CN112231766B - Dynamic storage proving method based on novel authentication structure - Google Patents

Dynamic storage proving method based on novel authentication structure Download PDF

Info

Publication number
CN112231766B
CN112231766B CN202011094017.XA CN202011094017A CN112231766B CN 112231766 B CN112231766 B CN 112231766B CN 202011094017 A CN202011094017 A CN 202011094017A CN 112231766 B CN112231766 B CN 112231766B
Authority
CN
China
Prior art keywords
file
node
unmanned aerial
space
aerial vehicle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011094017.XA
Other languages
Chinese (zh)
Other versions
CN112231766A (en
Inventor
郭阳明
刘明明
姚红静
刘尊
王晓东
李庚�
高建军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Monton Information Technology Co ltd
Northwestern Polytechnical University
Shenzhen Institute of Northwestern Polytechnical University
Original Assignee
Xi'an Monton Information Technology Co ltd
Northwestern Polytechnical University
Shenzhen Institute of Northwestern Polytechnical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Monton Information Technology Co ltd, Northwestern Polytechnical University, Shenzhen Institute of Northwestern Polytechnical University filed Critical Xi'an Monton Information Technology Co ltd
Priority to CN202011094017.XA priority Critical patent/CN112231766B/en
Publication of CN112231766A publication Critical patent/CN112231766A/en
Application granted granted Critical
Publication of CN112231766B publication Critical patent/CN112231766B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a dynamic storage proving method based on a novel authentication structure, which is used for completing the integrity verification of a secret state file stored in a space-based information port before downloading and updating the file on the space-based information port, and supporting the dynamic modification processing of the secret state file and the incremental updating of the secret state file, namely for the modified file, only transmitting the modified partial data block to the space-based information port to complete the updating without uploading the whole file again. The dynamic storage certification method based on the invention aims at three dynamic operations of modification, insertion and deletion of the file, only the modified part of the transmitted file needs to be encrypted during resynchronization, and the whole file does not need to be encrypted and transmitted, thereby reducing the calculation overhead and communication overhead of generating and certifying the authentication structure and the storage of the satellite/airborne system, and being a high-efficiency dynamic authentication.

