Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A cloud storage encryption, decryption and verification method and system

A cloud storage and decryption key technology, which is applied in the transmission system, digital transmission system, advanced technology, etc., can solve the problems of the increase of encryption and decryption operations, the bottleneck of computing overhead, and the difficulty of mobile devices, so as to shorten the encryption time and reduce the Effect of Computational Amount and Energy Consumption

Active Publication Date: 2022-05-06
GUANGDONG UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

One of the main defects of the traditional ABE scheme is that the encryption and decryption operations increase with the increase of the complexity of the access strategy, and the resulting calculation overhead is a fatal bottleneck for resource-constrained mobile devices (such as mobile phones)
[0003] In practical applications, users may need to use mobile devices to perform encryption and decryption work. The amount of calculation generated by the existing encryption and decryption process consumes too much energy, which is unbearable for mobile devices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud storage encryption, decryption and verification method and system
  • A cloud storage encryption, decryption and verification method and system
  • A cloud storage encryption, decryption and verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0066] The embodiment of the present invention discloses a cloud storage encryption method, see figure 1 As shown, applied to the data upload terminal, the method includes:

[0067] S11: Generate a temporary ciphertext in advance using the encryption parameters used for encryption in the system public parameters.

[0068] Specifically, the system public parameters are generated by the attribute authority using security parameters. After the generation, the at...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a cloud storage encryption, decryption and verification method and system, which is applied to a data upload terminal, including: generating temporary ciphertext in advance using the encryption parameters used for encryption in the system public parameters; using the system public parameters for verification Complete data verification parameters, temporary ciphertext, plaintext data, and access structure to generate outsourced ciphertext; send outsourced ciphertext to the cloud server; this application pre-uses system public parameters for encryption when the data upload terminal has sufficient energy The encryption parameters are used to generate temporary ciphertext, and the part of the encryption process that consumes too much energy in the encryption process using the system public parameters for encryption is preprocessed in advance, so that even in the case of insufficient energy, the amount of calculation when encrypting data is reduced. And energy consumption, you can directly use the temporary ciphertext, verification parameters, plaintext data and access structure to generate outsourced ciphertext, shorten the encryption time, and reduce the amount of calculation and energy consumption.

Description

technical field [0001] The invention relates to the field of cloud storage ciphertext access control, in particular to a cloud storage encryption, decryption and verification method and system. Background technique [0002] Attribute-based encryption (ABE) is a scalable one-to-many encryption mechanism that allows users to encrypt and decrypt data based on user attributes, and is ideal for flexible and fine-grained access to encrypted data stored in the cloud control. One of the main defects of the traditional ABE scheme is that the encryption and decryption operations increase with the increase of the complexity of the access strategy, and the resulting computational overhead is a fatal bottleneck for resource-constrained mobile devices (such as mobile phones). [0003] However, in practical applications, users may need to use mobile devices to perform encryption and decryption work. The calculation amount generated by the existing encryption and decryption process consume...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04W12/03G06F21/60
CPCH04L63/045H04L63/10H04L63/123H04W12/02G06F21/602H04W12/03Y02D30/70
Inventor 凌捷石宇清李斯谢锐
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products