CN107786662A - A kind of efficient communication message processing method - Google Patents

A kind of efficient communication message processing method Download PDF

Info

Publication number
CN107786662A
CN107786662A CN201711044380.9A CN201711044380A CN107786662A CN 107786662 A CN107786662 A CN 107786662A CN 201711044380 A CN201711044380 A CN 201711044380A CN 107786662 A CN107786662 A CN 107786662A
Authority
CN
China
Prior art keywords
user
cloud server
file
mrow
privately owned
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711044380.9A
Other languages
Chinese (zh)
Inventor
詹习生
张先鹤
吴杰
姜晓伟
高红亮
韩涛
万里光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei Normal University
Original Assignee
Hubei Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei Normal University filed Critical Hubei Normal University
Priority to CN201711044380.9A priority Critical patent/CN107786662A/en
Publication of CN107786662A publication Critical patent/CN107786662A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention belongs to communication technical field, disclose a kind of efficient communication message processing method, communication port is activated by communication information receiving terminal, category filter can be carried out to the communication information simultaneously, obtain and authentication is carried out to communication information receiving terminal using the identity information of communication information receiving terminal, and communication information receiving terminal is re-send to after the communication information is encrypted, so that the communication information receiving terminal by authentication, the communication information could be obtained, so that the communication information is not easy to be obtained by any third party, and the communication information obtained is by encryption, the privacy of the communication information is protected well, improve security.The communication means of the present invention realizes the transmission of message between different task by the combination of transponder and queue simultaneously, changes the pattern of message in queue to transmitting the control of attribute of queue, can also increase the use range of communication means of the invention.