Description

Dynamic storage proving method based on novel authentication structure
Technical Field
The invention relates to the field of information security, in particular to an information security method supporting low-overhead data security transmission and storage.
Background
The networked and intelligent space-based information network is a complex system of 'information + network' integrated all over the earth, collects and processes various data and information, is the key for improving the capacity of a space-based network information system, and is the core for realizing systematic application of the space-based information. Massive information exchange can exist in a space-ground integrated network environment, a space-based information port is a special node of a space-based node network in a space-ground integrated information network, is a main carrier for storing interstellar network information, is accessed to a space-based backbone node through a standard interface, can realize real-time processing, storage and distribution of large data with high space-time resolution, is accessed to various data resources such as satellites and high-altitude unmanned aerial vehicles, openly provides various information service functions and applications, and provides space-based information guarantee and support for different application scenes.
The file system of the machine/satellite-borne operating system in the space-based information port environment is a common method for storing and sharing information. The satellite system synchronizes the secret state file to the space-based information port so as to share the file with other satellites or various application scenes on the ground. In the file synchronization and sharing process, the security problem is the problem to be solved by the file system of the machine/satellite-borne operating system. The security under this scenario consists of two aspects: confidentiality and integrity. Confidentiality relates to technologies such as synchronization and unified access control of secret files, and integrity relates to a verification technology of integrity of space-based information port storage files.
The confidentiality of the file can be protected by encrypting the whole file and then synchronizing the secret file to the server side, but the traditional method needs to re-encrypt the whole file for uploading for re-synchronization after file modification, which results in a large communication cost. In order to reduce the overhead of encryption calculation for updating the file, the file can be divided into blocks and then encrypted respectively, and only the data blocks modified by the file are encrypted after the file is modified.
Conventional techniques for protecting data integrity, such as Message Authentication Codes (MACs) and digital signatures, require the satellite terminal to download all files from the skyhook for verification, which results in significant communication costs, and are not suitable for storage services where the satellite terminal often checks integrity. The concept of Proof of Storage (PoS) was proposed in Ateniese et al. The main idea of PoS is to randomly select some data blocks as challenges, then the server side returns the data blocks and their tags as responses, and the satellite terminal verifies the integrity of the file by verifying the responses. The data blocks and the tags can be aggregated through a homomorphism function, so that the communication cost is reduced. Subsequent work extends the research of PoS, but these work do not take dynamic operation into account. While maintaining the PoS capability, the terminal may also need to dynamically modify, insert, delete, etc. to update the file, so researchers have proposed a dynamic PoS technique. In contrast to PoS, dynamic PoS employs an authentication structure to store authentication information for files, such as a Merkle tree. When performing dynamic operations, the terminal regenerates tags only for updated blocks, rather than for all blocks. Erway et al and subsequent work have focused on the PoS study of dynamic data, proposing some object-specific solutions.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a dynamic storage proving method based on a novel authentication structure. In combination with the application scenario shown in fig. 1, the integrity of the secret file stored in the skybook information port is verified before the file on the skybook information port is downloaded and updated, and the dynamic modification processing of the secret file and the incremental update of the secret file are supported, that is, for the modified file, only a modified part of data blocks are transmitted to the skybook information port to complete the update without uploading the whole file again.
The technical scheme adopted by the invention for solving the technical problem comprises the following steps:
step 1: the scene comprises a space-based information port and an unmanned aerial vehicle or a satellite terminal, wherein the unmanned aerial vehicle or the satellite terminal is divided into a producer and a consumer, the producer is an original satellite/unmanned aerial vehicle, the consumer is a subsequent satellite/unmanned aerial vehicle, the producer encrypts and synchronizes files to the space-based information port in blocks, and deletes a local file and only keeps a use certificate of one file after the files are synchronized;
step 2: the method comprises the following steps that a producer issues index information of a file to a space-based information port, wherein the index information comprises publicable description information of the file and an identifier of a satellite/unmanned aerial vehicle issuing the file;
