CN107786662A - A kind of efficient communication message processing method - Google Patents
A kind of efficient communication message processing method Download PDFInfo
- Publication number
- CN107786662A CN107786662A CN201711044380.9A CN201711044380A CN107786662A CN 107786662 A CN107786662 A CN 107786662A CN 201711044380 A CN201711044380 A CN 201711044380A CN 107786662 A CN107786662 A CN 107786662A
- Authority
- CN
- China
- Prior art keywords
- user
- cloud server
- file
- mrow
- privately owned
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention belongs to communication technical field, disclose a kind of efficient communication message processing method, communication port is activated by communication information receiving terminal, category filter can be carried out to the communication information simultaneously, obtain and authentication is carried out to communication information receiving terminal using the identity information of communication information receiving terminal, and communication information receiving terminal is re-send to after the communication information is encrypted, so that the communication information receiving terminal by authentication, the communication information could be obtained, so that the communication information is not easy to be obtained by any third party, and the communication information obtained is by encryption, the privacy of the communication information is protected well, improve security.The communication means of the present invention realizes the transmission of message between different task by the combination of transponder and queue simultaneously, changes the pattern of message in queue to transmitting the control of attribute of queue, can also increase the use range of communication means of the invention.
Description
Technical field
The invention belongs to communication technical field, more particularly to a kind of efficient communication message processing method.
Background technology
Information and mechanics of communication are the new concept and new skill that information technology is blended and formed with mechanics of communication
Art field.The conventional communication technology and information technology are two entirely different categories:The communication technology focuses on the biography that message is propagated
Feed technique, and information technology focuses on coding or the decoding of information, and the transmission means in communications carrier.With the hair of technology
Exhibition, both technologies slowly become inseparable, so as to which fusion turns into a category gradually.However, information is led in the prior art
Letter privacy cannot be protected, and security is very low;Existing communication method use range is limited simultaneously.
Cloud computing can provide a user the resource service for the virtualization for seeming unlimited by internet, and in this process
In conceal platform and concrete implementation details.Cloud service provider of today can spend relatively low into offer height can originally
The computing resource of storage service and large-scale parallel.With the popularization of cloud computing technology, increasing data are collected
In the user that plays cause and have specified authority share
Cloud storage service of today is faced with a stern challenge, is how in the case where data increase on a large scale
Realize effective management to these data.In order to realize the scalability of data management in cloud computing environment, data de-duplication
Technology has attracted increasing concern.Data de-duplication technology is a kind of special data compression technique, and it is used to delete
The copy of the repetition of identical data in cloud computing.The technology is used to improve space utilisation, and can apply in network number
According to reducing necessary transmission byte in transmitting procedure.It is different from identical data are preserved with multiple copies, data de-duplication skill
Art only retains identical data a physical copy and points to the copy with this identical data by other.Although duplicate data is deleted
Except technology brings many benefits, but from internal or external security threat for the security of user's sensitive data and hidden
The influence of private, and need to consider a problem.Although traditional encipherment scheme can provide data security, and repeat number
The problem of incompatible be present according to deletion system.
Specifically, in legacy encryption scheme, different users encrypts the data of oneself with each different keys,
Therefore, the identical data from different user has different ciphertext forms, and this causes the deletion of duplicate data to be difficult to.Receive
Hold back encryption and provide a feasible method to realize data de-duplication.It is in one data trnascription of enciphering/deciphering
One convergent key, the key are produced by calculating the cryptographic Hash of the encryption of the data trnascription content.Sum is generated in key
After encryption, user retains the key and ciphertext is sent in cloud.Due to using determinacy encryption, so identical
Data trnascription will produce identical convergence key and identical ciphertext.
In order to prevent unwarranted access, it is necessary to which possessing agreement with the provable data of a safety provides an evidence
To prove that user really possesses and duplicated that file of copy.After proof, server will be that these have phase identical text
The user of part each assigns a pointer, and user and need not upload the identical file.User can be carried using server
The pointer of confession downloads encrypted file, and this document can only be decrypted by corresponding data owner using key is restrained.
Therefore, convergent encryption technology can allow mysorethorn to show the data de-duplication to ciphertext, and can be by providing proof of ownership
To avoid access of the unauthorized user to file.However, former data deduplication system is not supported to be classified authority
Iterative testing, but this kind of iterative testing is highly important in numerous applications.For example, in a company, permitted
More different authorities will be assigned to employee.For cost-effective and effective management, data will be transferred in public cloud
Storage server provider (Cloud Server), one is only similarly preserved to identical file using data de-duplication technology
Duplicate of the document.Moreover, for the consideration of privacy, some files will be encrypted and only allow some to have the use for specifying authority
Family carries out rechecking, so as to realize access control.
Traditional data deduplication system is based on convergence property, although it is provided for data to a certain extent
Confidentiality, but it does not support the copy inspection of different rights.In other words, in the duplicate data based on convergence encryption technology
In deletion system, the problem of not considering relevant difference mandate.Because the copy of data deduplication and different rights checks originally
It is conflicting.
In order to prove the deficiencies in the prior art, one is designed first with foregoing token generator TagGen (F, kp)
Such data deduplication system.Assuming that there is n user in system, they are combined into the collection of authorityIt is right
In each p select a kp, for the set for possessing an authority PUUser U, he will be allocated a key set
File uploads:Contemplate one and possess authority set PUData owner U want upper transmitting file F and by this document with
Possess authority setUsers to share, and to each p ∈ PF, user calculates and to public cloud storage
Service provider's (Cloud Server) sends filetokens φ F, kp=TagGen (F, kp)
If being found that the copy of repetition in Cloud Server, user will carry out proof to the ownership of this document, if
It is verified, user will be allocated a pointer, and expression allows to conduct interviews to this document.
If not finding the copy of repetition, user, which will utilize, restrains key kf=KeyGenCE(F) encryption file C is calculatedF
=EncCE(kF, F) and upload (CF, { φF, kp) Cloud Server is arrived, wherein, convergence key storage is local in user.
Document retrieval:Assuming that certain user wishes to download file F, filename and download request are sent to Cloud Server first.