Description

A kind of efficient communication message processing method
Technical field
The invention belongs to communication technical field, more particularly to a kind of efficient communication message processing method.
Background technology
Information and mechanics of communication are the new concept and new skill that information technology is blended and formed with mechanics of communication Art field.The conventional communication technology and information technology are two entirely different categories:The communication technology focuses on the biography that message is propagated Feed technique, and information technology focuses on coding or the decoding of information, and the transmission means in communications carrier.With the hair of technology Exhibition, both technologies slowly become inseparable, so as to which fusion turns into a category gradually.However, information is led in the prior art Letter privacy cannot be protected, and security is very low;Existing communication method use range is limited simultaneously.
Cloud computing can provide a user the resource service for the virtualization for seeming unlimited by internet, and in this process In conceal platform and concrete implementation details.Cloud service provider of today can spend relatively low into offer height can originally The computing resource of storage service and large-scale parallel.With the popularization of cloud computing technology, increasing data are collected In the user that plays cause and have specified authority share
Cloud storage service of today is faced with a stern challenge, is how in the case where data increase on a large scale Realize effective management to these data.In order to realize the scalability of data management in cloud computing environment, data de-duplication Technology has attracted increasing concern.Data de-duplication technology is a kind of special data compression technique, and it is used to delete The copy of the repetition of identical data in cloud computing.The technology is used to improve space utilisation, and can apply in network number According to reducing necessary transmission byte in transmitting procedure.It is different from identical data are preserved with multiple copies, data de-duplication skill Art only retains identical data a physical copy and points to the copy with this identical data by other.Although duplicate data is deleted Except technology brings many benefits, but from internal or external security threat for the security of user's sensitive data and hidden The influence of private, and need to consider a problem.Although traditional encipherment scheme can provide data security, and repeat number The problem of incompatible be present according to deletion system.
Specifically, in legacy encryption scheme, different users encrypts the data of oneself with each different keys, Therefore, the identical data from different user has different ciphertext forms, and this causes the deletion of duplicate data to be difficult to.Receive Hold back encryption and provide a feasible method to realize data de-duplication.It is in one data trnascription of enciphering/deciphering One convergent key, the key are produced by calculating the cryptographic Hash of the encryption of the data trnascription content.Sum is generated in key After encryption, user retains the key and ciphertext is sent in cloud.Due to using determinacy encryption, so identical Data trnascription will produce identical convergence key and identical ciphertext.
In order to prevent unwarranted access, it is necessary to which possessing agreement with the provable data of a safety provides an evidence To prove that user really possesses and duplicated that file of copy.After proof, server will be that these have phase identical text The user of part each assigns a pointer, and user and need not upload the identical file.User can be carried using server The pointer of confession downloads encrypted file, and this document can only be decrypted by corresponding data owner using key is restrained. Therefore, convergent encryption technology can allow mysorethorn to show the data de-duplication to ciphertext, and can be by providing proof of ownership To avoid access of the unauthorized user to file.However, former data deduplication system is not supported to be classified authority Iterative testing, but this kind of iterative testing is highly important in numerous applications.For example, in a company, permitted More different authorities will be assigned to employee.For cost-effective and effective management, data will be transferred in public cloud Storage server provider (Cloud Server), one is only similarly preserved to identical file using data de-duplication technology Duplicate of the document.Moreover, for the consideration of privacy, some files will be encrypted and only allow some to have the use for specifying authority Family carries out rechecking, so as to realize access control.
Traditional data deduplication system is based on convergence property, although it is provided for data to a certain extent Confidentiality, but it does not support the copy inspection of different rights.In other words, in the duplicate data based on convergence encryption technology In deletion system, the problem of not considering relevant difference mandate.Because the copy of data deduplication and different rights checks originally It is conflicting.
In order to prove the deficiencies in the prior art, one is designed first with foregoing token generator TagGen (F, kp) Such data deduplication system.Assuming that there is n user in system, they are combined into the collection of authorityIt is right In each p select a kp, for the set for possessing an authority PUUser U, he will be allocated a key set
File uploads:Contemplate one and possess authority set PUData owner U want upper transmitting file F and by this document with Possess authority setUsers to share, and to each p ∈ PF, user calculates and to public cloud storage Service provider's (Cloud Server) sends filetokens φ F, kp=TagGen (F, kp)
If being found that the copy of repetition in Cloud Server, user will carry out proof to the ownership of this document, if It is verified, user will be allocated a pointer, and expression allows to conduct interviews to this document.
If not finding the copy of repetition, user, which will utilize, restrains key kf=KeyGenCE(F) encryption file C is calculatedF =EncCE(kF, F) and upload (CF, { φF, kp) Cloud Server is arrived, wherein, convergence key storage is local in user.
Document retrieval:Assuming that certain user wishes to download file F, filename and download request are sent to Cloud Server first. Cloud server first verifies whether the user has permission to filename and request and downloads file F afterwards.If authentication failed, cloud Server will return to one request of user and be rejected, the information of failed download.If be proved to be successful, Cloud Server will return to The corresponding ciphertext C of userF.User receives CFThe key k being locally stored is utilized afterwardsFDecrypt original document F.
Serious in the presence of some according to such a data deduplication system with licensing scheme of above method structure Safety problem:
First, each user will obtain sets of private keys according to its own authorityLabeled as PU.User can be with It is used for iterative testing using this sets of private keys to generate filetokens.But in file upload procedure, user needs to calculate To possess authority P with otherFUsers to share filetokens.In order to generate these tokens, user needs to know PFPrivate key, That is PFCan only be from PUMiddle selection.This limitation causes the data deduplication system with licensing scheme can not obtain extensively General application and limitation.
Secondly, above-mentioned data deduplication system can not be resisted by Client-initiated collusion attack.Because there is identical power The user of limit can obtain identical private key.So user is possible to conspire to be the new franchise sets of private keys of authority P* generations, and the power Limit P* and anyone being not belonging in the user that participation is conspired.For example, one possesses authority setUser and another one Possess authority setUser conspire to produce new authority set
This structure is inherently present easily to be threatened by Brute Force, and the file of Brute Force will be decrypted as known text Part.So the data deduplication system can not protect the file specified.The reason for one key is exactly that traditional convergence adds Close system can only protect the semantic security of uncertainty file.
In summary, the problem of prior art is present be:Information communications privacy cannot be protected in the prior art, safety Property is very low;Existing communication method use range is limited simultaneously.
The content of the invention
The problem of existing for prior art, the invention provides a kind of efficient communication message processing method.This hair Bright data deduplication system can be supported with the iterative testing authorized;In the present invention, mixed cloud system is introduced Framework, specifically, the private key for user right distribution are no longer transmitted directly to user, but by a privately owned Cloud Server Lai Storage and management;And on the other hand, user sends request to privately owned Cloud Server can just obtain filetokens;So, it is of the invention Solve above mentioned problem and provide higher security.
The present invention is achieved in that a kind of efficient communication message processing method comprises the following steps:
Step 1, communication information receiving terminal activation communication port, while category filter can be carried out to the communication information;
