Verifiable security outsourcing calculation method and system for identification cryptosystem

A technology of identifying passwords and security outsourcing, which is applied in the field of verifiable security outsourcing computing methods and systems, can solve problems such as long time consumption, and achieve the effect of ensuring execution speed and saving computing resources

Active Publication Date: 2022-03-29
SHANDONG UNIV
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For IoT terminal devices with very limited computing resources, it takes a long time to complete these calculations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable security outsourcing calculation method and system for identification cryptosystem
  • Verifiable security outsourcing calculation method and system for identification cryptosystem
  • Verifiable security outsourcing calculation method and system for identification cryptosystem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0044] It should be noted that the following detailed description is exemplary and intended to provide further explanation of the present invention. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.

[0045] It should be noted that the terminology used here is only for describing specific embodiments, and is not intended to limit exemplary embodiments according to the present invention. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combinations thereof.

[0046] Su...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a verifiable security outsourcing calculation method and system for an identification cryptosystem, and for a part needing outsourcing, Internet of Things terminal equipment firstly splits confidential parameters involved in each step, and then sends the encrypted parameters and some public parameters to two servers for calculation. And after the two servers complete corresponding calculation, the calculation results are returned to the Internet of Things terminal equipment, and the Internet of Things terminal equipment verifies the correctness of the returned results by using the verification information generated in the splitting process. And if the verification is passed, the Internet of Things terminal device carries out calculation to obtain a real calculation result. The method can be used for outsourcing calculation of algorithms such as identification-based data encryption, digital signature and signcryption, and the operation time of the Internet of Things terminal equipment can be saved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a verifiable and secure outsourcing calculation method and system for identifying a cryptographic system. Background technique [0002] The statements in this section merely provide background information related to the present invention and do not necessarily constitute prior art. [0003] With the cross-integration and mutual promotion of big data and Internet of Things technology, massive terminal devices in the Internet of Things, as an important means of data collection, continuously generate a large amount of data and upload it to the data center, forming a network infrastructure for the interconnection of everything and data circulation . Among them, security issues such as device identity authentication of massive IoT terminals and transmission encryption of confidential and sensitive data are becoming more and more important. [0004] The ident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/40
CPCH04L9/085H04L9/3247H04L63/0428H04L2209/72Y02P90/30
Inventor 孔凡玉李洪军
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products