Cloud server first verifies whether the user has permission to filename and request and downloads file F afterwards.If authentication failed, cloud
Server will return to one request of user and be rejected, the information of failed download.If be proved to be successful, Cloud Server will return to
The corresponding ciphertext C of userF.User receives CFThe key k being locally stored is utilized afterwardsFDecrypt original document F.
Serious in the presence of some according to such a data deduplication system with licensing scheme of above method structure
Safety problem:
First, each user will obtain sets of private keys according to its own authorityLabeled as PU.User can be with
It is used for iterative testing using this sets of private keys to generate filetokens.But in file upload procedure, user needs to calculate
To possess authority P with otherFUsers to share filetokens.In order to generate these tokens, user needs to know PFPrivate key,
That is PFCan only be from PUMiddle selection.This limitation causes the data deduplication system with licensing scheme can not obtain extensively
General application and limitation.
Secondly, above-mentioned data deduplication system can not be resisted by Client-initiated collusion attack.Because there is identical power
The user of limit can obtain identical private key.So user is possible to conspire to be the new franchise sets of private keys of authority P* generations, and the power
Limit P* and anyone being not belonging in the user that participation is conspired.For example, one possesses authority setUser and another one
Possess authority setUser conspire to produce new authority set
This structure is inherently present easily to be threatened by Brute Force, and the file of Brute Force will be decrypted as known text
Part.So the data deduplication system can not protect the file specified.The reason for one key is exactly that traditional convergence adds
Close system can only protect the semantic security of uncertainty file.
In summary, the problem of prior art is present be:Information communications privacy cannot be protected in the prior art, safety
Property is very low;Existing communication method use range is limited simultaneously.
The content of the invention
The problem of existing for prior art, the invention provides a kind of efficient communication message processing method.This hair
Bright data deduplication system can be supported with the iterative testing authorized;In the present invention, mixed cloud system is introduced
Framework, specifically, the private key for user right distribution are no longer transmitted directly to user, but by a privately owned Cloud Server Lai
Storage and management;And on the other hand, user sends request to privately owned Cloud Server can just obtain filetokens;So, it is of the invention
Solve above mentioned problem and provide higher security.
The present invention is achieved in that a kind of efficient communication message processing method comprises the following steps:
Step 1, communication information receiving terminal activation communication port, while category filter can be carried out to the communication information;
Step 2, communication information transmitting terminal obtains the identity information of selected communication information receiving terminal, when to the communication information
After the authentication success of receiving terminal, communication information transmitting terminal obtains the communication information of user's input;
Before the communication information transmitting terminal obtains the identity information of selected communication information receiving terminal, the communication information need to be carried out
The identity information authentication processing that receiving terminal is sent;The communication information receiving terminal include Cloud Server, privately owned Cloud Server and
Multiple users for possessing different rights,
Specifically include:
1) user shares to transmitting file on Cloud Server and/or data and with other users;
2) user carries out the proof of identification of user in the privately owned Cloud Server;
3) for the proof of identification by rear, the privately owned Cloud Server searches for the phase of the user in its list stored
Answer authority;Otherwise, the proof of identification step that the user carries out user in the privately owned Cloud Server is returned;Meanwhile the use
Family sends demand file token to the privately owned Cloud Server;
4) user obtains the file and corresponds to the token of user right and send to the Cloud Server, the cloud clothes
Business device receives the filetokens, and the user returns to signature backward;
5) user sends the file and/or authority set and the label of data to the privately owned Cloud Server
Name;
6) signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each file
And/or data permission collection calculation document token and it is back to the user;
7) user using the file and/or data for restraining cipher key calculation encryption and uploads ciphertext to the Cloud Server
And access strategy;
The user obtains the filetokens and sent to the Cloud Server, when finding duplicate copies to be present, also
Including:
The user verifies the ownership of the file and/or data with the Cloud Server simultaneously;
After being verified by ownership, the Cloud Server distributes a file and/or the finger of data to the user
Pin, and return and sign to the user;
The user sends the file and/or authority set and the signature of data to the privately owned Cloud Server;
Signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each user institute
The file permission not possessed is calculated filetokens and is back to the user;
The filetokens of the file and/or data are uploaded to the privately owned Cloud Server by the user, and set institute
State file and/or the authority set of data;
Step 3, communication information transmitting terminal send multiple message to the task established between task and a transponder successively
Transmit queue;
Step 4, transponder detect the goal task of the message in transmit queue successively, and transponder successively sends message
To the goal task receiving queue established between goal task and transponder;
Step 5, goal task reads message from goal task receiving queue, and is sent to information exchange platform;
Step 6, the information classification that information exchange platform is set according to communication information receiving terminal, carry out classification processing;
Step 7, information exchange platform carries out different degrees of encryption to the sorted communication information, after encryption
The communication information be sent to communication information receiving terminal;
The encryption process includes:
Public key generates:Public key is by finite field k, and its addition and multiplication structure and n secondary multinomial compositions;
Private key generates:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], one
Point set P, two reversible affine transformation L1And L2And their inverse composition;
The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '=
(z1′,…,zn′);
The process that the centralizing mapping reconfigures comprises the following steps:
First, it is a smaller integer to select r, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForIt is compound with Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*Disturb original centralizing mappingNew public key is mapped as:
The public key generation comprises the following steps:
(1) finite field k, and its addition and multiplication structure are chosen;
(2) 2l secondary multinomial groups are chosen:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
(a) mapping is chosenThat is two random number α1, α2;
(b) z of r Line independent is randomly selected1,…,zr∈k[x1,…,xn];
(c) it is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that.