and 3, step 3: the consumer finds the file that the consumer wants according to the description information, request to the producer who releases this file to use the file according to the label of the satellite/unmanned aerial vehicle;
and 4, step 4: the producer distributes a document use certificate to the consumer, the satellite/unmanned aerial vehicle with the certificate can use the document, and the space-based information port only stores the document and does not have the right to use the document;
and 5: before downloading the file, the consumer who receives the file use certificate firstly enters a certification storage stage and verifies the integrity of the file to a space-based information port;
step 6: after the consumer verifies that the file is completely stored, downloading the file from the Tianji information port for use;
and 7: for the processed file, entering a dynamic updating stage, and only updating the file modification part; before uploading and updating, entering a certification storage stage to verify the integrity of the original edition file of the Tianji information harbor;
and 8: sending updates to the space-based information harbor after the integrity is verified;
and step 9: file uploading, downloading, storing and updating are all in a ciphertext form, and can be decrypted only by owning a file use certificate.
In the step 4, in order to protect the security of the document using the voucher, the voucher is distributed by using the SCPS-SP protocol, and the SCPS-SP protocol provides end-to-end protection for spatial network data transmission.
Also provides an information security storage mechanism of the dynamic storage proving method based on the novel authentication structure, which comprises the following steps:
(1) Establishing a novel authentication structure oriented to dynamic storage certification of a binary tree structure, namely a Homomorphic Authentication Tree (HAT); each leaf node of the homomorphic authentication tree corresponds to a data block, and the number n of the data blocks is equal to the number of leaf nodes in the complete binary tree;
each node in the HAT is a quadruple v i =(i,l i ,v i ,t i ) i Is the only index of the node; the index of the root node is 1, the index increases from top to bottom and from left to right, l i Denotes the number of leaf nodes reached from the ith node, v i Is the version number of the ith node, t i A label representing the ith node;
(2) And the unmanned aerial vehicle/satellite terminal randomly selects a block index to be sent to the space-based information port, and meanwhile, the unmanned aerial vehicle/satellite terminal acquires the data block and verifies the authentication structure information used by the data block by adopting path search and brother search.
(3) And the space-based information port returns the stored data block and the authentication structure information to the unmanned aerial vehicle/satellite terminal, the unmanned aerial vehicle/satellite terminal compares and verifies the data block and the authentication structure information obtained by adopting two search methods, and if the data block is complete, the file is regarded as faithful storage with a certain probability.
The path searching process comprises the following steps:
defining a path search ρ ι And ← Path (T, iota), namely taking HAT label T and block index iota of the file as input, outputting an index set of nodes in a Path from a root node to a leaf node corresponding to iota block of the file, wherein a unique index of the ith node in T is represented as a quadruplet v i =(i,l i ,v i ,t i ) i
Initializing two auxiliary variables for each legal block index iota, where i ι Define its root as the ith in T ι Subtree of individual nodes, ord ι Indicating the position of the corresponding leaf node in the subtree, procedures supporting multipath searching e.g.The following:
a. initializing a path rho and a state st;
b. for each level of T, the node in ρ of each block index iota is computed by a breadth-first search loop.
The brother searching process comprises the following steps:
defining a brother search ψ ← filing (ρ), outputting an index set of brother nodes of all nodes in the path ρ with the path ρ as input, i.e. outputting the leftmost set of nodes in the rest of brothers, the process of brother search is as follows:
a. initializing sibling set psi and auxiliary set
Figure BDA0002723063860000041
b. Determining how many "children" of a node in ρ appear in the ρ row;
(a) If 2, remove 2 "children" from ρ and insert the "children" on the right side
Figure BDA0002723063860000042
(b) If 1, then this "child" is deleted from ρ and inserted into the sibling set ψ.
The method has the advantages that a method for protecting the airborne/spaceborne controlled data area is established, and confidentiality and integrity of the file are guaranteed when the file is synchronized to the space-based information port. In addition, aiming at three dynamic operations of file modification, insertion, deletion and the like, the dynamic storage certification method based on the invention only needs to encrypt the modified part of the transmitted file and does not need to encrypt and transmit the whole file when synchronizing again, thereby reducing the calculation overhead and communication overhead of the generation certification structure and the certification storage of the satellite/airborne system and being high-efficiency dynamic certification.
Drawings
Fig. 1 is a schematic view of an information sharing and secure storage scenario based on skyboard.
Fig. 2 is a schematic structural diagram of a homomorphic authentication tree, in which fig. 2 (a) is a schematic structural diagram showing a file F, and fig. 2 (b) is a schematic structural diagram showing the file F updated to F'.
