Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implementation technology of general access strategy in cloud storage

A technology for accessing structures and subsets, used in instruments, digital transmission systems, secure communication devices, etc.

Active Publication Date: 2020-12-22
LANZHOU UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention uses the Chinese remainder theorem on the polynomial ring to establish a general access structure, avoids the nonlinear integer programming problem of solving multiple large prime numbers, and only needs to deal with an integer linear programming problem like the Lagrangian interpolation scheme; At the same time, it solves the different weights of different users; provides an algorithm to quickly find the modulo operator to quickly find the reduced polynomial suitable for the scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation technology of general access strategy in cloud storage
  • Implementation technology of general access strategy in cloud storage
  • Implementation technology of general access strategy in cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] The specific implementation of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0089] The implementation example of the present invention provides a general access structure using the Chinese remainder theorem on polynomial rings. In order to construct a general access structure, it is first necessary to use the policies of the general access structure to determine the maximum forbidden set and the minimum authorized set, and then to assign user weights, secondly to use the Chinese remainder theorem on the polynomial ring to carry out secret sharing, and finally the secret refactoring phase.

[0090] The following section first introduces the determination of the maximum forbidden set and the minimum authorized set, then introduces how to determine the modulus of the Chinese remainder theorem, then introduces how to perform secret sharing, and finally introduces the reconstruction of the secret.

[0091] 1. Deter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an implementation technology of a general access strategy in cloud storage. According to the technology, a general access structure is constructed by utilizing the Chinese remainder theorem on a polynomial ring Fp [x]. An irreducible polynomial is used as the modulus of the Chinese remainder theorem, and the number of times of the polynomial is determined by solving the integer linear programming problem and is in direct proportion to the rights of users. The constraint condition of integer linear programming depends on the characteristics of a general access structure.The technology has perfect security and does not depend on any calculation difficulty problem. The method comprises three steps of access structure preprocessing, secret distribution and secret reconstruction. Wherein the preprocessing stage comprises the steps of determining a maximum forbidden set and a minimum authorized set, determining modulus, establishing constraint conditions and determining the number of times of an irreducible polynomial. The secret sharing stage comprises the steps of searching for an irreducible polynomial fi (x) of corresponding times, generating a sub-secret Si,and distributing the sub-secret. And the secret reconstruction stage comprises the step of recovering a secret formula by utilizing the Chinese remainder theorem to obtain a secret S.

Description

technical field [0001] The invention relates to secret sharing in the field of information security and access control in cloud storage, in particular to a general access structure. Background technique [0002] Data sharing is the main feature of today's era, and the development of the Internet of Things, cloud storage and cloud computing has further promoted its wide application. As the protection of data usage rights and personal privacy issues become increasingly prominent, the encryption of data stored on the cloud has become an important means of data sharing, thereby providing a secure environment for data sharing. In cloud outsourcing computing, encrypted data requires legitimate users to access data, but illegal users cannot access data. Therefore, constructing a legalized access strategy for cloud outsourcing data has become a key task. Among various access strategies, the general access strategy allows various combinations of users to obtain the decryption key of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06G06F21/62
CPCH04L9/085H04L63/205G06F21/6218
Inventor 贾星星郭钰生宋祎璇罗向阳
Owner LANZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products