Further, the communication information receiving terminal is carried out in identity information authentication processing, is specifically included:
The first step, the user share to transmitting file and/or data on the Cloud Server and with other users;
Second step, the user carry out the proof of identification of user in the privately owned Cloud Server;
3rd step, for the proof of identification by rear, the privately owned Cloud Server searches for the use in its list stored
The corresponding authority at family;Otherwise, second step is returned;Meanwhile the user sends demand file token to the privately owned Cloud Server;
4th step, the user obtain the filetokens and sent to the Cloud Server, the Cloud Server and receive
The user returns to signature to the filetokens backward;
5th step, the user send authority set and the institute of the file and/or data to the privately owned Cloud Server
State signature;
6th step, signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each
File and/or data permission collection calculateAnd it is back to the user;
7th step, file and/or data that the user is encrypted using convergence cipher key calculation and on the Cloud Server
PassAnd PF。
Further, the user obtains the filetokens and sent to the Cloud Server, secondary in the presence of repeating when finding
This when, specifically include:
The user verifies the ownership of the file and/or data with the Cloud Server simultaneously;
After being verified by ownership, the Cloud Server distributes a file and/or the finger of data to the user
Pin, and return and sign to the user;
The user sends the file and/or authority set and the signature of data to the privately owned Cloud Server;
Signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each pj∈PF-
PUCalculateAnd it is back to the user;Wherein, PUIn weight before being data owner
Resume classes when testing Cloud Server and doing duplicate checking inquiry, calculated via private clound server, therefore privately owned Cloud Server is not just below
Needing to calculate Pu again (please be revised as PU);Thus only need to calculate the file permission P that he does not possessfPart, that is, Pf-PU;
The filetokens of the file and/or data are uploaded to the privately owned Cloud Server by the user, and set institute
State file and/or the authority set of data.
Further, the communication information receiving terminal is carried out in identity information authentication processing, in addition to:
It is as follows first to define a binary crelation R={ (p, p') }, gives two authorities p and p', and and if only if R (p, p')
When=1, p and p' are matchings;
System is set:Assuming that there is n user in system, they are combined into the collection of authorityTo eachSelect a symmetrical keyThe set of keyIt will be sent in private clound;In addition, also
Define a kind of Identity verification protocol ∏=(Proof, Verify), Proof represents for proving and verifying respectively with Verify
Algorithm;Also, it is assumed that each user U also possesses a privacy key skUFor doing identification together with server;Assuming that
User U possesses authority set PU, while also start PoW agreements " POW " to be issued a certificate for File Ownership;Privately owned Cloud Server will
A form is maintained, stores the public information pk of each userUWith corresponding authority set PU;The file storage system of storage server
System will be arranged to ⊥;
File uploads:Assuming that data owner wants to upload a file F and by this document and the authority category possessed
In PF={ pjOther users to share;Data owner's needs are in Cloud Server prior to privately owned before progress iterative testing
Cloud carries out an interaction;Data owner needs to do an authentication to prove the uniformity with private key sk;If checking is logical
Cross, the corresponding authority P of the data owner is found in the list that privately owned Cloud Server will store at itU;The user calculates φ F=
TagGen (F) simultaneously sends it to privately owned Cloud Server, and privately owned Cloud Server will meet each R (p, p τ)=1 p τ, return
Back to one information of userWherein, p ∈ PU;Then, user will be with Cloud Server
Interaction, filetokens are sent to Cloud Server
If it find that duplicate copies, user needs to run PoW agreements " POW " simultaneously to prove to file with Cloud Server
Ownership;If ownership is verified, user is by by the non-pointer for matching somebody with somebody a this document;Meanwhile come from returning to one
The proof of Cloud Server, this, which is proved to be, is based onWith the signature of timestamp;Then, user sends to privately owned Cloud Server
On file F authority sets PF={ pjAnd above-mentioned signature;Upon receipt of the request, privately owned Cloud Server is first to cloud service
Device verifies above-mentioned signature, and if the verification passes, privately owned Cloud Server will be to each pj∈PF-PUCalculateAnd return to user;These files F token also while is also uploaded to private by user
There is Cloud Server, then the authority set of this document will be arranged to pF;
If not finding duplicate copies, Cloud Server will also return to a proof, and the proof is also one and is based onWith the signature of timestamp;User is sent on file F authority sets P to privately owned Cloud ServerF={ pjAnd above-mentioned label
Name;Upon receipt of the request, privately owned Cloud Server verifies above-mentioned signature to Cloud Server first, if the verification passes, private
There is Cloud Server will be to each pj∈PFCalculateAnd return to user;Finally, use
Family, which will utilize, restrains key kF=KeyGenCE(F) the file C of encryption is calculatedF=EncCE(kF, F) and uploadAnd PF;
File filter:After the encryption data from Cloud Server is received, user uses convergence key kFTo decrypt most
Original file.
Further, the communication information receiving terminal is carried out in identity information authentication processing, in addition to:Resist Brute Force band
The threat come:
The user shares to transmitting file and/or data on the Cloud Server and with other users;
The user carries out the proof of identification of user in the privately owned Cloud Server and sends the H (F) to the private
There is Cloud Server;
The proof of identification is by rear, to all p τ for meeting R (p, p τ)=1 two file label collectionWithUser will be fed back to;
The user receives labelWithAfterwards, will send to the Cloud Server interacted, institute
State after Cloud Server receives the label, signed returning;
The user sends the signature to the privately owned Cloud Server to ask with the file and/or data permission collection
Ask transmitting file and/or data;
The signature is verified after request described in the privately owned cloud server, by rear, the privately owned Cloud Server pair
Each pj∈ P are calculatedWithAnd by calculating
As a result the user will be returned to;
The user is calculated to the file and/or the encryption C of dataF=EncSE (k, F), user upload
Further, the communication information transmitting terminal, the communication information for the communication information getter to be obtained are sent
To described information switching plane;
Further, described information switching plane, for the communication information that the communication recipient receives according to
The classification that communication information receiving terminal is set carries out different degrees of encryption, and the communication information after encryption is sent into the communication believes
Cease receiving terminal..
Further, the communication information receiving terminal, is connected with the communications message processor, for receiving the communication
The communication information after the encryption that message handler is sent, and the communication information after encryption is decrypted, obtain and show decryption
The communication information afterwards.Decrypting process is the inverse process of encryption, the private key for decrypting key used to choose;
1) ciphertext Z '=(z is being obtained1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
2) for the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandon this class value;Otherwise carry out in next step;
3) finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded
One group of (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase checking equation.
