Three-party authentication and key agreement method, system and computer storage medium supporting data sharing across cloud domains
A data sharing and key negotiation technology, applied in the field of network security, can solve problems such as inefficiency and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0061] Embodiment 1: In this embodiment, three existing technical solutions are compared with the technical solution of the present invention, and the advantages of the technical solution of the present invention are illustrated by comparing the calculation overhead and communication overhead in the key agreement phase.
[0062] The three prior art solutions are: Patonico et al., Lu et al. and Ma et al.
[0063] The node participating in tripartite authentication and key agreement of the present invention is: U ij (users sharing data), C i (store U ij data cloud server) and U mu (Users registered under other cloud service providers).
[0064] The difference between the present invention and the above three prior art solutions lies not only in the different nodes participating in the authentication, but also in the different frameworks. The present invention refers to the service scope of each cloud service provider to its own users as a cloud domain. The sharer user acts a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com