realize. The current technical means almost impossible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data semi-quantum security sharing method and system based on proxy re-encryption
  • Cloud data semi-quantum security sharing method and system based on proxy re-encryption
  • Cloud data semi-quantum security sharing method and system based on proxy re-encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0070] The semi-quantum secure sharing method of cloud data based on proxy re-encryption provided by the embodiment of the present invention includes:

[0071] User Alice uses a quantum random number generator to generate an n-bit binary random number R, R∈{0,1} n , the user Alice puts n-bit binary data M(M∈{0,1} n ) before storing in the cloud server, encrypt M with R. That is, the encrypted data of user Alice is stored on the cloud computing server C A ∈{0,1} n . When user Alice's data is to be shared by user Bob, user Alice is the authorizer, user Bob is the assignee, and the cloud server is the proxy. User Alice shares a 2n-bit binary key K with the agent in advance using the quantum key distribution protocol, K∈{0,1} 2n .

[0072] Specifically include:

[0073] Step 1: Alice prepares 2n Bell states according to K, and the preparation rule is: "0" prepares φ + state, "1" prepares ψ - state. in,

[0074] Step 2: Alice keeps one particle in each Bell state and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of quantum communication, and discloses a cloud data semi-quantum security sharing method and system based on proxy re-encryption, and the method comprisesthe steps: enabling an authorization end to generate a binary random number through a quantum random number generator, encrypting binary data through the random number, and storing the binary data into a cloud server; enabling the authorization end and the cloud server to share a binary key through a quantum key distribution protocol; enabling the authorization end to use a random number to encrypt the shared key as a conversion key and send the conversion key to the cloud server; and enabling the cloud server to use the shared key encryption conversion key as a final conversion key, and usethe final conversion key to convert the encrypted data stored in the cloud server into secret data which can be shared by the receiving end, and enabling the receiving end to decrypt the secret data by using the own key to perform data sharing. Compared with some quantum secret sharing schemes based on an entangled state or quantum computing, the loud data semi-quantum security sharing method andsystem do not need to prepare a multi-particle entangled state, and do not need quantum Fourier transform and a d-level quantum system, thereby reducing the complexity and difficulty of implementation.

Description

technical field [0001] The invention belongs to the technical field of quantum communication, and in particular relates to a semi-quantum secure sharing method and system for cloud data based on proxy re-encryption. Background technique [0002] At present, while cloud storage provides convenience for the storage and sharing of massive data, it also brings security risks. In terms of data sharing, most of the previous practices were to directly store data on the server, and then restrict it through access control methods, so that users with access rights can share it. However, this approach is not suitable for the cloud computing environment, because storing data in plain text cannot guarantee the confidentiality requirements for service providers, and once the cloud data service center is illegally invaded, the security of user data will be lost live. [0003] Proxy re-encryption is a method of secret sharing, but it is different from common secret sharing. In general, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30H04L29/06
CPCH04L9/0852H04L9/0869H04L9/30H04L63/0884
Inventor 昌燕张仕斌
Owner 上海鲸孚科技有限公司