Advantages of the present invention and good effect are:The present invention is by obtaining and utilizing the identity information of communication information receiving terminal
Authentication is carried out to communication information receiving terminal, and communication information receiving terminal is re-send to after the communication information is encrypted, is made
Communication information receiving terminal that must be Jing Guo authentication, could obtain the communication information so that the communication information is not easy by any 3rd
Side obtains, and the communication information obtained is by encryption so that the privacy of the communication information can be protected well, carry
High security.The communication means of the present invention realizes the biography of message between different task by the combination of transponder and queue simultaneously
Defeated, so now no longer needing to realize the transmission of message using the message interface of system offer, task only needs to put message
Enqueue, and it is that the transmission of message can be achieved to carry out correspondingly forwarding by transponder.In the present invention by the optimization to queue and
Extension, i.e., communication party of the invention to change the pattern of message in queue, can also be increased to the controlling for attribute for transmitting queue
The use range of method.
The encryption and decryption approaches of the present invention, ensure that the privacy of user is not compromised.
The authentication processing of communication information receiving terminal of the present invention, has used mixed cloud architectural framework, there is provided higher safety
Property;Its security can be ensured to the file that its information can be predicted.
Brief description of the drawings
Fig. 1 is the efficient communication message processing method flow chart that the present invention implements to provide.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to embodiments, to the present invention
It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to
Limit the present invention.
The application principle of the present invention is further described below in conjunction with the accompanying drawings.
Comprise the following steps as shown in figure 1, the present invention provides a kind of efficient communication message processing method:
S101, communication information receiving terminal activation communication port, while category filter can be carried out to the communication information;
S102, communication information transmitting terminal obtain the identity information of selected communication information receiving terminal, connect when to the communication information
After the authentication success of receiving end, communication information transmitting terminal obtains the communication information of user's input;
S103, communication information transmitting terminal send multiple message to the task hair established between task and a transponder successively
Send queue;
S104, transponder detect the goal task of the message in transmit queue successively, and transponder is sent a message to successively
The goal task receiving queue established between goal task and transponder;
S105, goal task reads message from goal task receiving queue, and is sent to information exchange platform;
S106, the information classification that information exchange platform is set according to communication information receiving terminal, carry out classification processing;
S107, information exchange platform carries out different degrees of encryption to the sorted communication information, after encryption
The communication information is sent to communication information receiving terminal.
Before the communication information transmitting terminal obtains the identity information of selected communication information receiving terminal, the communication information need to be carried out
The identity information authentication processing that receiving terminal is sent;The communication information receiving terminal include Cloud Server, privately owned Cloud Server and
Multiple users for possessing different rights,
Specifically include:
1) user shares to transmitting file on Cloud Server and/or data and with other users;
2) user carries out the proof of identification of user in the privately owned Cloud Server;
For the proof of identification by rear, the privately owned Cloud Server searches for the corresponding of the user in its list stored
Authority;Otherwise, the proof of identification that the user carries out user in the privately owned Cloud Server is returned;
3) simultaneously, the user sends demand file token to the privately owned Cloud Server;
4) user obtains the file and corresponds to the token of user right and send to the Cloud Server, the cloud clothes
Business device receives the filetokens, and the user returns to signature backward;
5) user sends the file and/or authority set and the label of data to the privately owned Cloud Server
Name;
6) signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each file
And/or data permission collection calculation document token and it is back to the user;
7) user using the file and/or data for restraining cipher key calculation encryption and uploads ciphertext to the Cloud Server
And access strategy;
The user obtains the filetokens and sent to the Cloud Server, when finding duplicate copies to be present, also
Including:
The user verifies the ownership of the file and/or data with the Cloud Server simultaneously;
After being verified by ownership, the Cloud Server distributes a file and/or the finger of data to the user
Pin, and return and sign to the user;
The user sends the file and/or authority set and the signature of data to the privately owned Cloud Server;
Signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each user institute
The file permission not possessed is calculated filetokens and is back to the user;
The filetokens of the file and/or data are uploaded to the privately owned Cloud Server by the user, and set institute
State file and/or the authority set of data.
Communication information transmitting terminal provided by the invention, the communication information for the communication information getter to be obtained are sent
To described information switching plane;
The encryption process includes:
Public key generates:Public key is by finite field k, and its addition and multiplication structure and n secondary multinomial compositions;
Private key generates:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], one
Point set P, two reversible affine transformation L1And L2And their inverse composition;
The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '=
(z1′,…,zn′);
The process that the centralizing mapping reconfigures comprises the following steps:
First, it is a smaller integer to select r, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForIt is compound with Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*Disturb original centralizing mappingNew public key is mapped as:
The public key generation comprises the following steps:
(1) finite field k, and its addition and multiplication structure are chosen;
(2) 2l secondary multinomial groups are chosen:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
(a) mapping is chosenThat is two random number α1, α2;
(b) z of r Line independent is randomly selected1,…,zr∈k[x1,…,xn];
(c) it is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that.
Decrypting process is the inverse process of encryption, the private key for decrypting key used to choose;
1) ciphertext Z '=(z is being obtained1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
2) for the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandon this class value;Otherwise carry out in next step;
3) finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded
One group of (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase checking equation.
As the preferred embodiment of the embodiment of the present invention, the communication information receiving terminal carries out identity information authentication processing
In, specifically include:
The first step, the user share to transmitting file and/or data on the Cloud Server and with other users;
Second step, the user carry out the proof of identification of user in the privately owned Cloud Server;
3rd step, for the proof of identification by rear, the privately owned Cloud Server searches for the use in its list stored
The corresponding authority at family;Otherwise, second step is returned;Meanwhile the user sends demand file token to the privately owned Cloud Server;
4th step, the user obtain the filetokens and sent to the Cloud Server, the Cloud Server and receive
The user returns to signature to the filetokens backward;
5th step, the user send authority set and the institute of the file and/or data to the privately owned Cloud Server
State signature;
6th step, signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each
File and/or data permission collection calculateAnd it is back to the user;
7th step, file and/or data that the user is encrypted using convergence cipher key calculation and on the Cloud Server
PassAnd PF。
As the preferred embodiment of the embodiment of the present invention, the user obtains the filetokens and sent to the cloud and takes
Business device, when finding duplicate copies to be present, specifically include:
The user verifies the ownership of the file and/or data with the Cloud Server simultaneously;
After being verified by ownership, the Cloud Server distributes a file and/or the finger of data to the user
Pin, and return and sign to the user;
The user sends the file and/or authority set and the signature of data to the privately owned Cloud Server;
Signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each pj∈PF-
PUCalculateAnd it is back to the user;Wherein, PUIn weight before being data owner
Resume classes when testing Cloud Server and doing duplicate checking inquiry, calculated via private clound server, therefore privately owned Cloud Server is not just below
Needing to calculate Pu again (please be revised as PU);Thus only need to calculate the file permission P that he does not possessfPart, that is, Pf-PU;
The filetokens of the file and/or data are uploaded to the privately owned Cloud Server by the user, and set institute
State file and/or the authority set of data.
