CN105262755B - The Internet of things node secure storage method of data for preventing sensitive information from leaking - Google Patents
The Internet of things node secure storage method of data for preventing sensitive information from leaking Download PDFInfo
- Publication number
- CN105262755B CN105262755B CN201510719659.7A CN201510719659A CN105262755B CN 105262755 B CN105262755 B CN 105262755B CN 201510719659 A CN201510719659 A CN 201510719659A CN 105262755 B CN105262755 B CN 105262755B
- Authority
- CN
- China
- Prior art keywords
- data
- node
- unit
- recovery
- work
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a kind of Internet of things node secure storage method of data for preventing sensitive information from leaking, it is characterized in that, restore two steps including data conversion and data, data conversion process successively includes processing construction of function unit, Date Conversion Unit, verifying key generation unit, file distributing unit;Data recovery procedure successively includes node confirmation unit, restores ciphertext production unit, data recovery unit, data verification units.The present invention has high security, integrality and resistance to leakage, and data conversion and data restore highly efficient, largely guarantee data in Internet of things node, the beneficial effect for effectivelying prevent nodal information leakage, losing or destroying.
Description
Technical field
It, will be quick in node in particular to using Internet of things node as memory carrier the present invention relates to data transmission security field
Sense information is object, and cryptological technique is combined with data storage prevents one kind of node sensitive information leakage from preventing sensitive letter
Cease the Internet of things node secure storage method of data of leakage.
Background technique
The third wave that world information industry develops after computer, internet is Internet of Things.It is responsible for data collection
Internet of things node (such as sensor) be Internet of Things composition important foundation, and node data privacy and integrity security threaten
Through one of the critical issue for becoming limitation Internet of Things development.The most degree of intelligence of current Internet of things node is lower, does not have self
Defencive function is highly prone to attacker's malicious sabotage, if physical damage, node are stolen, leads to loss of data and leakage.Separately
Outside, data transmission is most between Internet of things node and control terminal uses wireless channel, and transmission data are easy to be stolen, modify, break
It is bad.Therefore, a kind of net networked node data safety storage scheme for protecting sensitive information leakage is significantly.
Cipher mechanism is the important means for protecting Internet of things node data storage and transmission, and secure storage scheme is answered extensively
With then since the degree of intelligence of Internet of things node differs greatly, many node computing capabilitys are not strong, therefore secure storage scheme
Computing cost is also contemplated that while considering safety.In addition, physical damage causes number since Internet of things node is exposed outside
The problems such as being leaked according to loss, storing data, therefore, secure storage scheme ensures data integrity and resistance to leakage.
Secure storage scheme used in current Internet of things node commonly uses two kinds of technologies: data encryption, data are restored.Data
Encryption can effectively solve data leakage problem present in node storage and transmission process, and data are restored then to be responsible for recovery
Data are destroyed, are guaranteed data integrity.However, there are more problems for Current protocols:
1, Encryption Algorithm complexity is high, is not suitable for the low node of degree of intelligence, there is scope limitation;
2, data recovering efficiency is low, majority can not decrypt the encryption data being destroyed and node by physical damage or
It loses, data recovery can not then carry out;
3, data can not be examined, node collect data be it is unknown, can not check number after encryption data is decrypted
According to correctness.For the deficiency for making up existing scheme, the present invention uses data conversion and data recovery technique, and node data is turned
Multiple encryption subdatas are changed into be respectively stored in different Internet of things node.When needing using data, by Partial encryption
The extensive restored data of data realizes the secure storage of node data to data verification is restored.Computation complexity is being reduced, is being improved
While restoring data efficiency, the single point failure problem that node can be effectively prevent to be caused by physical damage and loss.
Summary of the invention
Present invention aim to solve deficiency existing for above-mentioned background technique, a kind of high security, integrality are proposed
And resistance to leakage, data conversion and data restore highly efficient, largely guarantee data in Internet of things node, effectively
The Internet of things node secure storage method of data for preventing sensitive information from leaking for preventing nodal information leakage, losing or destroying.