Step 2, communication information transmitting terminal obtains the identity information of selected communication information receiving terminal, when to the communication information After the authentication success of receiving terminal, communication information transmitting terminal obtains the communication information of user's input;
Before the communication information transmitting terminal obtains the identity information of selected communication information receiving terminal, the communication information need to be carried out The identity information authentication processing that receiving terminal is sent;The communication information receiving terminal include Cloud Server, privately owned Cloud Server and Multiple users for possessing different rights,
Specifically include:
1) user shares to transmitting file on Cloud Server and/or data and with other users;
2) user carries out the proof of identification of user in the privately owned Cloud Server;
3) for the proof of identification by rear, the privately owned Cloud Server searches for the phase of the user in its list stored Answer authority;Otherwise, the proof of identification step that the user carries out user in the privately owned Cloud Server is returned;Meanwhile the use Family sends demand file token to the privately owned Cloud Server;
4) user obtains the file and corresponds to the token of user right and send to the Cloud Server, the cloud clothes Business device receives the filetokens, and the user returns to signature backward;
5) user sends the file and/or authority set and the label of data to the privately owned Cloud Server Name;
6) signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each file And/or data permission collection calculation document token and it is back to the user;
7) user using the file and/or data for restraining cipher key calculation encryption and uploads ciphertext to the Cloud Server And access strategy;
The user obtains the filetokens and sent to the Cloud Server, when finding duplicate copies to be present, also Including:
The user verifies the ownership of the file and/or data with the Cloud Server simultaneously;
After being verified by ownership, the Cloud Server distributes a file and/or the finger of data to the user Pin, and return and sign to the user;
The user sends the file and/or authority set and the signature of data to the privately owned Cloud Server;
Signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each user institute The file permission not possessed is calculated filetokens and is back to the user;
The filetokens of the file and/or data are uploaded to the privately owned Cloud Server by the user, and set institute State file and/or the authority set of data;
Step 3, communication information transmitting terminal send multiple message to the task established between task and a transponder successively Transmit queue;
Step 4, transponder detect the goal task of the message in transmit queue successively, and transponder successively sends message To the goal task receiving queue established between goal task and transponder;
Step 5, goal task reads message from goal task receiving queue, and is sent to information exchange platform;
Step 6, the information classification that information exchange platform is set according to communication information receiving terminal, carry out classification processing;
Step 7, information exchange platform carries out different degrees of encryption to the sorted communication information, after encryption The communication information be sent to communication information receiving terminal;
The encryption process includes:
Public key generates:Public key is by finite field k, and its addition and multiplication structure and n secondary multinomial compositions;
Private key generates:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], one Point set P, two reversible affine transformation L1And L2And their inverse composition;
The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);
The process that the centralizing mapping reconfigures comprises the following steps:
First, it is a smaller integer to select r, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForIt is compound with Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*Disturb original centralizing mappingNew public key is mapped as:
The public key generation comprises the following steps:
(1) finite field k, and its addition and multiplication structure are chosen;
(2) 2l secondary multinomial groups are chosen:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
(a) mapping is chosenThat is two random number α1, α2
(b) z of r Line independent is randomly selected1,…,zr∈k[x1,…,xn];
(c) it is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that.
Further, the communication information receiving terminal is carried out in identity information authentication processing, is specifically included:
The first step, the user share to transmitting file and/or data on the Cloud Server and with other users;
Second step, the user carry out the proof of identification of user in the privately owned Cloud Server;
3rd step, for the proof of identification by rear, the privately owned Cloud Server searches for the use in its list stored The corresponding authority at family;Otherwise, second step is returned;Meanwhile the user sends demand file token to the privately owned Cloud Server;
4th step, the user obtain the filetokens and sent to the Cloud Server, the Cloud Server and receive The user returns to signature to the filetokens backward;
5th step, the user send authority set and the institute of the file and/or data to the privately owned Cloud Server State signature;
6th step, signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each File and/or data permission collection calculateAnd it is back to the user;
7th step, file and/or data that the user is encrypted using convergence cipher key calculation and on the Cloud Server PassAnd PF
Further, the user obtains the filetokens and sent to the Cloud Server, secondary in the presence of repeating when finding This when, specifically include:
The user verifies the ownership of the file and/or data with the Cloud Server simultaneously;
After being verified by ownership, the Cloud Server distributes a file and/or the finger of data to the user Pin, and return and sign to the user;
The user sends the file and/or authority set and the signature of data to the privately owned Cloud Server;
Signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each pj∈PF- PUCalculateAnd it is back to the user;Wherein, PUIn weight before being data owner Resume classes when testing Cloud Server and doing duplicate checking inquiry, calculated via private clound server, therefore privately owned Cloud Server is not just below Needing to calculate Pu again (please be revised as PU);Thus only need to calculate the file permission P that he does not possessfPart, that is, Pf-PU
The filetokens of the file and/or data are uploaded to the privately owned Cloud Server by the user, and set institute State file and/or the authority set of data.
Further, the communication information receiving terminal is carried out in identity information authentication processing, in addition to:
It is as follows first to define a binary crelation R={ (p, p') }, gives two authorities p and p', and and if only if R (p, p') When=1, p and p' are matchings;
System is set:Assuming that there is n user in system, they are combined into the collection of authorityTo eachSelect a symmetrical keyThe set of keyIt will be sent in private clound;In addition, also Define a kind of Identity verification protocol ∏=(Proof, Verify), Proof represents for proving and verifying respectively with Verify Algorithm;Also, it is assumed that each user U also possesses a privacy key skUFor doing identification together with server;Assuming that User U possesses authority set PU, while also start PoW agreements " POW " to be issued a certificate for File Ownership;Privately owned Cloud Server will A form is maintained, stores the public information pk of each userUWith corresponding authority set PU;The file storage system of storage server System will be arranged to ⊥;
File uploads:Assuming that data owner wants to upload a file F and by this document and the authority category possessed In PF={ pjOther users to share;Data owner's needs are in Cloud Server prior to privately owned before progress iterative testing Cloud carries out an interaction;Data owner needs to do an authentication to prove the uniformity with private key sk;If checking is logical Cross, the corresponding authority P of the data owner is found in the list that privately owned Cloud Server will store at itU;The user calculates φ F= TagGen (F) simultaneously sends it to privately owned Cloud Server, and privately owned Cloud Server will meet each R (p, p τ)=1 p τ, return Back to one information of userWherein, p ∈ PU;Then, user will be with Cloud Server Interaction, filetokens are sent to Cloud Server
If it find that duplicate copies, user needs to run PoW agreements " POW " simultaneously to prove to file with Cloud Server Ownership;If ownership is verified, user is by by the non-pointer for matching somebody with somebody a this document;Meanwhile come from returning to one The proof of Cloud Server, this, which is proved to be, is based onWith the signature of timestamp;Then, user sends to privately owned Cloud Server On file F authority sets PF={ pjAnd above-mentioned signature;Upon receipt of the request, privately owned Cloud Server is first to cloud service Device verifies above-mentioned signature, and if the verification passes, privately owned Cloud Server will be to each pj∈PF-PUCalculateAnd return to user;These files F token also while is also uploaded to private by user There is Cloud Server, then the authority set of this document will be arranged to pF