As the preferred embodiment of the embodiment of the present invention, the communication information receiving terminal carries out identity information authentication processing
In, in addition to:
It is as follows first to define a binary crelation R={ (p, p') }, gives two authorities p and p', and and if only if R (p, p')
When=1, p and p' are matchings;
System is set:Assuming that there is n user in system, they are combined into the collection of authorityTo eachSelect a symmetrical keyThe set of keyIt will be sent in private clound;In addition, also
Define a kind of Identity verification protocol ∏=(Proof, Verify), Proof represents for proving and verifying respectively with Verify
Algorithm;Also, it is assumed that each user U also possesses a privacy key skUFor doing identification together with server;Assuming that
User U possesses authority set PU, while also start PoW agreements " POW " to be issued a certificate for File Ownership;Privately owned Cloud Server will
A form is maintained, stores the public information pk of each userUWith corresponding authority set PU;The file storage system of storage server
System will be arranged to ⊥;
File uploads:Assuming that data owner wants to upload a file F and by this document and the authority category possessed
In PF={ pjOther users to share;Data owner's needs are in Cloud Server prior to privately owned before progress iterative testing
Cloud carries out an interaction;Data owner needs to do an authentication to prove the uniformity with private key sk;If checking is logical
Cross, the corresponding authority P of the data owner is found in the list that privately owned Cloud Server will store at itU;The user calculates φ F=
TagGen (F) simultaneously sends it to privately owned Cloud Server, and privately owned Cloud Server will meet each R (p, p τ)=1 p τ, return
Back to one information of userWherein, p ∈ PU;Then, user will be with Cloud Server
Interaction, filetokens are sent to Cloud Server
If it find that duplicate copies, user needs to run PoW agreements " POW " simultaneously to prove to file with Cloud Server
Ownership;If ownership is verified, user is by by the non-pointer for matching somebody with somebody a this document;Meanwhile come from returning to one
The proof of Cloud Server, this, which is proved to be, is based onWith the signature of timestamp;Then, user sends to privately owned Cloud Server
On file F authority sets PF={ pjAnd above-mentioned signature;Upon receipt of the request, privately owned Cloud Server is first to cloud service
Device verifies above-mentioned signature, and if the verification passes, privately owned Cloud Server will be to each pj∈PF-PUCalculateAnd return to user;These files F token also while is also uploaded to private by user
There is Cloud Server, then the authority set of this document will be arranged to pF;
If not finding duplicate copies, Cloud Server will also return to a proof, and the proof is also one and is based onWith the signature of timestamp;User is sent on file F authority sets P to privately owned Cloud ServerF={ pjAnd above-mentioned label
Name;Upon receipt of the request, privately owned Cloud Server verifies above-mentioned signature to Cloud Server first, if the verification passes, private
There is Cloud Server will be to each pj∈PFCalculateAnd return to user;Finally, use
Family, which will utilize, restrains key kF=KeyGenCE(F) the file C of encryption is calculatedF=EncCE(kF, F) and uploadAnd PF;
File filter:After the encryption data from Cloud Server is received, user uses convergence key kFTo decrypt most
Original file.
As the preferred embodiment of the embodiment of the present invention, the communication information receiving terminal carries out identity information authentication processing
In, in addition to:Resist the threat that Brute Force is brought:
The user shares to transmitting file and/or data on the Cloud Server and with other users;
The user carries out the proof of identification of user in the privately owned Cloud Server and sends the H (F) to the private
There is Cloud Server;
The proof of identification is by rear, to all p τ for meeting R (p, p τ)=1 two file label collectionWithUser will be fed back to;
The user receives labelWithAfterwards, will send to the Cloud Server interacted, institute
State after Cloud Server receives the label, signed returning;
The user sends the signature to the privately owned Cloud Server to ask with the file and/or data permission collection
Ask transmitting file and/or data;
The signature is verified after request described in the privately owned cloud server, by rear, the privately owned Cloud Server pair
Each pj∈ P are calculatedWithAnd by calculating
As a result the user will be returned to;
The user is calculated to the file and/or the encryption C of dataF=EncSE(k, F), user upload
As the preferred embodiment of the embodiment of the present invention, information exchange platform provided by the invention, for the communication
The classification that the communication information that message recipient receives is set according to communication information receiving terminal carries out different degrees of encryption, will add
The communication information after close is sent to the communication information receiving terminal.
As the preferred embodiment of the embodiment of the present invention, communication information receiving terminal provided by the invention, with the letter that communicates
Breath processor is connected, the communication information after the encryption sent for receiving the communications message processor, and to encryption after
The communication information is decrypted, and obtains and shows the communication information after decryption.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
All any modification, equivalent and improvement made within refreshing and principle etc., should be included in the scope of the protection.
