Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

31 results about "Pseudorandom permutation" patented technology

In cryptography, a pseudorandom permutation (PRP) is a function that cannot be distinguished from a random permutation (that is, a permutation selected at random with uniform probability, from the family of all permutations on the function's domain) with practical effort. An unpredictable permutation (UP) Fₖ is a permutation whose values cannot be predicted by a fast randomized algorithm. Unpredictable permutations may be used as a cryptographic primitive, a building block for cryptographic systems with more complex properties.

Cloud outsourcing privacy set comparison method and device

InactiveCN107196926AImprove securityImproving the efficiency of private collection comparisonsTransmissionCiphertextPseudorandom permutation
The invention discloses a cloud outsourcing privacy set comparison method and a cloud outsourcing privacy set comparison device, which relate to the field of communication technologies, and are used for solving the problems that security cannot be guaranteed, and the practicality and extendibility are not high existing in the existing outsourcing privacy set comparison protocol. The cloud outsourcing privacy set comparison method comprises the steps that: a first server receives a random number ri and a first ciphertext sent by a terminal, converts the first ciphertext into a second ciphertext and sends the second ciphertext and the random number ri to a second server; and the first server receives a second server random number r<S2> and a third ciphertext fed back by the second server, converts the third ciphertext into a fourth ciphertext and sends the fourth ciphertext and the second server random number r<S2> to the terminal, wherein the second server adopts a second server secret key K<S2> to obtain a pseudo-random permutation of a terminal set and calculates an intersection set of the pseudo-random permutation, the third ciphertext comprises the intersection set of the pseudo-random permutation of the terminal set and a pseudo-random function of the second server secret key K<S2>, and the fourth ciphertext comprises the intersection set of the pseudo-random permutation of the terminal set and a pseudo-random function of a terminal secret key Ki.
Owner:HENAN NORMAL UNIV

Integrity verification method based on active attack resistance in cloud storage

The invention discloses an integrity verification method with an active attack resistance, wherein the integrity verification method mainly settles a problem of incapability of resisting active attacks in prior art. The integrity verification method comprises the steps of 1, uniformly blocking a file by a user, generating a main label and an auxiliary label, selecting a cryptographic Hash function, a pseudo random function and a pseudo random substitution function; 2, transmitting file sub-blocks to a cloud service provider by the user, deleting a local file, generating inquiry information by the user and transmitting the inquiry information to the cloud service provider; 3, generating proving information by the cloud service provider, and resisting the active attack by the user through the proving information and unidirectionality of the Hash function; and 4, verifying the proving information by the user through locally generating verification information, wherein the proving information is transmitted by the cloud service provider, if verification passes, determining a fact that the user data are complete, and otherwise, determining a fact that the data are damaged. The integrity verification method has advantages of reducing communication traffic and improving active attack resistance. The integrity verification method can be used for data integrity verification under a precondition that a client which is supported in cloud storage loses a data ownership.
Owner:XIDIAN UNIV

Sequence cipher based search encryption method in cloud storage environment

The invention relates to a sequence cipher based search encryption method in a cloud storage environment. The sequence cipher based search encryption method in the cloud storage environment comprises the steps of realizing data security search by improving a key stream generation mode in sequence cipher encryption, and carrying out ECB encryption for a searched keyword to form a direct ciphertext; generating a random number by a pseudorandom generator, and generating a key stream by using the random number and the direct ciphertext through a pseudorandom replacement function; and finally carrying out XOR operation for the key stream and the direct ciphertext to obtain a concealed ciphertext, storing the concealed ciphertext at a server and accordingly building a query matching table; when a new search query occurs, firstly calculating a replacement key and then comparing data in the query matching table with the equality relationship among the concealed ciphertext of the current query session, and accordingly confirming the returned query result. The sequence cipher based search encryption method in the cloud storage environment can realize efficient data search of users, can increase the verification efficiency and can guarantee privacy security.
Owner:GUANGDONG UNIV OF TECH