If not finding duplicate copies, Cloud Server will also return to a proof, and the proof is also one and is based onWith the signature of timestamp;User is sent on file F authority sets P to privately owned Cloud ServerF={ pjAnd above-mentioned label Name;Upon receipt of the request, privately owned Cloud Server verifies above-mentioned signature to Cloud Server first, if the verification passes, private There is Cloud Server will be to each pj∈PFCalculateAnd return to user;Finally, use Family, which will utilize, restrains key kF=KeyGenCE(F) the file C of encryption is calculatedF=EncCE(kF, F) and uploadAnd PF
File filter:After the encryption data from Cloud Server is received, user uses convergence key kFTo decrypt most Original file.
Further, the communication information receiving terminal is carried out in identity information authentication processing, in addition to:Resist Brute Force band The threat come:
The user shares to transmitting file and/or data on the Cloud Server and with other users;
The user carries out the proof of identification of user in the privately owned Cloud Server and sends the H (F) to the private There is Cloud Server;
The proof of identification is by rear, to all p τ for meeting R (p, p τ)=1 two file label collectionWithUser will be fed back to;
The user receives labelWithAfterwards, will send to the Cloud Server interacted, institute State after Cloud Server receives the label, signed returning;
The user sends the signature to the privately owned Cloud Server to ask with the file and/or data permission collection Ask transmitting file and/or data;
The signature is verified after request described in the privately owned cloud server, by rear, the privately owned Cloud Server pair Each pj∈ P are calculatedWithAnd by calculating As a result the user will be returned to;
The user is calculated to the file and/or the encryption C of dataF=EncSE (k, F), user upload
Further, the communication information transmitting terminal, the communication information for the communication information getter to be obtained are sent To described information switching plane;
Further, described information switching plane, for the communication information that the communication recipient receives according to The classification that communication information receiving terminal is set carries out different degrees of encryption, and the communication information after encryption is sent into the communication believes Cease receiving terminal..
Further, the communication information receiving terminal, is connected with the communications message processor, for receiving the communication The communication information after the encryption that message handler is sent, and the communication information after encryption is decrypted, obtain and show decryption The communication information afterwards.Decrypting process is the inverse process of encryption, the private key for decrypting key used to choose;
1) ciphertext Z '=(z is being obtained1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
2) for the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandon this class value;Otherwise carry out in next step;
3) finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded One group of (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase checking equation.
Advantages of the present invention and good effect are:The present invention is by obtaining and utilizing the identity information of communication information receiving terminal Authentication is carried out to communication information receiving terminal, and communication information receiving terminal is re-send to after the communication information is encrypted, is made Communication information receiving terminal that must be Jing Guo authentication, could obtain the communication information so that the communication information is not easy by any 3rd Side obtains, and the communication information obtained is by encryption so that the privacy of the communication information can be protected well, carry High security.The communication means of the present invention realizes the biography of message between different task by the combination of transponder and queue simultaneously Defeated, so now no longer needing to realize the transmission of message using the message interface of system offer, task only needs to put message Enqueue, and it is that the transmission of message can be achieved to carry out correspondingly forwarding by transponder.In the present invention by the optimization to queue and Extension, i.e., communication party of the invention to change the pattern of message in queue, can also be increased to the controlling for attribute for transmitting queue The use range of method.
The encryption and decryption approaches of the present invention, ensure that the privacy of user is not compromised.
The authentication processing of communication information receiving terminal of the present invention, has used mixed cloud architectural framework, there is provided higher safety Property;Its security can be ensured to the file that its information can be predicted.
Brief description of the drawings
Fig. 1 is the efficient communication message processing method flow chart that the present invention implements to provide.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to embodiments, to the present invention It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to Limit the present invention.
The application principle of the present invention is further described below in conjunction with the accompanying drawings.
Comprise the following steps as shown in figure 1, the present invention provides a kind of efficient communication message processing method:
S101, communication information receiving terminal activation communication port, while category filter can be carried out to the communication information;
S102, communication information transmitting terminal obtain the identity information of selected communication information receiving terminal, connect when to the communication information After the authentication success of receiving end, communication information transmitting terminal obtains the communication information of user's input;
S103, communication information transmitting terminal send multiple message to the task hair established between task and a transponder successively Send queue;
S104, transponder detect the goal task of the message in transmit queue successively, and transponder is sent a message to successively The goal task receiving queue established between goal task and transponder;
S105, goal task reads message from goal task receiving queue, and is sent to information exchange platform;
S106, the information classification that information exchange platform is set according to communication information receiving terminal, carry out classification processing;
S107, information exchange platform carries out different degrees of encryption to the sorted communication information, after encryption The communication information is sent to communication information receiving terminal.
Before the communication information transmitting terminal obtains the identity information of selected communication information receiving terminal, the communication information need to be carried out The identity information authentication processing that receiving terminal is sent;The communication information receiving terminal include Cloud Server, privately owned Cloud Server and Multiple users for possessing different rights,
Specifically include:
1) user shares to transmitting file on Cloud Server and/or data and with other users;
2) user carries out the proof of identification of user in the privately owned Cloud Server;
For the proof of identification by rear, the privately owned Cloud Server searches for the corresponding of the user in its list stored Authority;Otherwise, the proof of identification that the user carries out user in the privately owned Cloud Server is returned;
3) simultaneously, the user sends demand file token to the privately owned Cloud Server;
4) user obtains the file and corresponds to the token of user right and send to the Cloud Server, the cloud clothes Business device receives the filetokens, and the user returns to signature backward;
5) user sends the file and/or authority set and the label of data to the privately owned Cloud Server Name;
6) signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each file And/or data permission collection calculation document token and it is back to the user;
7) user using the file and/or data for restraining cipher key calculation encryption and uploads ciphertext to the Cloud Server And access strategy;
The user obtains the filetokens and sent to the Cloud Server, when finding duplicate copies to be present, also Including:
The user verifies the ownership of the file and/or data with the Cloud Server simultaneously;
After being verified by ownership, the Cloud Server distributes a file and/or the finger of data to the user Pin, and return and sign to the user;
The user sends the file and/or authority set and the signature of data to the privately owned Cloud Server;
Signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each user institute The file permission not possessed is calculated filetokens and is back to the user;
The filetokens of the file and/or data are uploaded to the privately owned Cloud Server by the user, and set institute State file and/or the authority set of data.
Communication information transmitting terminal provided by the invention, the communication information for the communication information getter to be obtained are sent To described information switching plane;
The encryption process includes:
Public key generates:Public key is by finite field k, and its addition and multiplication structure and n secondary multinomial compositions;