Claims (8)
- A kind of 1. efficient communication message processing method, it is characterised in that the efficient communication message processing method bag Include following steps:Step 1, communication information receiving terminal activation communication port, while category filter can be carried out to the communication information;Step 2, communication information transmitting terminal obtain the identity information of selected communication information receiving terminal, received when to the communication information After the authentication success at end, communication information transmitting terminal obtains the communication information of user's input;The communication information transmitting terminal obtains Before the identity information for taking selected communication information receiving terminal, the identity information authentication department of communication information receiving terminal transmission need to be carried out Reason;The communication information receiving terminal includes Cloud Server, privately owned Cloud Server and multiple users for possessing different rights,Specifically include:1) user shares to transmitting file on Cloud Server and/or data and with other users;2) user carries out the proof of identification of user in the privately owned Cloud Server;3) for the proof of identification by rear, the privately owned Cloud Server searches for the corresponding power of the user in its list stored Limit;Otherwise, the proof of identification step that the user carries out user in the privately owned Cloud Server is returned;Meanwhile the user to The privately owned Cloud Server sends demand file token;4) user obtains the file and corresponds to the token of user right and send to the Cloud Server, the Cloud Server Receiving the filetokens, the user returns to signature backward;5) user sends the file and/or authority set and the signature of data to the privately owned Cloud Server;6) signature described in the private clound server authentication, by rear, the privately owned Cloud Server will to each file and/or Data permission collection calculation document token is simultaneously back to the user;7) user using the file and/or data for restraining cipher key calculation encryption and uploads ciphertext and visit to the Cloud Server Ask strategy;The user obtains the filetokens and sent to the Cloud Server, when finding duplicate copies to be present, in addition to:The user verifies the ownership of the file and/or data with the Cloud Server simultaneously;After being verified by ownership, the Cloud Server distributes a file and/or the pointer of data to the user, and Return and sign to the user;The user sends the file and/or authority set and the signature of data to the privately owned Cloud Server;Signature described in the private clound server authentication, by rear, the privately owned Cloud Server will not have to each user Standby file permission is calculated filetokens and is back to the user;The filetokens of the file and/or data are uploaded to the privately owned Cloud Server by the user, and set the text The authority set of part and/or data;Step 3, communication information transmitting terminal send multiple message to the task established between task and a transponder and sent successively Queue;Step 4, transponder detect the goal task of the message in transmit queue successively, and transponder sends a message to mesh successively The goal task receiving queue established between mark task and transponder;Step 5, goal task reads message from goal task receiving queue, and is sent to information exchange platform;Step 6, the information classification that information exchange platform is set according to communication information receiving terminal, carry out classification processing;Step 7, information exchange platform carry out different degrees of encryption to the sorted communication information, will be logical after encryption Letter information is sent to communication information receiving terminal;The encryption process includes:Public key generates:Public key is by finite field k, and its addition and multiplication structure and n secondary multinomial compositions;Private key generates:Private key is by mapping the z of the r Line independent for F~randomly select1,…,zr∈k[x1,…,x2l], a point Collect P, two reversible affine transformation L1And L2And their inverse composition;The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);The process that the centralizing mapping reconfigures comprises the following steps:First, it is a smaller integer to select r, randomly chooses r Line independent equation<mfenced open = "" close = ""> <mtable> <mtr> <mtd> <mrow> <msub> <mi>z</mi> <mn>1</mn> </msub> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msub> <mi>x</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mo>&Sigma;</mo> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </munderover> <msub> <mi>&alpha;</mi> <mrow> <mi>j</mi> <mn>1</mn> </mrow> </msub> <msub> <mi>x</mi> <mi>j</mi> </msub> <mo>+</mo> <msub> <mi>&beta;</mi> <mn>1</mn> </msub> </mrow> </mtd> </mtr> <mtr> <mtd> <mo>.</mo> </mtd> </mtr> <mtr> <mtd> <mo>.</mo> </mtd> </mtr> <mtr> <mtd> <mo>.</mo> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>z</mi> <mi>r</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msub> <mi>x</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mo>&Sigma;</mo> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </munderover> <msub> <mi>&alpha;</mi> <mrow> <mi>j</mi> <mi>r</mi> </mrow> </msub> <msub> <mi>x</mi> <mi>j</mi> </msub> <mo>+</mo> <msub> <mi>&beta;</mi> <mi>r</mi> </msub> </mrow> </mtd> </mtr> </mtable> </mfenced>Map Z:k2l→krIt is identified below:Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),Secondly, the multinomial that 2l total degree is 2 is randomly selectedMappingIt is identified below:Then, perturbed hard-chain F is defined*:k2l→k2lForIt is compound with Z:Wherein f1 *,…,f2l *∈k[x1,…,x2l],Finally, F is mapped with internal disturbance*Disturb original centralizing mappingNew public key is mapped as:The public key generation comprises the following steps:(1) finite field k, and its addition and multiplication structure are chosen;(2) 2l secondary multinomial groups are chosen:f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];Described private key generation comprises the following steps:(a) mapping is chosenThat is two random number α1, α2;(b) z of r Line independent is randomly selected1,…,zr∈k[x1,…,xn];(c) it is all mappings to choose point set a P, PPicture and preimage set, i.e.,:<mrow> <mi>P</mi> <mo>=</mo> <mo>{</mo> <mrow> <mo>(</mo> <mi>&mu;</mi> <mo>,</mo> <mi>&lambda;</mi> <mo>)</mo> </mrow> <mo>|</mo> <mover> <mi>F</mi> <mo>^</mo> </mover> <mrow> <mo>(</mo> <mi>&mu;</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>&lambda;</mi> <mo>}</mo> <mo>,</mo> </mrow>Point set P is by 2l quadratic polynomial randomly selectingIt is determined that.