In order to achieve the goal above, a kind of Internet of things node data safety for preventing sensitive information from leaking provided by the invention
Storage method, which is characterized in that restore two steps including data conversion and data, specifically:
Data conversion process successively includes processing construction of function unit, Date Conversion Unit, verifying key generation unit, data
Dispatching Unit, in which:
Handle the course of work of construction of function unit are as follows: at the information and neighbouring node number generation collected according to node
Function is managed, function is responsible for follow-up data conversion, and Internet of things node number is n, node identifier xi, node xiThe data of collection
For Si(i=1,2, n) and, the number of change data needed for extensive restored data is k, node xiGenerate k-1 rank multinomial f
(x), the nonzero integer that wherein multinomial coefficient is randomly choosed and is not mutually equal, polynomial repressentation are as follows: fi(x)=ai0+ai1x
+···+ai(k-1)xk-1, wherein ai≠aj, wherein i ≠ j;
The course of work of Date Conversion Unit are as follows: according to the processing function that processing construction of function unit generates, generate each
The subdata of server, while data being used and handle function representation, according to known to processing construction of function unit, Internet of things node mark
Know xiAnd processing function fi(x), the change data { f of node is generatedi(x1),···,fi(xn), and the section with opposite mark
Corresponding, the simultaneous selection w of pointi,di, make its Si=dif(wi) set up, wherein i=1,2, n;
Verify the course of work of key generation unit are as follows: node xiIt generates to examine for all nodes and restores testing for the data true and false
Key is demonstrate,proved, realization detects the data of recovery, and whether confirmation data are restored correctly, to use random selection t-1 rank multinomialG (x is calculated as the generation function for generating verifying keyi) as verifying share, select viAnd ui, generate verifying key
(Yi,Xi) it is made to meet Yi=S+Xi·g(ui)·vi;
The course of work of file distributing unit are as follows: send subdata, verifying key and the verifying share after conversion to other
Adjacent Internet of things node, Internet of things node receive and mark the data from which node, realize data safety storage, node xi
By subdata { fi(x1),···,fi(xn)}、(Yi,Xi) and g (xi) corresponding identifier is transferred to as { x1,···,xn}
Internet of things node.And public information is broadcasted, including { wi,di}、{vi,ui, wherein i=1,2, n;
Data recovery procedure successively includes node confirmation unit, restore ciphertext production unit, data recovery unit, data are tested
Unit is demonstrate,proved, that need to restore is node xiData, node xiIt has been be destroyed that, carry out recovery nodes x using other nodesi's
Data,
The course of work of node confirmation unit are as follows: selection restore the Internet of things node of data, and determination can carry out data
The node of recovery announces recovery nodes identifier and information transmission mode, and a node confirmation of h (h > k) will be to node xiNumber
According to being restored, identifier { x is announcedi1,···,xih, whereinAnnouncement information transmission mode is xi1
→xi2→···→xih→xi1, indicate that node will carry out information transmitting according to above-mentioned ring mode;
Restore the course of work of ciphertext production unit are as follows: the data that each node is stored according to itself are calculated for restoring data
Ciphertext, prevent the data for directly transmitting storage from being eavesdropped by opponent, guarantee the secret of data, according to node confirmation unit determine
List { xi1,···,xih, each node is calculated according to the information of the information of announcement and itself storage restores ciphertext.Node
xij(j=1, h) data ciphertext:With
The course of work of data recovery unit are as follows: according to ring communication mode, carry out data transmission, carry out recovery nodes conduct
The starting point of ring takes the lead in sending data, and after traversing entire ring, recovery nodes decrypt information acquisition and restore data, by node confirmation form
The starting point of ring in member is set as xi1, the node is for recovery nodes xiData, starting point node xi1Select random number r1, by message
(r1+Ci1 1,r1+Ci1 2) send next node x in ringi2, node xi2In conjunction with data ciphertext and message, by (r1+Ci1 1+Ci2 1,
r1+Ci1 2+Ci2 2) it is sent to node xi3, and so on, node xihIt will be message (r1+Ci1 1+···+Cih 1,r1+Ci1 2
+···+Cih 2) it is sent to starting point node xi1, node xi1Utilize random number r1, according to mathematical knowledge it is found that being saved after decryption
Point xiData S=Ci1 1+···+Cih 1, g (u1)=Ci1 2+···+Cih 2, data recovery completion;
As a preferred embodiment of the present invention, data recovery procedure further includes data verification units, data verification units
The course of work are as follows: recovery nodes using verifying key the data of recovery are detected, it is ensured that the data of recovery are correct, node xi1
Verifying key as starting point master is (Y1,X1), verify equation Y1=S+X1·g(u1)·v1If set up, restore correct, no
Establishment then reselects node and is restored.
