Safe and effective client deduplication protocol based on proofs of ownership
A client and protocol technology, applied in the field of communication, can solve problems such as security risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0027] The present invention will be further described below in conjunction with examples.
[0028] This embodiment provides a secure and effective client deduplication protocol based on proof of possession, including:
[0029] Initialization: This protocol includes three subjects, namely the client, the key server and the cloud server; the system initializes the security factor, and the key server selects its own private key and public key for communication with the client; secondly, the cloud server selects its own private key and public key;
[0030] The client interacts with the key server to obtain the encryption key of the file: in order to obtain the encryption key of the uploaded file, the client needs to communicate with the key server; the client first uses the hash function to process the message to be uploaded, and then blindly The key server signs the blinded message with its own private key, and then returns the signature to the client. The client verifies the s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com