• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
He Simeng, Yang Chao, Jiang Qi, Yang Li, Ma Jianfeng. Deduplication on Encrypted Data Based on Zero-Knowledge Proof and Key Transmission[J]. Journal of Computer Research and Development, 2018, 55(6): 1222-1235. DOI: 10.7544/issn1000-1239.2018.20170415
Citation: He Simeng, Yang Chao, Jiang Qi, Yang Li, Ma Jianfeng. Deduplication on Encrypted Data Based on Zero-Knowledge Proof and Key Transmission[J]. Journal of Computer Research and Development, 2018, 55(6): 1222-1235. DOI: 10.7544/issn1000-1239.2018.20170415

Deduplication on Encrypted Data Based on Zero-Knowledge Proof and Key Transmission

More Information
  • Published Date: May 31, 2018
  • Data deduplication has been widely used in cloud storage servers to reduce bandwidth and save resource effectively. At present, the key chosen to encrypt the file is always the convergent key in the client-based deduplication, so when parts of the file are revealed or the file is poor in entropy, convergent encryption cannot guarantee the semantic security. As for ownership of the file, now the way in some protocols is to check certain numbers of the file blocks to response the challenge of the server, so it cannot prove the whole ownership of the file. In another word, this way is only in a certain probability condition to ensure the ownership of the file. Apart from above, some protocols choose a third party server to participate in the program. Through this way, we need higher security assumption, and it is not suitable for the reality scenes. In this paper, we propose a scheme to deduplicate encrypted data stored in cloud based on zero-knowledge proof and hidden credential retrieval. It uses zero-knowledge proof to achieve the proof of ownership of the file and hidden credential retrieval to transmit the encrypted key to file owners who have proved their ownership of the file. The result shows that our protocol is more efficient and effective. It is easy to be implemented. Meanwhile it improves the security of the ownership authentication and proposes a new key transmission method.
  • Related Articles

    [1]Zhou Quan, Chen Minhui, Wei Kaijun, Zheng Yulong. Traceable Attribute-Based Signature for SM9-Based Support Policy Hidden[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202330744
    [2]Tian Xuan, Wu Zhichao. Review of Knowledge Base Question Answering Based on Information Retrieval[J]. Journal of Computer Research and Development, 2025, 62(2): 314-335. DOI: 10.7544/issn1000-1239.202331013
    [3]Zhang Yingying, Qian Shengsheng, Fang Quan, Xu Changsheng. Multi-Modal Knowledge-Aware Attention Network for Question Answering[J]. Journal of Computer Research and Development, 2020, 57(5): 1037-1045. DOI: 10.7544/issn1000-1239.2020.20190474
    [4]Wang Yue, Fan Kai. Effective CP-ABE with Hidden Access Policy[J]. Journal of Computer Research and Development, 2019, 56(10): 2151-2159. DOI: 10.7544/issn1000-1239.2019.20190343
    [5]Cui Chaoyuan, Li Yonggang, Wu Yun, Wang Licheng. A Memory Forensic Method Based on Hidden Event Trigger Mechanism[J]. Journal of Computer Research and Development, 2018, 55(10): 2278-2290. DOI: 10.7544/issn1000-1239.2018.20180405
    [6]Wang Lina, Gao Hanjun, Liu Wei, Peng Yang. Detecting and Managing Hidden Process via Hypervisor[J]. Journal of Computer Research and Development, 2011, 48(8): 1534-1541.
    [7]Tian Jianwei and Li Shijun. Retrieving Deep Web Data Based on Hierarchy Tree Model[J]. Journal of Computer Research and Development, 2011, 48(1): 94-102.
    [8]Zeng Xiao, Chen Zhenyong, Chen Ming, and Xiong Zhang. Invertible Image Watermarking Based on Zero Coefficient Index[J]. Journal of Computer Research and Development, 2010, 47(7): 1304-1312.
    [9]Shi Zhiguo, He Yeping, Zhang Hong. A Scenario of Trust Negotiation Based on TPM Anonymous Credentials[J]. Journal of Computer Research and Development, 2008, 45(8): 1279-1289.
    [10]Cheng Yun, Dai Kui, Wang Zhiying, Shen Li, and Guo Jianjun. A New Zero-Block Detection Method for H.264/AVC[J]. Journal of Computer Research and Development, 2005, 42(10): 1758-1762.
  • Cited by

    Periodical cited type(4)

    1. 童瀛,周宇,姚焕章,梁剑,薛虎. 面向私有云的虚拟化网络密文数据防泄漏模型设计. 西安工程大学学报. 2022(01): 129-135 .
    2. 陈璇. 基于Simon量子算法的密钥认证分析研究. 辽宁大学学报(自然科学版). 2021(03): 215-221 .
    3. 高永强. 多副本动态更新数据无重复挖掘仿真. 计算机仿真. 2020(01): 351-354+429 .
    4. 刘红燕,咸鹤群,鲁秀青,侯瑞涛,高原. 基于用户定义安全条件的可验证重复数据删除方法. 计算机研究与发展. 2018(10): 2134-2148 . 本站查看

    Other cited types(1)

Catalog

    Article views (1430) PDF downloads (645) Cited by(5)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return