Private key generates:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], one Point set P, two reversible affine transformation L1And L2And their inverse composition;
The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);
The process that the centralizing mapping reconfigures comprises the following steps:
First, it is a smaller integer to select r, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForIt is compound with Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*Disturb original centralizing mappingNew public key is mapped as:
The public key generation comprises the following steps:
(1) finite field k, and its addition and multiplication structure are chosen;
(2) 2l secondary multinomial groups are chosen:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
(a) mapping is chosenThat is two random number α1, α2
(b) z of r Line independent is randomly selected1,…,zr∈k[x1,…,xn];
(c) it is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that.
Decrypting process is the inverse process of encryption, the private key for decrypting key used to choose;
1) ciphertext Z '=(z is being obtained1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
2) for the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandon this class value;Otherwise carry out in next step;
3) finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded One group of (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase checking equation.
As the preferred embodiment of the embodiment of the present invention, the communication information receiving terminal carries out identity information authentication processing In, specifically include:
The first step, the user share to transmitting file and/or data on the Cloud Server and with other users;
Second step, the user carry out the proof of identification of user in the privately owned Cloud Server;
3rd step, for the proof of identification by rear, the privately owned Cloud Server searches for the use in its list stored The corresponding authority at family;Otherwise, second step is returned;Meanwhile the user sends demand file token to the privately owned Cloud Server;
4th step, the user obtain the filetokens and sent to the Cloud Server, the Cloud Server and receive The user returns to signature to the filetokens backward;
5th step, the user send authority set and the institute of the file and/or data to the privately owned Cloud Server State signature;
6th step, signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each File and/or data permission collection calculateAnd it is back to the user;
7th step, file and/or data that the user is encrypted using convergence cipher key calculation and on the Cloud Server PassAnd PF
As the preferred embodiment of the embodiment of the present invention, the user obtains the filetokens and sent to the cloud and takes Business device, when finding duplicate copies to be present, specifically include:
The user verifies the ownership of the file and/or data with the Cloud Server simultaneously;
After being verified by ownership, the Cloud Server distributes a file and/or the finger of data to the user Pin, and return and sign to the user;
The user sends the file and/or authority set and the signature of data to the privately owned Cloud Server;
Signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each pj∈PF- PUCalculateAnd it is back to the user;Wherein, PUIn weight before being data owner Resume classes when testing Cloud Server and doing duplicate checking inquiry, calculated via private clound server, therefore privately owned Cloud Server is not just below Needing to calculate Pu again (please be revised as PU);Thus only need to calculate the file permission P that he does not possessfPart, that is, Pf-PU
The filetokens of the file and/or data are uploaded to the privately owned Cloud Server by the user, and set institute State file and/or the authority set of data.
As the preferred embodiment of the embodiment of the present invention, the communication information receiving terminal carries out identity information authentication processing In, in addition to:
It is as follows first to define a binary crelation R={ (p, p') }, gives two authorities p and p', and and if only if R (p, p') When=1, p and p' are matchings;
System is set:Assuming that there is n user in system, they are combined into the collection of authorityTo eachSelect a symmetrical keyThe set of keyIt will be sent in private clound;In addition, also Define a kind of Identity verification protocol ∏=(Proof, Verify), Proof represents for proving and verifying respectively with Verify Algorithm;Also, it is assumed that each user U also possesses a privacy key skUFor doing identification together with server;Assuming that User U possesses authority set PU, while also start PoW agreements " POW " to be issued a certificate for File Ownership;Privately owned Cloud Server will A form is maintained, stores the public information pk of each userUWith corresponding authority set PU;The file storage system of storage server System will be arranged to ⊥;
File uploads:Assuming that data owner wants to upload a file F and by this document and the authority category possessed In PF={ pjOther users to share;Data owner's needs are in Cloud Server prior to privately owned before progress iterative testing Cloud carries out an interaction;Data owner needs to do an authentication to prove the uniformity with private key sk;If checking is logical Cross, the corresponding authority P of the data owner is found in the list that privately owned Cloud Server will store at itU;The user calculates φ F= TagGen (F) simultaneously sends it to privately owned Cloud Server, and privately owned Cloud Server will meet each R (p, p τ)=1 p τ, return Back to one information of userWherein, p ∈ PU;Then, user will be with Cloud Server Interaction, filetokens are sent to Cloud Server
If it find that duplicate copies, user needs to run PoW agreements " POW " simultaneously to prove to file with Cloud Server Ownership;If ownership is verified, user is by by the non-pointer for matching somebody with somebody a this document;Meanwhile come from returning to one The proof of Cloud Server, this, which is proved to be, is based onWith the signature of timestamp;Then, user sends to privately owned Cloud Server On file F authority sets PF={ pjAnd above-mentioned signature;Upon receipt of the request, privately owned Cloud Server is first to cloud service Device verifies above-mentioned signature, and if the verification passes, privately owned Cloud Server will be to each pj∈PF-PUCalculateAnd return to user;These files F token also while is also uploaded to private by user There is Cloud Server, then the authority set of this document will be arranged to pF
If not finding duplicate copies, Cloud Server will also return to a proof, and the proof is also one and is based onWith the signature of timestamp;User is sent on file F authority sets P to privately owned Cloud ServerF={ pjAnd above-mentioned label Name;Upon receipt of the request, privately owned Cloud Server verifies above-mentioned signature to Cloud Server first, if the verification passes, private There is Cloud Server will be to each pj∈PFCalculateAnd return to user;Finally, use Family, which will utilize, restrains key kF=KeyGenCE(F) the file C of encryption is calculatedF=EncCE(kF, F) and uploadAnd PF
File filter:After the encryption data from Cloud Server is received, user uses convergence key kFTo decrypt most Original file.
As the preferred embodiment of the embodiment of the present invention, the communication information receiving terminal carries out identity information authentication processing In, in addition to:Resist the threat that Brute Force is brought:
The user shares to transmitting file and/or data on the Cloud Server and with other users;
The user carries out the proof of identification of user in the privately owned Cloud Server and sends the H (F) to the private There is Cloud Server;
The proof of identification is by rear, to all p τ for meeting R (p, p τ)=1 two file label collectionWithUser will be fed back to;
The user receives labelWithAfterwards, will send to the Cloud Server interacted, institute State after Cloud Server receives the label, signed returning;
The user sends the signature to the privately owned Cloud Server to ask with the file and/or data permission collection Ask transmitting file and/or data;
The signature is verified after request described in the privately owned cloud server, by rear, the privately owned Cloud Server pair Each pj∈ P are calculatedWithAnd by calculating As a result the user will be returned to;
The user is calculated to the file and/or the encryption C of dataF=EncSE(k, F), user upload
As the preferred embodiment of the embodiment of the present invention, information exchange platform provided by the invention, for the communication The classification that the communication information that message recipient receives is set according to communication information receiving terminal carries out different degrees of encryption, will add The communication information after close is sent to the communication information receiving terminal.
As the preferred embodiment of the embodiment of the present invention, communication information receiving terminal provided by the invention, with the letter that communicates Breath processor is connected, the communication information after the encryption sent for receiving the communications message processor, and to encryption after The communication information is decrypted, and obtains and shows the communication information after decryption.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention All any modification, equivalent and improvement made within refreshing and principle etc., should be included in the scope of the protection.