Detailed description of the invention
Fig. 1 is the present invention program frame diagram;
Fig. 2 is data conversion flow chart in the present invention;
Fig. 3 is Data Recovery Process figure in the present invention.
Fig. 4 is 3 node cycle communication mode flow chart in the present invention
Specific embodiment
Below in conjunction with the accompanying drawings and embodiment the invention will be further described.
A kind of embodiment: Internet of things node secure storage method of data for preventing sensitive information from leaking, which is characterized in that packet
It includes data conversion and data restores two steps, specifically:
Data conversion process successively includes: processing construction of function unit 1.1, Date Conversion Unit 1.2, verifying key generation list
First 1.3, file distributing unit 1.4.
Wherein:
Handle construction of function unit 1.1.The information and neighbouring node number collected according to node generate processing function, letter
The responsible follow-up data conversion of number.In the present embodiment, it is assumed that Internet of things node number is n, node identifier xi, node xiIt collects
Data Si(i=1,2, n) and, the number of change data needed for extensive restored data is k.According to above-mentioned parameter, node xi
It generates k-1 rank multinomial f (x), the nonzero integer that wherein multinomial coefficient is randomly choosed and is not mutually equal is represented by fi(x)
=ai0+ai1x+···+ai(k-1)xk-1, wherein ai≠aj, wherein i ≠ j.
Date Conversion Unit 1.2.According to the processing function that processing construction of function unit 1.1 generates, each server is generated
Subdata, while by data with processing function representation.In the present embodiment, according to known to processing construction of function unit 1.1, Internet of Things
Net node identification xiAnd processing function fi(x), the change data data { f of node is generatedi(x1),···,fi(xn), and with
The node of opposite mark is corresponding.Simultaneous selection wi,di, make its Si=difi(wi) set up, wherein i=1,2, n.
Verify key generation unit 1.3.Node xiThe verifying key for restoring the data true and false can be examined by generating for all nodes, be realized
The data of recovery are detected, whether confirmation data restore correct.In the present embodiment, random selection t-1 rank multinomial is usedG (x is calculated as the generation function for generating verifying keyi) as verifying share, select viAnd uI,Generate verifying key
(Yi,Xi) it is made to meet Yi=S+Xi·g(ui)·vi。
File distributing unit 1.4.By after conversion subdata, verifying key with verifying share send other adjacent Internet of Things to
Node, Internet of things node receive and mark the data from which node, realize data safety storage.In the present embodiment, node
xiBy subdata { fi(x1),···,fi(xn)}、(Yi,Xi) and g (xi) corresponding identifier is transferred to as { x1,···,
xnInternet of things node.And public information is broadcasted, including { wi,di}、{vi,ui, wherein i=1,2, n.
Data recovery procedure is as follows: node xiAfter collected data are converted, recovery nodes x is needediWhen data, then need
Data recovery module is wanted to restore data, such as Fig. 3, data recovery procedure successively includes: node confirmation unit 2.1, restores
Ciphertext production unit 2.2, data recovery unit 2.3, data verification units 2.4.
Assuming that recovery nodes xiData specific example in, node xiIt has been be destroyed that, therefore carried out using other nodes
Recovery nodes xiData.
Node confirmation unit 2.1.Selection restore the Internet of things node of data, and determination can carry out the section of data recovery
Point announces recovery nodes identifier and information transmission mode (such as Fig. 4).In the present embodiment, it is assumed that a node confirmation of h (h > k)
It will be to node xiData restored, announce identifier { xi1,···,xih, whereinAnnounce letter
Breath transmission mode is xi1→xi2→···→xih→xi1, indicate that node will carry out information transmitting according to above-mentioned ring mode.
Restore ciphertext production unit 2.2.The data that each node is stored according to itself calculate the ciphertext for restoring data,
It prevents the data for directly transmitting storage from being eavesdropped by opponent, guarantees the secret of data.In the present embodiment, according to node confirmation unit
2.1 list { the x determinedi1,···,xih, each node is calculated according to the information of the information of announcement and itself storage to be restored
Ciphertext, node xijCalculate data ciphertext are as follows:WithIts
In (j=1, h).