- 2. efficient communication message processing method as claimed in claim 1, it is characterised in that the communication information receiving terminal Carry out in identity information authentication processing, specifically include:The first step, the user share to transmitting file and/or data on the Cloud Server and with other users;Second step, the user carry out the proof of identification of user in the privately owned Cloud Server;3rd step, for the proof of identification by rear, the privately owned Cloud Server searches for the user's in its list stored Corresponding authority;Otherwise, second step is returned;Meanwhile the user sends demand file token to the privately owned Cloud Server;4th step, the user obtain the filetokens and sent to the Cloud Server, and the Cloud Server receives described The user returns to signature to filetokens backward;5th step, the user send the file and/or authority set and the label of data to the privately owned Cloud Server Name;6th step, signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each file And/or data permission collection calculatesAnd it is back to the user;7th step, the user upload using the file and/or data for restraining cipher key calculation encryption and to the Cloud ServerAnd PF。
- 3. efficient communication message processing method as claimed in claim 1, it is characterised in thatThe user obtains the filetokens and sent to the Cloud Server, when finding duplicate copies to be present, specific bag Include:The user verifies the ownership of the file and/or data with the Cloud Server simultaneously;After being verified by ownership, the Cloud Server distributes a file and/or the pointer of data to the user, and Return and sign to the user;The user sends the file and/or authority set and the signature of data to the privately owned Cloud Server;Signature described in the private clound server authentication, by rear, the privately owned Cloud Server will be to each pj∈PF-PUMeter CalculateAnd it is back to the user;Wherein, PUSchool is being repeated before being data owner When testing Cloud Server and doing duplicate checking inquiry, calculated via private clound server, therefore privately owned Cloud Server avoids the need for below Calculating Pu again (please be revised as PU);Thus only need to calculate the file permission P that he does not possessfPart, that is, Pf-PU;The filetokens of the file and/or data are uploaded to the privately owned Cloud Server by the user, and set the text The authority set of part and/or data.
- 4. efficient communication message processing method as claimed in claim 1, it is characterised in thatThe communication information receiving terminal is carried out in identity information authentication processing, in addition to:It is as follows first to define a binary crelation R={ (p, p') }, gives two authorities p and p', and and if only if R (p, p')=1 When, p and p' are matchings;System is set:Assuming that there is n user in system, they are combined into the collection of authorityTo each Select a symmetrical keyThe set of keyIt will be sent in private clound;In addition, also definition is a kind of Identity verification protocol Π=(Proof, Verify), Proof represent the algorithm for proving and verifying with Verify respectively;Also Have, it is assumed that each user U also possesses a privacy key skUFor doing identification together with server;Assuming that user U is gathered around Have permission collection PU, while also start PoW agreements " POW " to be issued a certificate for File Ownership;Privately owned Cloud Server will maintain one Individual form, store the public information pk of each userUWith corresponding authority set PU;The document storage system of storage server will be by It is arranged to ⊥;File uploads:Assuming that a data owner wants to upload a file F and this document and the authority possessed is belonged into PF= {pjOther users to share;Data owner needs to carry out carrying out prior to private clound before iterative testing in Cloud Server One interaction;Data owner needs to do an authentication to prove the uniformity with private key sk;If the verification passes, it is privately owned The corresponding authority P of the data owner is found in the list that Cloud Server will store at itU;The user calculates φ F=TagGen (F) and privately owned Cloud Server is sent it to, privately owned Cloud Server will meet each R (p, pτThe p of)=1τ, return to use One, family informationWherein, p ∈ PU;Then, user will interact with Cloud Server, to Cloud Server sends filetokensIf it find that duplicate copies, user needs to run PoW agreements " POW " simultaneously to prove to own file with Cloud Server Power;If ownership is verified, user is by by the non-pointer for matching somebody with somebody a this document;Meanwhile come from Cloud Server by returning to one Proof, this, which is proved to be, is based onWith the signature of timestamp;Then, user is sent on file F to privately owned Cloud Server Authority set PF={ pjAnd above-mentioned signature;Upon receipt of the request, privately owned Cloud Server is verified above-mentioned to Cloud Server first Signature, if the verification passes, privately owned Cloud Server will be to each pj∈PF-PUCalculate And return to user;These files F token also while is also uploaded to privately owned Cloud Server by user, then the authority of this document Collection will be arranged to pF;If not finding duplicate copies, Cloud Server will also return to a proof, and the proof is also one and is based on With the signature of timestamp;User is sent on file F authority sets P to privately owned Cloud ServerF={ pjAnd above-mentioned signature;Receiving To after the request, privately owned Cloud Server verifies above-mentioned signature, if the verification passes, privately owned Cloud Server to Cloud Server first Will be to each pj∈PFCalculateAnd return to user;Finally, user will utilize and receive Hold back key kF=KeyGenCE(F) the file C of encryption is calculatedF=EncCE(kF, F) and uploadAnd PF;File filter:After the encryption data from Cloud Server is received, user uses convergence key kFTo decrypt most original File.
- 5. efficient communication message processing method as claimed in claim 1, it is characterised in thatThe communication information receiving terminal is carried out in identity information authentication processing, in addition to:Resist the threat that Brute Force is brought:The user shares to transmitting file and/or data on the Cloud Server and with other users;The user carries out the proof of identification of user in the privately owned Cloud Server and sends the H (F) to the private clound Server;The proof of identification meets R (p, p by rear, to allτThe p of)=1τTwo file label collectionWithUser will be fed back to;The user receives labelWithAfterwards, will send to the Cloud Server interacted, the cloud After server receives the label, signed returning;The user by the signature and the file and/or data permission collection send to the privately owned Cloud Server to ask on Transmitting file and/or data;The signature is verified after request described in the privately owned cloud server, by rear, the privately owned Cloud Server is to each Individual pj∈ P are calculatedWithAnd by the result of calculating The user will be returned to;The user is calculated to the file and/or the encryption C of dataF=EncSE (k, F), user upload
- 6. efficient communication message processing method as claimed in claim 1, it is characterised in that the communication information is sent End, the communication information for the communication information getter to be obtained are sent to described information switching plane.
- 7. efficient communication message processing method as claimed in claim 1, it is characterised in that described information switching plane, Classification for being set to the communication information that the communication recipient receives according to communication information receiving terminal carries out different The encryption of degree, the communication information after encryption is sent to the communication information receiving terminal.