Detailed Description
The invention is further illustrated with reference to the following figures and examples.
A dynamic storage proving method based on a novel authentication structure,
step 1: the scenario of fig. 1 consists of two parts: the system comprises a space-based information port and an unmanned aerial vehicle or a satellite terminal, wherein the unmanned aerial vehicle or the satellite terminal is divided into an original satellite/unmanned aerial vehicle (producer) and a follow-up satellite/unmanned aerial vehicle and other aircraft (consumer) producer to encrypt synchronous files in blocks to the space-based information port, and after the files are synchronized, the producer deletes a local file and only keeps a use certificate of one file;
step 2: the method comprises the following steps that a producer issues index information of a file to a space-based information port, wherein the index information comprises public description information of the file and an identifier of a satellite/unmanned aerial vehicle issuing the file;
and step 3: the consumer finds the file that the consumer wants according to the description information, request to the producer who releases this file to use the file according to the label of the satellite/unmanned aerial vehicle;
and 4, step 4: the producer distributes the document using certificate to the consumer, the satellite/unmanned aerial vehicle with the certificate can use the document, the space-based information port only stores the document and has no right to use the document, and the SCPS-SP protocol is used for distributing the certificate for protecting the security of the document using certificate and provides end-to-end protection for space network data transmission;
and 5: before downloading the file, the consumer who receives the file use certificate firstly enters a certification storage stage and verifies the integrity of the file to a space-based information port;
and 6: after the consumer verifies that the file is completely stored, downloading the file from the Tianji information port for use;
and 7: for the processed file, entering a dynamic updating stage, and only updating the file modification part; before uploading and updating, entering a certification storage stage to verify the integrity of the original edition file of the Tianji information harbor;
and step 8: the integrity is verified before sending updates to the skyboard.
And step 9: file uploading, downloading, storing and updating are all in a ciphertext form, and can be decrypted only by owning a file use certificate.
Aiming at the characteristic that the communication resources of the airborne/satellite-borne environment are limited, an information security storage mechanism facing the file sharing of the airborne/satellite-borne operating system is realized through a dynamic proof storage technology.
(1) A novel authentication structure for dynamic storage certification, namely a Homomorphic Authentication Tree (HAT), of a binary tree structure is established. Each leaf node of the homomorphic authentication tree corresponds to a data block, and the number n of the data blocks is equal to the number of leaf nodes in the complete binary tree.
Each node in the HAT is a quadruple v i =(i,l i ,v i ,t i ) i And is the unique index of the node. The index of the root node is 1, the index increases from top to bottom and from left to right, l i Denotes the number of leaf nodes, v, reached from the ith node i Is the version number of the ith node, t i A label representing the ith node.
(2) And the unmanned aerial vehicle/satellite terminal randomly selects a block cable to be sent to the space-based information port. Meanwhile, the unmanned aerial vehicle/satellite terminal acquires data blocks by adopting path search and brother search and verifies authentication structure information used by the data blocks.
1) Path search process
Defining a path search ρ ι And ← Path (T, iota), namely taking HAT label T and block index iota of the file as input, outputting an index set of nodes in a Path from a root node to a leaf node corresponding to iota block of the file, wherein a unique index of the ith node in T is represented as a quadruplet v i =(i,l i ,v i ,t i )i。
Initializing two auxiliary variables for each legal block index iota, where i ι Define its root as the ith in T ι Subtree of individual nodes, ord ι Indicating the location of the corresponding leaf node in the sub-tree. The procedure to support multipath searching is as follows:
a. the path ρ and the state st are initialized.
b. For each level of T, the node in ρ of each block index iota is computed by a breadth first search loop.
2) Sibling search process
Define the Sibling search ψ ← filing (ρ), output the index set of Sibling nodes of all nodes in path ρ, i.e. the leftmost set of nodes in the rest of siblings, with path ρ as input.
The sibling search process is as follows:
a. initializing sibling set psi and auxiliary set
Figure BDA0002723063860000061
b. Determining how many "children" of a node in ρ appear in the ρ row;
(a) If 2, remove 2 "children" from ρ and insert the "children" on the right side
Figure BDA0002723063860000062
(b) If 1, then this "child" is deleted from ρ and inserted into the sibling set ψ.
(3) And the space-based information port returns the stored data block and the authentication structure information to the unmanned aerial vehicle/satellite terminal, the unmanned aerial vehicle/satellite terminal compares and verifies the data block and the authentication structure information obtained by adopting two search methods, and if the data blocks are complete, the file is regarded as faithful storage with a certain probability.