Claims (8)

  1. A kind of 1. efficient communication message processing method, it is characterised in that the efficient communication message processing method bag Include following steps:
    Step 1, communication information receiving terminal activation communication port, while category filter can be carried out to the communication information;
    Step 2, communication information transmitting terminal obtain the identity information of selected communication information receiving terminal, received when to the communication information After the authentication success at end, communication information transmitting terminal obtains the communication information of user's input;The communication information transmitting terminal obtains Before the identity information for taking selected communication information receiving terminal, the identity information authentication department of communication information receiving terminal transmission need to be carried out Reason;The communication information receiving terminal includes Cloud Server, privately owned Cloud Server and multiple users for possessing different rights,
    Specifically include:
    1) user shares to transmitting file on Cloud Server and/or data and with other users;
    2) user carries out the proof of identification of user in the privately owned Cloud Server;
    3) for the proof of identification by rear, the privately owned Cloud Server searches for the corresponding power of the user in its list stored Limit;Otherwise, the proof of identification step that the user carries out user in the privately owned Cloud Server is returned;Meanwhile the user to The privately owned Cloud Server sends demand file token;
    4) user obtains the file and corresponds to the token of user right and send to the Cloud Server, the Cloud Server Receiving the filetokens, the user returns to signature backward;
    5) user sends the file and/or authority set and the signature of data to the privately owned Cloud Server;
    6) signature described in the private clound server authentication, by rear, the privately owned Cloud Server will to each file and/or Data permission collection calculation document token is simultaneously back to the user;
    7) user using the file and/or data for restraining cipher key calculation encryption and uploads ciphertext and visit to the Cloud Server Ask strategy;
    The user obtains the filetokens and sent to the Cloud Server, when finding duplicate copies to be present, in addition to:
    The user verifies the ownership of the file and/or data with the Cloud Server simultaneously;
    After being verified by ownership, the Cloud Server distributes a file and/or the pointer of data to the user, and Return and sign to the user;
    The user sends the file and/or authority set and the signature of data to the privately owned Cloud Server;
    Signature described in the private clound server authentication, by rear, the privately owned Cloud Server will not have to each user Standby file permission is calculated filetokens and is back to the user;
    The filetokens of the file and/or data are uploaded to the privately owned Cloud Server by the user, and set the text The authority set of part and/or data;
    Step 3, communication information transmitting terminal send multiple message to the task established between task and a transponder and sent successively Queue;
    Step 4, transponder detect the goal task of the message in transmit queue successively, and transponder sends a message to mesh successively The goal task receiving queue established between mark task and transponder;
    Step 5, goal task reads message from goal task receiving queue, and is sent to information exchange platform;
    Step 6, the information classification that information exchange platform is set according to communication information receiving terminal, carry out classification processing;
    Step 7, information exchange platform carry out different degrees of encryption to the sorted communication information, will be logical after encryption Letter information is sent to communication information receiving terminal;
    The encryption process includes:
    Public key generates:Public key is by finite field k, and its addition and multiplication structure and n secondary multinomial compositions;
    Private key generates:Private key is by mapping the z of the r Line independent for F~randomly select1,…,zr∈k[x1,…,x2l], a point Collect P, two reversible affine transformation L1And L2And their inverse composition;
    The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);
    The process that the centralizing mapping reconfigures comprises the following steps:
    First, it is a smaller integer to select r, randomly chooses r Line independent equation
    <mfenced open = "" close = ""> <mtable> <mtr> <mtd> <mrow> <msub> <mi>z</mi> <mn>1</mn> </msub> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msub> <mi>x</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </munderover> <msub> <mi>&amp;alpha;</mi> <mrow> <mi>j</mi> <mn>1</mn> </mrow> </msub> <msub> <mi>x</mi> <mi>j</mi> </msub> <mo>+</mo> <msub> <mi>&amp;beta;</mi> <mn>1</mn> </msub> </mrow> </mtd> </mtr> <mtr> <mtd> <mo>.</mo> </mtd> </mtr> <mtr> <mtd> <mo>.</mo> </mtd> </mtr> <mtr> <mtd> <mo>.</mo> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>z</mi> <mi>r</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msub> <mi>x</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </munderover> <msub> <mi>&amp;alpha;</mi> <mrow> <mi>j</mi> <mi>r</mi> </mrow> </msub> <msub> <mi>x</mi> <mi>j</mi> </msub> <mo>+</mo> <msub> <mi>&amp;beta;</mi> <mi>r</mi> </msub> </mrow> </mtd> </mtr> </mtable> </mfenced>
    Map Z:k2l→krIt is identified below:
    Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
    Secondly, the multinomial that 2l total degree is 2 is randomly selected
    MappingIt is identified below:
    Then, perturbed hard-chain F is defined*:k2l→k2lForIt is compound with Z:
    Wherein f1 *,…,f2l *∈k[x1,…,x2l],
    Finally, F is mapped with internal disturbance*Disturb original centralizing mappingNew public key is mapped as:
    The public key generation comprises the following steps:
    (1) finite field k, and its addition and multiplication structure are chosen;
    (2) 2l secondary multinomial groups are chosen:
    f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
    Described private key generation comprises the following steps:
    (a) mapping is chosenThat is two random number α1, α2
    (b) z of r Line independent is randomly selected1,…,zr∈k[x1,…,xn];
    (c) it is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
    <mrow> <mi>P</mi> <mo>=</mo> <mo>{</mo> <mrow> <mo>(</mo> <mi>&amp;mu;</mi> <mo>,</mo> <mi>&amp;lambda;</mi> <mo>)</mo> </mrow> <mo>|</mo> <mover> <mi>F</mi> <mo>^</mo> </mover> <mrow> <mo>(</mo> <mi>&amp;mu;</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>&amp;lambda;</mi> <mo>}</mo> <mo>,</mo> </mrow>
    Point set P is by 2l quadratic polynomial randomly selectingIt is determined that.
  2. 2. efficient communication message processing method as claimed in claim 1, it is characterised in that the communication information receiving terminal Carry out in identity information authentication processing, specifically include:
    The first step, the user share to transmitting file and/or data on the Cloud Server and with other users;
    Second step, the user carry out the proof of identification of user in the privately owned Cloud Server;
    3rd step, for the proof of identification by rear, the privately owned Cloud Server searches for the user's in its list stored Corresponding authority;Otherwise, second step is returned;Meanwhile the user sends demand file token to the privately owned Cloud Server;
    4th step, the user obtain the filetokens and sent to the Cloud Server, and the Cloud Server receives described The user returns to signature to filetokens backward;
    5th step, the user send the file and/or authority set and the label of data to the privately owned Cloud Server Name;
    6th step, signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each file And/or data permission collection calculatesAnd it is back to the user;
    7th step, the user upload using the file and/or data for restraining cipher key calculation encryption and to the Cloud ServerAnd PF
  3. 3. efficient communication message processing method as claimed in claim 1, it is characterised in that
    The user obtains the filetokens and sent to the Cloud Server, when finding duplicate copies to be present, specific bag Include:
    The user verifies the ownership of the file and/or data with the Cloud Server simultaneously;
    After being verified by ownership, the Cloud Server distributes a file and/or the pointer of data to the user, and Return and sign to the user;
    The user sends the file and/or authority set and the signature of data to the privately owned Cloud Server;
    Signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each pj∈PF-PUMeter CalculateAnd it is back to the user;Wherein, PUSchool is being repeated before being data owner When testing Cloud Server and doing duplicate checking inquiry, calculated via private clound server, therefore privately owned Cloud Server avoids the need for below Calculating Pu again (please be revised as PU);Thus only need to calculate the file permission P that he does not possessfPart, that is, Pf-PU
    The filetokens of the file and/or data are uploaded to the privately owned Cloud Server by the user, and set the text The authority set of part and/or data.
  4. 4. efficient communication message processing method as claimed in claim 1, it is characterised in that
    The communication information receiving terminal is carried out in identity information authentication processing, in addition to:
    It is as follows first to define a binary crelation R={ (p, p') }, gives two authorities p and p', and and if only if R (p, p')=1 When, p and p' are matchings;
    System is set:Assuming that there is n user in system, they are combined into the collection of authorityTo each Select a symmetrical keyThe set of keyIt will be sent in private clound;In addition, also definition is a kind of Identity verification protocol Π=(Proof, Verify), Proof represent the algorithm for proving and verifying with Verify respectively;Also Have, it is assumed that each user U also possesses a privacy key skUFor doing identification together with server;Assuming that user U is gathered around Have permission collection PU, while also start PoW agreements " POW " to be issued a certificate for File Ownership;Privately owned Cloud Server will maintain one Individual form, store the public information pk of each userUWith corresponding authority set PU;The document storage system of storage server will be by It is arranged to ⊥;
    File uploads:Assuming that a data owner wants to upload a file F and this document and the authority possessed is belonged into PF= {pjOther users to share;Data owner needs to carry out carrying out prior to private clound before iterative testing in Cloud Server One interaction;Data owner needs to do an authentication to prove the uniformity with private key sk;If the verification passes, it is privately owned The corresponding authority P of the data owner is found in the list that Cloud Server will store at itU;The user calculates φ F=TagGen (F) and privately owned Cloud Server is sent it to, privately owned Cloud Server will meet each R (p, pτThe p of)=1τ, return to use One, family informationWherein, p ∈ PU;Then, user will interact with Cloud Server, to Cloud Server sends filetokens
    If it find that duplicate copies, user needs to run PoW agreements " POW " simultaneously to prove to own file with Cloud Server Power;If ownership is verified, user is by by the non-pointer for matching somebody with somebody a this document;Meanwhile come from Cloud Server by returning to one Proof, this, which is proved to be, is based onWith the signature of timestamp;Then, user is sent on file F to privately owned Cloud Server Authority set PF={ pjAnd above-mentioned signature;Upon receipt of the request, privately owned Cloud Server is verified above-mentioned to Cloud Server first Signature, if the verification passes, privately owned Cloud Server will be to each pj∈PF-PUCalculate And return to user;These files F token also while is also uploaded to privately owned Cloud Server by user, then the authority of this document Collection will be arranged to pF
    If not finding duplicate copies, Cloud Server will also return to a proof, and the proof is also one and is based on With the signature of timestamp;User is sent on file F authority sets P to privately owned Cloud ServerF={ pjAnd above-mentioned signature;Receiving To after the request, privately owned Cloud Server verifies above-mentioned signature, if the verification passes, privately owned Cloud Server to Cloud Server first Will be to each pj∈PFCalculateAnd return to user;Finally, user will utilize and receive Hold back key kF=KeyGenCE(F) the file C of encryption is calculatedF=EncCE(kF, F) and uploadAnd PF
    File filter:After the encryption data from Cloud Server is received, user uses convergence key kFTo decrypt most original File.
  5. 5. efficient communication message processing method as claimed in claim 1, it is characterised in that
    The communication information receiving terminal is carried out in identity information authentication processing, in addition to:Resist the threat that Brute Force is brought:
    The user shares to transmitting file and/or data on the Cloud Server and with other users;
    The user carries out the proof of identification of user in the privately owned Cloud Server and sends the H (F) to the private clound Server;
    The proof of identification meets R (p, p by rear, to allτThe p of)=1τTwo file label collectionWithUser will be fed back to;
    The user receives labelWithAfterwards, will send to the Cloud Server interacted, the cloud After server receives the label, signed returning;
    The user by the signature and the file and/or data permission collection send to the privately owned Cloud Server to ask on Transmitting file and/or data;
    The signature is verified after request described in the privately owned cloud server, by rear, the privately owned Cloud Server is to each Individual pj∈ P are calculatedWithAnd by the result of calculating The user will be returned to;
    The user is calculated to the file and/or the encryption C of dataF=EncSE (k, F), user upload
  6. 6. efficient communication message processing method as claimed in claim 1, it is characterised in that the communication information is sent End, the communication information for the communication information getter to be obtained are sent to described information switching plane.
  7. 7. efficient communication message processing method as claimed in claim 1, it is characterised in that described information switching plane, Classification for being set to the communication information that the communication recipient receives according to communication information receiving terminal carries out different The encryption of degree, the communication information after encryption is sent to the communication information receiving terminal.
  8. 8. efficient communication message processing method as claimed in claim 1, it is characterised in that the communication information receives End, is connected with the communications message processor, the communication letter after the encryption sent for receiving the communications message processor Breath, and the communication information after encryption is decrypted, obtain and show the communication information after decryption;
    Decrypting process is the inverse process of encryption, the private key for decrypting key used to choose;
    1) ciphertext Z '=(z is being obtained1′,…,z2l') after, calculate first:
    Y '=L2 -1(Z ')=(y1′,…,y2l′);
    2) for the every bit (μ, λ) in point set P, calculate:
    <mrow> <mo>(</mo> <msup> <msub> <mi>y</mi> <mn>1</mn> </msub> <mrow> <mo>&amp;prime;</mo> <mo>&amp;prime;</mo> </mrow> </msup> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msup> <msub> <mi>y</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mrow> <mo>&amp;prime;</mo> <mo>&amp;prime;</mo> </mrow> </msup> <mo>)</mo> <mo>=</mo> <msup> <mover> <mi>F</mi> <mo>~</mo> </mover> <mrow> <mo>-</mo> <mn>1</mn> </mrow> </msup> <mo>(</mo> <mo>(</mo> <mrow> <msup> <msub> <mi>y</mi> <mn>1</mn> </msub> <mo>&amp;prime;</mo> </msup> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msup> <msub> <mi>y</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>&amp;prime;</mo> </msup> </mrow> <mo>)</mo> <mo>+</mo> <mi>&amp;lambda;</mi> <mo>)</mo> <mo>,</mo> </mrow>
    Then Z (y are verified1″,…,y2l")=μ, if invalid, abandon this class value;Otherwise carry out in next step;
    3) finally calculate:
    M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
    If only unique one group of (m1′,…,m2l'), then M ' must be just corresponding plaintext, if obtained more than one group (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase checking equation.
CN201711044380.9A 2017-10-31 2017-10-31 A kind of efficient communication message processing method Pending CN107786662A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711044380.9A CN107786662A (en) 2017-10-31 2017-10-31 A kind of efficient communication message processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711044380.9A CN107786662A (en) 2017-10-31 2017-10-31 A kind of efficient communication message processing method