Data recovery unit 2.3.According to the ring communication mode of Fig. 4 (3 nodes), carries out data transmission, carry out recovery section
Starting point of the point (having certain computing capability) as ring, takes the lead in sending data, and after traversing entire ring, recovery nodes decrypt information acquisition
Restore data.In the present embodiment, the starting point of the ring in node confirmation unit 2.1 is set as xi1, the node is for recovery nodes xi
Data, starting point node xi1Select random number r1, by message (r1+Ci1 1,r1+Ci1 2) send next node x in ringi2, node xi2
In conjunction with data ciphertext and message, by (r1+Ci1 1+Ci2 1,r1+Ci1 2+Ci2 2) it is sent to node xi3, and so on, node xih
It will be message (r1+Ci1 1+···+Cih 1,r1+Ci1 2+···+Cih 2) it is sent to starting point node xi1, node xi1Using random
Number r1, according to mathematical knowledge it is found that obtaining node x after decryptioniData S=Ci1 1+···+Cih 1, g (u1)=Ci1 2+···+
Cih 2, data recovery completion.
Data verification units 2.4.Recovery nodes detect the data of recovery using verifying key, it is ensured that the data of recovery
Correctly.In the present embodiment, node xi1Verifying key as starting point master is (Y1,X1), verify equation Y1=S+X1·g(u1)·v1,
If set up, restore correct, it is invalid, it reselects node and is restored.
The present invention is had the following advantages and beneficial effects: compared with prior art
Firstly, Internet of things node data safety storage at present uses data encryption technology, it is limited to Internet of things node equipment
System, it is desirable that its degree of intelligence is higher, is not suitable for that low side configuration equipment, and the present invention uses data transfer device, uses t-1 rank
Multinomial is to data processing, and lower to equipment requirement, adaptation range is wider.
Secondly, encryption technology applied by current, in decryption restoration data, it is often required that encryption data is complete, once
Breakage, which may cause, normally to decrypt, and cause ciphertext data unavailable or incorrect;And particularity (the exposure of Internet of things node
In outside) it usually will appear loss or physics corrupted, so there is single point failure using existing encipherment scheme.The present invention is logical
It crosses and saves former data conversion at the different Internet of things node that is placed on of multiple subdatas, asked so that efficiently solving single point failure
Topic, so that remaining to restore the data in egress, guaranteeing integrality after single Internet of things node destroys.
Again, the prior art is confirmatory to the data deficiency of recovery, and the received information of Internet of things node is after encryption, nothing
The correctness of data after method judgement decryption.This programme data conversion previous existence at verifying key so that the later period restore data after, can be right
Data Detection.
Finally, the present invention utilizes cryptography tool, data safety storage, high-efficient, at low cost, highly-safe, Shandong are realized
The advantages that stick is strong, strong operability, that is, be used in the Internet of things node of height intelligence, and can be used for the Internet of Things section of more low side
Point simultaneously can be used for the Internet of things node of increasingly complex environment.
The above described is only a preferred embodiment of the present invention, not being done in any form to structure of the invention
Limitation.Any simple modification, equivalent change and modification to the above embodiments according to the technical essence of the invention,
In the range of still falling within technical solution of the present invention.