Claims (4)

1. A dynamic storage certification method based on a novel authentication structure is characterized by comprising the following steps:
step 1: the scene comprises a space-based information port and an unmanned aerial vehicle or a satellite terminal, wherein the unmanned aerial vehicle or the satellite terminal is divided into a producer and a consumer, the producer is an original satellite/unmanned aerial vehicle, the consumer is a subsequent satellite/unmanned aerial vehicle, the producer encrypts a synchronization file to the space-based information port in a blocking mode, the producer deletes a local file after the files are synchronized, and only a use certificate of one file is reserved;
step 2: the method comprises the following steps that a producer issues index information of a file to a space-based information port, wherein the index information comprises public description information of the file and an identifier of a satellite/unmanned aerial vehicle issuing the file;
and 3, step 3: the consumer finds out the file that the consumer wants according to the description information, request to the producer who releases this file to use the file according to the label of the satellite/unmanned aerial vehicle;
and 4, step 4: the producer distributes a document use certificate to the consumer, the satellite/unmanned aerial vehicle with the certificate can use the document, and the space-based information port only stores the document and does not have the right to use the document;
and 5: before downloading the file, the consumer who receives the file use certificate firstly enters a certification storage stage and verifies the integrity of the file to a space-based information port;
step 6: after the consumer verifies that the file is completely stored, downloading the file from a heaven and base information port for use;
and 7: for the processed file, entering a dynamic updating stage, and only updating the file modification part; before uploading and updating, entering a certification storage stage to verify the integrity of the original edition file of the Tianji information harbor;
and 8: sending updates to the space-based information harbor after the integrity is verified;
and step 9: file uploading, downloading, storing and updating are all in a ciphertext form, and can be decrypted only by owning a file use certificate;
also provides an information security storage mechanism of the dynamic storage proving method based on the novel authentication structure, which comprises the following specific steps:
(1) Establishing a novel authentication structure oriented to dynamic storage certification of a binary tree structure, namely a Homomorphic Authentication Tree (HAT); each leaf node of the homomorphic authentication tree corresponds to a data block, and the number n of the data blocks is equal to the number of leaf nodes in the complete binary tree;
each node in the HAT is a quadruple v i =(i,l i ,v i ,t i ) i, is the unique index of the node; the index of the root node is 1, the index is fromIncreasing from top to bottom and from left to right,/ i Denotes the number of leaf nodes, v, reached from the ith node i Is the version number of the ith node, t i A label representing the ith node;
(2) The unmanned aerial vehicle/satellite terminal randomly selects a block index to be sent to a space-based information port, and meanwhile, the unmanned aerial vehicle/satellite terminal obtains authentication structure information used by a data block and a verification data block by adopting path search and brother search;
(3) And the space-based information port returns the stored data block and the authentication structure information to the unmanned aerial vehicle/satellite terminal, the unmanned aerial vehicle/satellite terminal compares and verifies the data block and the authentication structure information obtained by adopting the two search methods, and if the data block is complete, the file is considered to be faithful to be stored with probability.
2. The dynamic storage attestation method based on a novel authentication structure as claimed in claim 1, wherein:
in the step 4, in order to protect the security of the document using the voucher, the voucher is distributed by using the SCPS-SP protocol, and the SCPS-SP protocol provides end-to-end protection for spatial network data transmission.
3. The dynamic storage attestation method based on a novel authentication structure as claimed in claim 1, wherein: the path searching step comprises:
defining a path search ρ ι And ← Path (T, iota), namely, taking the HAT label T and the block index iota of the file as input, outputting an index set of nodes in a Path from the root node to the leaf node corresponding to the ith block of the file, the third one of T i The unique index of each node is expressed as a quadruplet v i =(i,l i ,v i ,t i )i;
Initializing two auxiliary variables for each legal block index iota, where i ι Define its root as the ith in T ι Subtree of individual nodes, ord ι Indicating the position of the corresponding leaf node in the subtree, the process of supporting multipath search is as follows:
a. initializing a path rho and a state st;
b. for each level of T, the node in ρ of each block index iota is computed by a breadth first search loop.
4. The dynamic storage attestation method based on the novel authentication structure of claim 1, characterized in that: the brother searching steps are as follows:
defining a brother search ψ ← filing (ρ), outputting an index set of brother nodes of all nodes in the path ρ with the path ρ as input, i.e. outputting the leftmost set of nodes in the rest of brothers, the process of brother search is as follows:
a. initializing sibling set psi and auxiliary set
Figure FDA0004098121810000021
b. Determining how many "children" of a node in ρ appear in the ρ row;
(a) If 2, remove 2 "children" from ρ and insert the "children" on the right side
Figure FDA0004098121810000022
(b) If 1, then this "child" is deleted from ρ and inserted into the sibling set ψ.
CN202011094017.XA 2020-10-14 2020-10-14 Dynamic storage proving method based on novel authentication structure Active CN112231766B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011094017.XA CN112231766B (en) 2020-10-14 2020-10-14 Dynamic storage proving method based on novel authentication structure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011094017.XA CN112231766B (en) 2020-10-14 2020-10-14 Dynamic storage proving method based on novel authentication structure