- 8. efficient communication message processing method as claimed in claim 1, it is characterised in that the communication information receives End, is connected with the communications message processor, the communication letter after the encryption sent for receiving the communications message processor Breath, and the communication information after encryption is decrypted, obtain and show the communication information after decryption;Decrypting process is the inverse process of encryption, the private key for decrypting key used to choose;1) ciphertext Z '=(z is being obtained1′,…,z2l') after, calculate first:Y '=L2 -1(Z ')=(y1′,…,y2l′);2) for the every bit (μ, λ) in point set P, calculate:<mrow> <mo>(</mo> <msup> <msub> <mi>y</mi> <mn>1</mn> </msub> <mrow> <mo>&prime;</mo> <mo>&prime;</mo> </mrow> </msup> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msup> <msub> <mi>y</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mrow> <mo>&prime;</mo> <mo>&prime;</mo> </mrow> </msup> <mo>)</mo> <mo>=</mo> <msup> <mover> <mi>F</mi> <mo>~</mo> </mover> <mrow> <mo>-</mo> <mn>1</mn> </mrow> </msup> <mo>(</mo> <mo>(</mo> <mrow> <msup> <msub> <mi>y</mi> <mn>1</mn> </msub> <mo>&prime;</mo> </msup> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msup> <msub> <mi>y</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>&prime;</mo> </msup> </mrow> <mo>)</mo> <mo>+</mo> <mi>&lambda;</mi> <mo>)</mo> <mo>,</mo> </mrow>Then Z (y are verified1″,…,y2l")=μ, if invalid, abandon this class value;Otherwise carry out in next step;3) finally calculate:M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),If only unique one group of (m1′,…,m2l'), then M ' must be just corresponding plaintext, if obtained more than one group (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase checking equation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711044380.9A CN107786662A (en) | 2017-10-31 | 2017-10-31 | A kind of efficient communication message processing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711044380.9A CN107786662A (en) | 2017-10-31 | 2017-10-31 | A kind of efficient communication message processing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107786662A true CN107786662A (en) | 2018-03-09 |
Family
ID=61431984
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711044380.9A Pending CN107786662A (en) | 2017-10-31 | 2017-10-31 | A kind of efficient communication message processing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107786662A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113162946A (en) * | 2021-05-11 | 2021-07-23 | 彭松英 | Communication information transmission system based on cloud computing and cloud storage |
CN115150183A (en) * | 2022-07-25 | 2022-10-04 | 黄涌瀚 | Multivariable public key communication information transmission method based on cloud computing and cloud storage |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070155362A1 (en) * | 2005-12-30 | 2007-07-05 | Davis Russell J | First responder communication system |
CN103259711A (en) * | 2012-11-07 | 2013-08-21 | 鹤山世达光电科技有限公司 | Method and system for communication information transmission |
CN103501227A (en) * | 2013-10-23 | 2014-01-08 | 西安电子科技大学 | Improved multi-variable public key cryptogram encryption and decryption scheme |
CN103634707A (en) * | 2012-08-23 | 2014-03-12 | 上海斐讯数据通信技术有限公司 | Communication method |
CN103780607A (en) * | 2014-01-13 | 2014-05-07 | 西安电子科技大学 | Repeating-data deleting method based on different permissions and system thereof |
CN106326758A (en) * | 2016-08-30 | 2017-01-11 | 四川格锐乾图科技有限公司 | System for performing classified encryption on data according to user demand |
-
2017
- 2017-10-31 CN CN201711044380.9A patent/CN107786662A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070155362A1 (en) * | 2005-12-30 | 2007-07-05 | Davis Russell J | First responder communication system |
CN103634707A (en) * | 2012-08-23 | 2014-03-12 | 上海斐讯数据通信技术有限公司 | Communication method |
CN103259711A (en) * | 2012-11-07 | 2013-08-21 | 鹤山世达光电科技有限公司 | Method and system for communication information transmission |
CN103501227A (en) * | 2013-10-23 | 2014-01-08 | 西安电子科技大学 | Improved multi-variable public key cryptogram encryption and decryption scheme |
CN103780607A (en) * | 2014-01-13 | 2014-05-07 | 西安电子科技大学 | Repeating-data deleting method based on different permissions and system thereof |
CN106326758A (en) * | 2016-08-30 | 2017-01-11 | 四川格锐乾图科技有限公司 | System for performing classified encryption on data according to user demand |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113162946A (en) * | 2021-05-11 | 2021-07-23 | 彭松英 | Communication information transmission system based on cloud computing and cloud storage |
CN115150183A (en) * | 2022-07-25 | 2022-10-04 | 黄涌瀚 | Multivariable public key communication information transmission method based on cloud computing and cloud storage |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sukhodolskiy et al. | A blockchain-based access control system for cloud storage | |
Wu et al. | Efficient and privacy-preserving traceable attribute-based encryption in blockchain | |
Zhang et al. | Cryptographic solutions for cloud storage: Challenges and research opportunities | |
Zhou et al. | Achieving secure role-based access control on encrypted data in cloud storage | |
CN103780607B (en) | The method of the data de-duplication based on different rights | |
Li et al. | A hybrid cloud approach for secure authorized deduplication | |
JP4855940B2 (en) | Efficient management of cryptographic key generation | |
CN105024802B (en) | Multi-user's multi-key word based on Bilinear map can search for encryption method in cloud storage | |
CN106254342A (en) | The secure cloud storage method of file encryption is supported under Android platform | |
Liu et al. | A novel quantum group proxy blind signature scheme based on five-qubit entangled state | |
Sumathi et al. | A group-key-based sensitive attribute protection in cloud storage using modified random Fibonacci cryptography | |
CN113645039A (en) | Communication information transmission system and method based on different authorities | |
Mukundan et al. | Replicated Data Integrity Verification in Cloud. | |
Guo et al. | Using blockchain to control access to cloud data | |
Tian et al. | An efficient scheme of cloud data assured deletion | |
CN107919966A (en) | A kind of network security controller of computer | |
CN107786662A (en) | A kind of efficient communication message processing method | |
Gang et al. | Secure image deduplication in cloud storage | |
CN108600160A (en) | Communication protocol safety management system in a kind of Industry Control | |
Yang et al. | Towards revocable fine-grained encryption of cloud data: Reducing trust upon cloud | |
Silambarasan et al. | Attribute-based convergent encryption key management for secure deduplication in cloud | |
Nandini et al. | Implementation of hybrid cloud approach for secure authorized deduplication | |
Venkatesh et al. | Secure authorised deduplication by using hybrid cloud approach | |
CN117648706B (en) | Access control method based on block chain and attribute encryption | |
CN116150793B (en) | DOA-based handle identification analysis technology data protection method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180309 |
|
RJ01 | Rejection of invention patent application after publication |