Claims (2)
1. a kind of Internet of things node secure storage method of data for preventing sensitive information from leaking, which is characterized in that turn including data
It changes and restores two steps with data, specifically:
Data conversion process successively includes the course of work, the work of Date Conversion Unit (1.2) for handling construction of function unit (1.1)
The course of work, the course of work of file distributing unit (1.4) made process, verify key generation unit (1.3), in which:
Handle the course of work of construction of function unit (1.1) are as follows: the information and neighbouring node number collected according to node generate
Function is handled, function is responsible for follow-up data conversion, and Internet of things node number is n, node identifier xi, node xiThe number of collection
According to for Si(i=1,2 ..., n), the number of change data needed for extensive restored data are k, node xiIt generates k-1 rank multinomial f (x),
Wherein multinomial coefficient is the nonzero integer for randomly choosing and being not mutually equal, and is represented by fi(x)=ai0+ai1x+…+ai(k-1)
xk-1, wherein ai≠aj, wherein i ≠ j;
The course of work of Date Conversion Unit (1.2) are as follows: raw according to the processing function that processing construction of function unit (1.1) generates
At the subdata of each server, while data being used and handle function representation, it is known according to processing construction of function unit (1.1),
Internet of things node identifies xiAnd processing function fi(x), the change data for generating node is { fi(x1),…,fi(xn), and with phase
It is corresponding to the node of mark, simultaneous selection wi,di, make Si=difi(wi) set up, wherein i=1,2 ..., n;
Verify the course of work of key generation unit (1.3) are as follows: node xiIt generates to examine for all nodes and restores testing for the data true and false
Key is demonstrate,proved, realization detects the data of recovery, and whether confirmation data are restored correctly, to use randomly selected t-1 rank multinomialG (x is calculated as the generation function for generating verifying keyi) as verifying share, select viAnd ui, generate verifying key
(Yi,Xi) it is made to meet Yi=S+Xi·g(ui)·vi;
The course of work of file distributing unit (1.4) are as follows: send subdata, verifying key and the verifying share after conversion to other
Adjacent Internet of things node, Internet of things node receive and mark the data from which node, realize data safety storage, node xi
By subdata { fi(x1),…,fi(xn)}、(Yi,Xi) and g (xi) corresponding identifier is transferred to as { x1,…,xnInternet of Things
Node, and public information is broadcasted, including { wi,di}、{vi,ui, wherein i=1,2 ..., n;
Data recovery procedure successively includes the course of work of node confirmation unit (2.1), the work for restoring ciphertext production unit (2.2)
The course of work for making process, the course of work of data recovery unit (2.3), data verification units (2.4), need to restore is section
Point xiData, node xiIt has been be destroyed that, carry out node x using other nodesiData recovery,
The course of work of node confirmation unit (2.1) are as follows: selection restore the Internet of things node of data, and determination can carry out data
The node of recovery announces recovery nodes identifier and information transmission mode, and a node confirmation of h (h > k) will be to node xiNumber
According to being restored, identifier { x is announcedi1,…,xih, whereinAnnouncement information transmission mode is xi1→xi2
→…→xih→xi1, indicate that node will carry out information transmitting according to above-mentioned ring mode;
Restore the course of work of ciphertext production unit (2.2) are as follows: the data that each node is stored according to itself are calculated for restoring
The ciphertext of data prevents the data for directly transmitting storage from being eavesdropped by opponent, guarantees the secret of data, according to node confirmation unit
(2.1) list { x determinedi1,…,xih, each node is calculated according to the information of the information of announcement and itself storage restores close
Text, node xijCalculate data ciphertext are as follows:WithWherein
(j=1 ..., h),
The course of work of data recovery unit (2.3) are as follows: according to ring communication mode, carry out data transmission, carry out recovery nodes work
It for the starting point of ring, takes the lead in sending data, after traversing entire ring, recovery nodes decrypt information acquisition and restore data, and node is confirmed
The starting point of ring in unit (2.1) is set as xi1, the node is for recovery nodes xiData, starting point node xi1Select random number
r1, by message (r1+Ci1 1,r1+Ci1 2) send next node x in ringi2, node xi2In conjunction with data ciphertext and message, by (r1+
Ci1 1+Ci2 1,r1+Ci1 2+Ci2 2) it is sent to node xi3, and so on, node xihIt will be message (r1+Ci1 1+…+Cih 1,r1+Ci1 2
+…+Cih 2) it is sent to starting point node xi1, node xi1Utilize random number r1, according to mathematical knowledge it is found that obtaining node x after decryptioni
Data S=Ci1 1+…+Cih 1, g (u1)=Ci1 2+…+Cih 2, data recovery completion.
2. the Internet of things node secure storage method of data according to claim 1 for preventing sensitive information from leaking, feature
Be: data recovery procedure further includes the course of work of data verification units (2.4), data verification units (2.4) it is worked
Journey are as follows: recovery nodes detect the data of recovery using verifying key, it is ensured that the data of recovery are correct, node xi1As starting point
Verifying key be (Y1,X1), verify equation Yi=S+Xi·g(ui)·viIf set up, restore correct, it is invalid then again
Selection node is restored.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510719659.7A CN105262755B (en) | 2015-10-29 | 2015-10-29 | The Internet of things node secure storage method of data for preventing sensitive information from leaking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510719659.7A CN105262755B (en) | 2015-10-29 | 2015-10-29 | The Internet of things node secure storage method of data for preventing sensitive information from leaking |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105262755A CN105262755A (en) | 2016-01-20 |
CN105262755B true CN105262755B (en) | 2019-03-26 |
Family
ID=55102260
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510719659.7A Expired - Fee Related CN105262755B (en) | 2015-10-29 | 2015-10-29 | The Internet of things node secure storage method of data for preventing sensitive information from leaking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105262755B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108259185B (en) * | 2018-01-26 | 2021-06-15 | 湖北工业大学 | Anti-leakage group key negotiation system and method in group communication |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102098161A (en) * | 2009-12-15 | 2011-06-15 | 索尼公司 | Actor node, sensor node, coverage block change method, parameter change method and information processing system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101046992B1 (en) * | 2009-10-29 | 2011-07-06 | 한국인터넷진흥원 | Sensor data security method, system and recording media |
-
2015
- 2015-10-29 CN CN201510719659.7A patent/CN105262755B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102098161A (en) * | 2009-12-15 | 2011-06-15 | 索尼公司 | Actor node, sensor node, coverage block change method, parameter change method and information processing system |
Non-Patent Citations (4)
Title |
---|
Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage;Hiroaki Kikuchi;《JCIS》;20150129;全文 |
Secure secret reconstruction and multi-secret sharing schemes with unconditional security;Lein Harn;《Security and Communication Networks》;20140331;第7卷(第3期);全文 |
基于Shamir秘密共享的密钥分发与恢复算法;荣辉桂等;《通信学报》;20150331;第36卷(第3期);全文 |
秘密共享方案的研究;王海艳等;《微机发展》;20050331;第15卷(第3期);全文 |
Also Published As
Publication number | Publication date |
---|---|
CN105262755A (en) | 2016-01-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109756338B (en) | Authentication apparatus, computer-implemented method of authentication apparatus, and computer-readable medium | |
Hameed et al. | Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks | |
US8347094B2 (en) | Securing wireless body sensor networks using physiological data | |
EP2361462B1 (en) | Method for generating an encryption/decryption key | |
CN108989045B (en) | Apparatus and system for preventing global tampering | |
US9762560B2 (en) | Method for generating cryptographic “one-time pads” and keys for secure network communications | |
CN106104562A (en) | Safety of secret data stores and recovery system and method | |
CN105009507A (en) | Generating a key derived from a cryptographic key using a physically unclonable function | |
CN105228157B (en) | A kind of wireless sensor network security light weight reprogramming method | |
CN106611128A (en) | Secondary encryption-based data validation and data recovery algorithm in cloud storage | |
Jolfaei et al. | A lightweight integrity protection scheme for low latency smart grid applications | |
JP6473876B2 (en) | Secure network communication method | |
Chen et al. | Enhanced authentication protocol for the Internet of Things environment | |
CN115442112A (en) | Authentication and key agreement method and equipment based on PUF | |
Feiri et al. | Efficient and secure storage of private keys for pseudonymous vehicular communication | |
CN117390637B (en) | Method and system for protecting safety of safety access area system | |
CN105262755B (en) | The Internet of things node secure storage method of data for preventing sensitive information from leaking | |
CN106341384A (en) | Methods for facilitating secure communication | |
CN111490874B (en) | Distribution network safety protection method, system, device and storage medium | |
Ding et al. | A reversible watermarking scheme based on difference expansion for wireless sensor networks | |
KLEF | An efficient light weight cryptography algorithm scheme for WSN devices using chaotic map and GE | |
US8681972B2 (en) | Method of executing a cryptographic calculation | |
CN107277054A (en) | A kind of method and system of data integrity validation | |
Lin et al. | Quantum blind signature based on quantum circuit | |
Nesa et al. | Combining merkle hash tree and chaotic cryptography for secure data fusion in iot |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190326 Termination date: 20211029 |
|
CF01 | Termination of patent right due to non-payment of annual fee |