Publications (1)

Publication Number Publication Date
CN107786662A true CN107786662A (en) 2018-03-09

Family

ID=61431984

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711044380.9A Pending CN107786662A (en) 2017-10-31 2017-10-31 A kind of efficient communication message processing method

Country Status (1)

Country Link
CN (1) CN107786662A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113162946A (en) * 2021-05-11 2021-07-23 彭松英 Communication information transmission system based on cloud computing and cloud storage
CN115150183A (en) * 2022-07-25 2022-10-04 黄涌瀚 Multivariable public key communication information transmission method based on cloud computing and cloud storage

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070155362A1 (en) * 2005-12-30 2007-07-05 Davis Russell J First responder communication system
CN103259711A (en) * 2012-11-07 2013-08-21 鹤山世达光电科技有限公司 Method and system for communication information transmission
CN103501227A (en) * 2013-10-23 2014-01-08 西安电子科技大学 Improved multi-variable public key cryptogram encryption and decryption scheme
CN103634707A (en) * 2012-08-23 2014-03-12 上海斐讯数据通信技术有限公司 Communication method
CN103780607A (en) * 2014-01-13 2014-05-07 西安电子科技大学 Repeating-data deleting method based on different permissions and system thereof
CN106326758A (en) * 2016-08-30 2017-01-11 四川格锐乾图科技有限公司 System for performing classified encryption on data according to user demand

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070155362A1 (en) * 2005-12-30 2007-07-05 Davis Russell J First responder communication system
CN103634707A (en) * 2012-08-23 2014-03-12 上海斐讯数据通信技术有限公司 Communication method
CN103259711A (en) * 2012-11-07 2013-08-21 鹤山世达光电科技有限公司 Method and system for communication information transmission
CN103501227A (en) * 2013-10-23 2014-01-08 西安电子科技大学 Improved multi-variable public key cryptogram encryption and decryption scheme
CN103780607A (en) * 2014-01-13 2014-05-07 西安电子科技大学 Repeating-data deleting method based on different permissions and system thereof
CN106326758A (en) * 2016-08-30 2017-01-11 四川格锐乾图科技有限公司 System for performing classified encryption on data according to user demand

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113162946A (en) * 2021-05-11 2021-07-23 彭松英 Communication information transmission system based on cloud computing and cloud storage
CN115150183A (en) * 2022-07-25 2022-10-04 黄涌瀚 Multivariable public key communication information transmission method based on cloud computing and cloud storage

Similar Documents

Publication Publication Date Title
Sukhodolskiy et al. A blockchain-based access control system for cloud storage
Wu et al. Efficient and privacy-preserving traceable attribute-based encryption in blockchain
Zhang et al. Cryptographic solutions for cloud storage: Challenges and research opportunities
Zhou et al. Achieving secure role-based access control on encrypted data in cloud storage
CN103780607B (en) The method of the data de-duplication based on different rights
Li et al. A hybrid cloud approach for secure authorized deduplication
JP4855940B2 (en) Efficient management of cryptographic key generation
CN106254342A (en) The secure cloud storage method of file encryption is supported under Android platform
Liu et al. A novel quantum group proxy blind signature scheme based on five-qubit entangled state
Sumathi et al. A group-key-based sensitive attribute protection in cloud storage using modified random Fibonacci cryptography
CN113645039A (en) Communication information transmission system and method based on different authorities
Mukundan et al. Replicated Data Integrity Verification in Cloud.
Guo et al. Using blockchain to control access to cloud data
Tian et al. An efficient scheme of cloud data assured deletion
CN107919966A (en) A kind of network security controller of computer
CN107786662A (en) A kind of efficient communication message processing method
Gang et al. Secure image deduplication in cloud storage
CN108600160A (en) Communication protocol safety management system in a kind of Industry Control
Yang et al. Towards revocable fine-grained encryption of cloud data: Reducing trust upon cloud
Silambarasan et al. Attribute-based convergent encryption key management for secure deduplication in cloud
Nandini et al. Implementation of hybrid cloud approach for secure authorized deduplication
Venkatesh et al. Secure authorised deduplication by using hybrid cloud approach
CN116150793B (en) DOA-based handle identification analysis technology data protection method and system
CN115150183A (en) Multivariable public key communication information transmission method based on cloud computing and cloud storage
Zhai et al. A Blockchain Privacy Protection Method Integrating Attribute Encryption and Group Signature

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180309

RJ01 Rejection of invention patent application after publication