File processing method, electronic equipment and storage medium

The embodiment of the invention discloses a file processing method, electronic equipment and a storage medium, and the file processing method comprises the steps: determining a first identification vector of a file according to the position of the file in a file set; generating a first storage position for storing a first identification vector according to the hash function and the feature vector of the file; determining a second identification vector according to a hash table corresponding to the hash function and the first identification vector; and storing the second identification vector into a second storage position obtained by performing pseudo-random permutation on the first storage position; wherein the second storage position is used for indicating the first storage position corresponding to the feature vector for searching the to-be-searched file according to the first identification vector of the to-be-searched file when the file is searched. Therefore, according to the second storage position, the corresponding file can be searched based on the position of the to-be-searched file in the file set, and a user does not need to provide an accurate keyword for searching, so that the file searching efficiency is improved.
Owner:卓尔智联(武汉)研究院有限公司

A cloud outsourcing privacy set comparison method and device

InactiveCN107196926BImprove securityImproving the efficiency of private collection comparisonsTransmissionCiphertextEngineering
The invention discloses a cloud outsourcing privacy set comparison method and a cloud outsourcing privacy set comparison device, which relate to the field of communication technologies, and are used for solving the problems that security cannot be guaranteed, and the practicality and extendibility are not high existing in the existing outsourcing privacy set comparison protocol. The cloud outsourcing privacy set comparison method comprises the steps that: a first server receives a random number ri and a first ciphertext sent by a terminal, converts the first ciphertext into a second ciphertext and sends the second ciphertext and the random number ri to a second server; and the first server receives a second server random number r<S2> and a third ciphertext fed back by the second server, converts the third ciphertext into a fourth ciphertext and sends the fourth ciphertext and the second server random number r<S2> to the terminal, wherein the second server adopts a second server secret key K<S2> to obtain a pseudo-random permutation of a terminal set and calculates an intersection set of the pseudo-random permutation, the third ciphertext comprises the intersection set of the pseudo-random permutation of the terminal set and a pseudo-random function of the second server secret key K<S2>, and the fourth ciphertext comprises the intersection set of the pseudo-random permutation of the terminal set and a pseudo-random function of a terminal secret key Ki.
Owner:HENAN NORMAL UNIV

Message identification method and electronic device

The embodiment of the invention provides a message identification method and an electronic device and belongs to the information security and password. According to the method, pseudorandom functions are constructed based on a short integer difficulty-solving problem, so that computational complexity and modulus can be reduced, and security and the accuracy of message identification can be improved. The message identification method includes the following steps that: a first electronic device receives a first message and a first authentication message which are transmitted by a second electronic device, and the cluster value domain of the pseudorandom functions is a finite abelian group; the first electronic device obtains bit strings and a pseudorandom function cluster, wherein the bit strings are the indexes of functions in the pseudorandom function cluster; the first electronic device searches a function Fb from the pseudorandom function cluster, the index of the function Fb being the bit string; the first electronic device adopts the first message as a parameter, and obtains a second authentication message according to the function Fb; and when the first authentication message is matched with the second authentication message, the first message is determined as a credible message.
Owner:HONOR DEVICE CO LTD

A search encryption method based on sequence cipher in cloud storage environment

The invention relates to a sequence cipher based search encryption method in a cloud storage environment. The sequence cipher based search encryption method in the cloud storage environment comprises the steps of realizing data security search by improving a key stream generation mode in sequence cipher encryption, and carrying out ECB encryption for a searched keyword to form a direct ciphertext; generating a random number by a pseudorandom generator, and generating a key stream by using the random number and the direct ciphertext through a pseudorandom replacement function; and finally carrying out XOR operation for the key stream and the direct ciphertext to obtain a concealed ciphertext, storing the concealed ciphertext at a server and accordingly building a query matching table; when a new search query occurs, firstly calculating a replacement key and then comparing data in the query matching table with the equality relationship among the concealed ciphertext of the current query session, and accordingly confirming the returned query result. The sequence cipher based search encryption method in the cloud storage environment can realize efficient data search of users, can increase the verification efficiency and can guarantee privacy security.
Owner:GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products