Publications (2)

Publication Number Publication Date
CN112231766A CN112231766A (en) 2021-01-15
CN112231766B true CN112231766B (en) 2023-04-14

Family

ID=74113444

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011094017.XA Active CN112231766B (en) 2020-10-14 2020-10-14 Dynamic storage proving method based on novel authentication structure

Country Status (1)

Country Link
CN (1) CN112231766B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425941A (en) * 2013-07-31 2013-12-04 广东数字证书认证中心有限公司 Cloud storage data integrity verification method, equipment and server
CN106056005A (en) * 2016-07-07 2016-10-26 吴本刚 Method for sharing satellite information data

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200313859A1 (en) * 2019-03-29 2020-10-01 Accenture Global Solutions Limited Cryptologic Blockchain-Based Off-Chain Storage Verification

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425941A (en) * 2013-07-31 2013-12-04 广东数字证书认证中心有限公司 Cloud storage data integrity verification method, equipment and server
CN106056005A (en) * 2016-07-07 2016-10-26 吴本刚 Method for sharing satellite information data

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Construction of estimated level based balanced binary search tree;R. Chinnaiyan etc.;《IEEE》;20171218;全文 *
基于BLS的动态云数据完整性验证方案;高歌等;《山东师范大学学报(自然科学版)》;20180630;全文 *
基于多分支路径树的云存储数据完整性验证机制;李勇等;《清华大学学报(自然科学版)》;20160515(第05期);全文 *
飞行器FPGA检测点优化设置方法;郭阳明等;《计算机测量与控制》;20170630;全文 *

Also Published As

Publication number Publication date
CN112231766A (en) 2021-01-15

Similar Documents

Publication Publication Date Title
Derler et al. Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
CN109120639B (en) Data cloud storage encryption method and system based on block chain
US6912656B1 (en) Method and apparatus for sending encrypted electronic mail through a distribution list exploder
US6128742A (en) Method of authentication based on intersection of password sets
CN112204921A (en) System and method for protecting data privacy of lightweight devices using blockchains and multi-party computing
US20090034742A1 (en) Identity-based encryption system
CN112311537B (en) Block chain-based equipment access authentication system and method
US20150256336A1 (en) End-To-End Encryption Method for Digital Data Sharing Through a Third Party
CN110719165A (en) Block chain distributed dynamic network key generation and encryption method
CN103370706A (en) Distributed file systems
CN113746632B (en) Multi-level identity authentication method for Internet of things system
CN114531680B (en) Light-weight IBC bidirectional identity authentication system and method based on quantum key
Barreto et al. qSCMS: Post-quantum certificate provisioning process for V2X
CN110225028B (en) Distributed anti-counterfeiting system and method thereof
CN112202713A (en) User data security protection method under Kubernetes environment
US6986045B2 (en) Single algorithm cipher suite for messaging
CN112231766B (en) Dynamic storage proving method based on novel authentication structure
CN114389878B (en) Block chain slicing method and block chain network system
CN112423295B (en) Lightweight security authentication method and system based on block chain technology
Shiny et al. Decentralized access control technique with multi-tier authentication of user for cloud storage
Qi et al. Secure data deduplication scheme based on distributed random key in integrated networks
CN112954388A (en) Data file acquisition method and device, terminal equipment and storage medium
CN114553420B (en) Digital envelope packaging method based on quantum key and data secret communication network
CN116743512B (en) Network autonomy and isolation method and device, electronic equipment and readable storage medium
CN112714000B (en) NDN digital signature coding structure, and signature verification method and system for Internet of things equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant