CN108055127A - It calculates and supports heat update Encryption Algorithm and key data encryption method with data separating - Google Patents
It calculates and supports heat update Encryption Algorithm and key data encryption method with data separating Download PDFInfo
- Publication number
- CN108055127A CN108055127A CN201711337142.7A CN201711337142A CN108055127A CN 108055127 A CN108055127 A CN 108055127A CN 201711337142 A CN201711337142 A CN 201711337142A CN 108055127 A CN108055127 A CN 108055127A
- Authority
- CN
- China
- Prior art keywords
- encryption
- ciphertext
- key
- data
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of calculating and supports heat update Encryption Algorithm and key data encryption method with data separating.The calculating supports heat update Encryption Algorithm with data separating, and encrypted computing is abstracted first, forms a unified service;It is closely knit existing by the encryption of working key, the upgrading of working key, encryption reconciliation again.The key data encryption method includes encrypted data service and encryption upgrading two parts.Beneficial technique effect:The calculating of the present invention and data separating, enhance Information Security;The upgrade encryption algorithm or change key of the present invention is transparent to called side, is changed without called side;The dual different modes encryption of working key of the present invention, reduces Key Exposure risk.
Description
Technical field
The invention belongs to data confidentiality, technical field of security and protection, and in particular to a kind of calculating supports heat update with data separating
Encryption Algorithm and key data encryption method.
Background technology
Present data safety, customer privacy are more and more important.In order to after preventing to drag storehouse to occur and it is possible it is artificial caused by
Leaking data takes privacy-sensitive data encryption storage just critically important.General encryption method have symmetric cryptography and it is asymmetric plus
It is close, in general exploitation, a set of encrypting and decrypting method can be realized in respective program.But micro services are popular now, only our portions
Door just has tens micro services, and still maintains certain growth trend.Some sensitive datas may be shared for some services,
Some services share a set of identical encryption method again.If each realizing a set of encipher-decipher method, the pipe of service is not easy to
Reason, upgrading etc..In addition, there are following technological difficulties for available data secrecy technology:
1. most encipherment scheme can not support that the update of Encryption Algorithm or key or newer cost are very big.
2. existing major part encipherment scheme calculates and storage does not separate, the security of encryption data still has larger hidden
Suffer from.
3. working key single ply protective is easily revealed, and very high to the safety requirements of master key
In conclusion for the deficiencies in the prior art, it is necessary to a shared cryptographic services.
The content of the invention
The object of the present invention is to provide a kind of calculating and data separating to support heat update Encryption Algorithm and key data encryption
Method.Its concrete implementation method is as follows:
It calculates and supports heat update Encryption Algorithm with data separating, which is characterized in that encrypted computing is abstracted first,
Form a unified service;It carries out as follows again:
The encryption of step 1. working key;The cryptographic work key by the way of double-encryption:
The weight of first layer/first:First upset the original structure of working key using key structure, retrieve the work after upsetting
Make key;
The weight of the second layer/second:By master key encryption first layer obtain upset after working key;
The upgrading of step 2. working key;Working key is only upgraded by increased mode;In other words, working key cannot
Change, can not delete;It can only be increased based on working key, cannot change and delete, business holds legacy data or new at any time
Data can successful decryption.
Step 3. is encrypted;
3.1 obtain former ciphertext according to corresponding Encryption Algorithm;
The new ciphertext of 3.2 combinations, the ciphertext structure are:Encryption Algorithm id length+Encryption Algorithm id length+original ciphertext length
+ original ciphertext;
3.3 encrypt new ciphertext structure with 3BASE64, obtain ciphertext to the end.
Step 4. is decrypted;
4.1 first unlock ciphertext structure, obtain algorithm id and real ciphertext;
4.2 find corresponding algorithm types, encrypted algorithm secret key according still further to algorithm id;
After 4.3, encrypted algorithm secret key is unlocked using key structure and master key, obtains real algorithm secret key;
4.4 is last, then solves ciphertext.Even if request of data of so haveing been friends in the past is decrypted, can also it unlock.
Furtherly, in step 1, key structure is a kind of Encryption Algorithm, and one kind is upset at random, a kind of insertion constant
Or the mode of variable.
Furtherly, key structure is stored in database, and master key is stored in configuration;In other words, master key and key
Structure is individually stored separately.Preferred scheme is that master key is stored in configuration and by key person's kept secure in other peaces
Full place.In this way, no matter key structure or master key are individually revealed, ciphertext data is all unable to.And it also reduces both
The risk of leakage.
Furtherly, Encryption Algorithm id is 1 16 system;Encryption Algorithm id is 16 systems, and length is variable;Former ciphertext is long
It spends for 4 16 systems.
Furtherly, including encrypted data service and encryption upgrading two parts;Wherein,
Encrypted data service is specially:Data service can store the encrypted ciphertext of original text, and business side of throwing to is to be every
The ciphertext id that ciphertext is individually issued;Any business service can obtain identical ciphertext id with after identical request of data encryption;
Encryption upgrades:A cryptographic secret table is created, to the data in original code ciphertext table one by one according to new
Encryption method re-encrypted, and store in newly-built cryptographic secret table;
If there is password request encryption at this time, can be encrypted twice:According to old algorithm for encryption, storage to Old Password ciphertext
In table;It encrypts, and is stored in new cryptographic secret table according still further to new algorithm;
Although different ciphertexts can be obtained, ciphertext id is really the same;Ciphertext id is returned into calling service side again;
When the data in Old Password ciphertext table all have new correspondence in new password ciphertext table, type of message can be changed
With the correspondence of algorithm, when there is new request of data encryption again, just only with new algorithm for encryption and it is only stored in new
In cryptographic secret table.Furtherly, the upgrading of other type of messages is also identical.
Furtherly, the working key of cryptographic calculation service can upgrade, and just encrypted data service be needed to upgrade accordingly;Cause
The direct interface to calling service side is only for encrypted data service in fact;The encrypting and decrypting of service is required when upgrading
Function remains to externally provide, therefore is smooth upgrade;
Furtherly, when upgrading, upgrade according to original text type to do;For example, it may be possible to the independent upgrade cipher of meeting, and
Cell-phone number does not have to upgrading.If all data, all in same table, amount will be very big when upgrading, and it also requires protecting
The ciphertext for demonstrate,proving the data of the same type in same table is with re-request cryptographic calculation service at that time, and obtained ciphertext needs phase
Deng.Not so the ciphertext id that business side is ignorant of can be returned, when being related to service interaction, business side is may result in and is thought as two
Different data.
For this purpose, divide table according to type of message, data (such as password, cell-phone number, the data of identification card number) are respectively present
In the table of different (three).If the security of password needs to improve at this time, it need to be upgraded, just with after the method for the present invention, just
Can upgrade cipher ciphertext table and realize improve password security.
Beneficial technique effect
The technological merit outstanding behaviours of the present invention is at following aspect:
1. calculating and data separating, enhance Information Security;
2. upgrade encryption algorithm or change key are transparent to called side, changed without called side;
3. the dual different modes encryption of working key, reduces Key Exposure risk.
Description of the drawings
Fig. 1 is the flow chart of the present invention.
Fig. 2 is the sequence diagram of the present invention.
Fig. 3 is the update flow chart of the present invention.
Specific embodiment
In conjunction with attached drawing the technical characterstic and remarkable advantage that the present invention will be described in detail.
First, cryptographic calculation service
With reference to Fig. 1 to 2, in the present invention, some encrypted computings are abstracted first, form a unified clothes
Business.This design philosophy is relatively easy to implement.But this means that a service simultaneously, possess whole doors or even
The decrypted rights of the sensitive data of full companies, this just allows the cryptographic calculation service safety problem of itself to be increased to very high grade.
For this purpose, the present invention makes following improvement and optimization:
The encryption of 1.1 working keys
General way is the working key of all algorithms all by the master key encryption serviced and then storage.But this is in fact
The security of all working key is relied on to an individual master key.The management of master key may take HD encryption
Mode encrypt.Although so the safety is improved, every time the complexity of master key is asked to add, it could even be possible to shadow
Ring the performance to service.
For this purpose, the cryptographic work key by the way of double-encryption in the present invention.First layer is first beaten using key structure
The random original structure of working key, retrieves the working key after upsetting.Key structure can define a kind of encryption to calculate
Method can also be that one kind is upset at random, be inserted into constant, the mode of variable.The second layer is beaten by what master key encryption first layer obtained
Working key after unrest.
In use, key structure is stored in database, master key is stored in configuration, and is existed by key person's kept secure
Other safe places.In this way, no matter key structure or master key are individually revealed, ciphertext data is all unable to.And master key and
Key structure is individually stored separately, and also reduces the risk both revealed.
The upgrading of 1.2 working keys
The encryption intensity of Encryption Algorithm can generally be increased as the length of encryption key increases.Encryption intensity is bigger, meaning
Taste, which, to be more difficult to be cracked, and the duration and CPU that when decryption needs are higher.So need the key of one suitable length of selection.If
A key that may be cracked is selected to pursue performance, then needs regular upgrade key.
The present invention be one towards common service, and itself not storage service data, if so the service is adopted
The upgrading of key is carried out with the mode of change key, then needs the re-request encryption simultaneously of business side.When the service being related to very
When more, cooperate with multiple departments, entire thing will become fairly cumbersome.So working key in the present invention does not allow more
Change and delete, can only increase.
1.3 encryptions and decryption
It needs to consider decryption while encryption, therefore the encryption of the present invention comes together to illustrate herein with decryption.
Algorithm in the present invention may there are a variety of keys, some keys therein to be likely to be at safety problem,
It is eliminated to reuse and carrys out encryption data.But in the present invention, this key cannot still be deleted, because business can
It is encrypted using old key that legacy data can be had, decryption is just still to old key.
But security consideration is in order at, during cryptographic calculation service encryption, can't inform that called side add using
Decryption method.And for the convenience of business side, being given to the data of business side should simplify enough, it should only encrypted ciphertext.
So the improvement of the present invention stresses in ciphertext:
1) former ciphertext is obtained according to corresponding Encryption Algorithm
2) new ciphertext structure is combined:(16 systems, length can by+Encryption Algorithm id for Encryption Algorithm id length (1 16 system)
Become)+original ciphertext length (4 16 systems)+former ciphertext
3) BASE64 encrypts new ciphertext structure, obtains ciphertext to the end
Since the working key that the present invention is based on is can only to increase, it cannot change and delete, business holds old number at any time
According to or new data can successful decryption.
When being decrypted using the present invention, ciphertext structure can be first unlocked, obtains algorithm id and real ciphertext.According to algorithm
Id finds corresponding algorithm types, encrypted algorithm secret key etc..Key structure and master key is recycled to unlock encrypted calculation
Method key obtains real algorithm secret key, finally solves ciphertext again.Even if request of data of so haveing been friends in the past is decrypted, can also it unlock.
2nd, encrypted data service
With reference to Fig. 2 to 3, there is cryptographic calculation service, solve multi-services and be required for realizing a set of encrypting and decrypting
Algorithm, key the work such as management.But actual business requirement is more complicated.Business is often what is intersected, services to obtain from A
Data, need with B service databases mileage according to being compared.This requires A, when B services are just encrypted with the data of system sample,
It need to obtain identical ciphertext.After the encryption algorithm upgrade of A services, B services must also obtain to be upgraded simultaneously, otherwise comparing meeting
Failure.This provides for improved business complexities.For this purpose, the present invention also provides a kind of using Data Encryption Scheme, it is specific as follows
2.1 encrypted data service
Data service can store the encrypted ciphertext of original text, and business side of throwing to is the ciphertext individually issued for every ciphertext
id.Any business service can obtain identical ciphertext id with after identical request of data encryption.The technical characteristic of the present invention
Cryptographic calculation service and encrypted data service are exactly divided into two relatively independent services.Cryptographic calculation service is CPU intensive
Type, high amount of computing.Encrypted data service is I/O intensive type, and operand is small, but data management is more.In the present invention by two
Person separates, i.e., there are two services, is conducive to respective server configuration and extension etc..
2.2 encryption upgradings
In the present invention, the working key of cryptographic calculation service can upgrade, and just encrypted data service be needed to upgrade accordingly.
Because encrypted data service is only the direct interface to calling service side in fact.The encryption solution of service is required when upgrading
Close function remains to externally provide, and exactly needs smooth upgrade.
When upgrading is needed, it can generally upgrade according to original text type to do.Such as may independent upgrade cipher, and
Cell-phone number does not have to upgrading.If all data, all in same table, amount will be very big when upgrading, and it also requires protecting
The ciphertext for demonstrate,proving the data of the same type in same table is with re-request cryptographic calculation service at that time, and obtained ciphertext needs phase
Deng.Not so the ciphertext id that business side is ignorant of can be returned, when being related to service interaction, business side is may result in and is thought as two
Different data.
For this purpose, the present invention is to divide table, such as password, cell-phone number according to type of message, the data of identification card number can deposit respectively
In different tables.Therefore, when using the present invention program, and when the security of password needs to improve, the liter of required progress
Grade is only just the upgrading of cryptographic secret table, efficient, speed is fast, reliability is secure with respect to traditional scheme.
The present invention upgrade method be specifically:A cryptographic secret table is created first, to the data in original code ciphertext table
One by one according to new encryption method re-encrypted, and store in newly-built cryptographic secret table.If there is password request encryption at this time,
It can then be encrypted twice:According to old algorithm for encryption, storage is arrived in Old Password ciphertext table;It encrypts, and stores according still further to new algorithm
To in new cryptographic secret table.Although they can obtain different ciphertexts, ciphertext id is really the same.Ciphertext id is returned again
Back to calling service side.When the data in Old Password ciphertext table have all had new correspondence in new password ciphertext table
When, the correspondence of type of message and algorithm can be changed, when there is new request of data encryption again, just only can use new algorithm
It encrypts and is only stored in new cryptographic secret table.The upgrading of other type of messages is identical.
Claims (9)
- Heat update Encryption Algorithm is supported with data separating, which is characterized in that encrypted computing is abstracted first, group 1. calculating The service unified into one;It carries out as follows again:The encryption of step 1. working key;The cryptographic work key by the way of double-encryption:First layer first upsets the original structure of working key using key structure, retrieves the working key after upsetting;The second layer by master key encryption first layer obtain upset after working key;The upgrading of step 2. working key;The upgrading of working key;Working key is only upgraded by increased mode;Step 3. is encrypted;3.1 obtain former ciphertext according to corresponding Encryption Algorithm;The new ciphertext of 3.2 combinations, the ciphertext structure are:Encryption Algorithm id length+Encryption Algorithm id length+original ciphertext length+original Ciphertext;3.3 encrypt new ciphertext structure with 3BASE64, obtain ciphertext to the end.Step 4. is decrypted;4.1 first unlock ciphertext structure, obtain algorithm id and real ciphertext;4.2 find corresponding algorithm types, encrypted algorithm secret key according still further to algorithm id;After 4.3, encrypted algorithm secret key is unlocked using key structure and master key, obtains real algorithm secret key;4.4 is last, then solves ciphertext.
- 2. calculating according to claim 1 supports heat update Encryption Algorithm with data separating, which is characterized in that in step 1 In, key structure is a kind of Encryption Algorithm, and one kind is upset at random, a kind of mode for being inserted into constant or variable.
- 3. calculating according to claim 1 supports heat update Encryption Algorithm with data separating, which is characterized in that key structure Database is stored in, master key is stored in configuration;In other words, master key and key structure are individually stored separately.
- 4. calculating according to claim 1 supports heat update Encryption Algorithm with data separating, which is characterized in that Encryption Algorithm Id is 1 16 system;Encryption Algorithm id is 16 systems, and length is variable;Former ciphertext length is 4 16 systems.
- 5. the encryption data method of heat update Encryption Algorithm is supported with data separating using any calculating of Claims 1-4, it is special Sign is, including encrypted data service and encryption upgrading two parts;Wherein, the encrypted data service storage encrypted ciphertext of original text, And that business side of throwing to is the ciphertext id individually issued for every ciphertext;Any business service is encrypted with identical request of data Afterwards, identical ciphertext id can be obtained;Encryption upgrades:A cryptographic secret table is created, to the data in original code ciphertext table one by one according to new encryption Method re-encrypted, and store in newly-built cryptographic secret table;If there is password request encryption at this time, can carry out adding twice It is close:According to old algorithm for encryption, storage is arrived in Old Password ciphertext table;It encrypts, and is stored to new cryptographic secret according still further to new algorithm In table;Different ciphertexts is obtained, but ciphertext id is really the same;Then, then by ciphertext id calling service side is returned to.
- 6. encryption data method according to claim 5, which is characterized in that it is during upgrading encrypting, when Old Password ciphertext table In data when all having new correspondence in new password ciphertext table, change the corresponding pass of type of message and algorithm System;When there is new request of data encryption again, then only with new algorithm for encryption and it is only stored in new cryptographic secret table.
- 7. encryption data method according to claim 5, which is characterized in that when the working key of cryptographic calculation service carries out During upgrading, corresponding encrypted data service is just upgraded;And encrypted data service is the direct interface to calling service side, therefore In the method upgrade to smooth upgrade.
- 8. encryption data method according to claim 5, which is characterized in that when upgrading, come according to original text type It does and upgrades;In other words, when the security of password needs to improve and needs upgrading, a upgrade cipher ciphertext table achieves that raising The security of password.
- 9. encryption data method according to claim 5, which is characterized in that after the present invention is ensured by returning to encryption id Continuous Encryption Algorithm or key upgrading, on business without influence;The service of the present invention is split as encrypted data service and cryptographic calculation clothes Business, will calculating and data separating;I.e. in the present invention, the data between different data source are mutually invisible.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711337142.7A CN108055127A (en) | 2017-12-14 | 2017-12-14 | It calculates and supports heat update Encryption Algorithm and key data encryption method with data separating |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711337142.7A CN108055127A (en) | 2017-12-14 | 2017-12-14 | It calculates and supports heat update Encryption Algorithm and key data encryption method with data separating |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108055127A true CN108055127A (en) | 2018-05-18 |
Family
ID=62132814
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711337142.7A Pending CN108055127A (en) | 2017-12-14 | 2017-12-14 | It calculates and supports heat update Encryption Algorithm and key data encryption method with data separating |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108055127A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109547195A (en) * | 2018-11-13 | 2019-03-29 | 阳光保险集团股份有限公司 | A kind of code data processing method and processing device |
CN116933285A (en) * | 2023-07-19 | 2023-10-24 | 贝壳找房(北京)科技有限公司 | Upgrading method, equipment, medium and computer program product for data encryption |
CN117201021A (en) * | 2023-11-08 | 2023-12-08 | 中孚信息股份有限公司 | Key dynamic switching method, system, device and medium for main service system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103281299A (en) * | 2013-04-26 | 2013-09-04 | 天地融科技股份有限公司 | Encryption and decryption devices and information processing method and system |
US20140341375A1 (en) * | 2013-05-16 | 2014-11-20 | Megachips Corporation | Random number generating device, cipher processing device, storage device, and information processing system |
CN105790925A (en) * | 2014-12-24 | 2016-07-20 | 北京奇虎科技有限公司 | Data encryption method, data decryption method, data encryption device and data decryption device |
CN106789004A (en) * | 2016-12-15 | 2017-05-31 | 国云科技股份有限公司 | A kind of network communication method of highly effective and safe |
-
2017
- 2017-12-14 CN CN201711337142.7A patent/CN108055127A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103281299A (en) * | 2013-04-26 | 2013-09-04 | 天地融科技股份有限公司 | Encryption and decryption devices and information processing method and system |
US20140341375A1 (en) * | 2013-05-16 | 2014-11-20 | Megachips Corporation | Random number generating device, cipher processing device, storage device, and information processing system |
CN105790925A (en) * | 2014-12-24 | 2016-07-20 | 北京奇虎科技有限公司 | Data encryption method, data decryption method, data encryption device and data decryption device |
CN106789004A (en) * | 2016-12-15 | 2017-05-31 | 国云科技股份有限公司 | A kind of network communication method of highly effective and safe |
Non-Patent Citations (2)
Title |
---|
张建华: "5.1.3 WEB文件加密存储", 《WEB安全与容侵》 * |
王世昌: "国外银行卡互联网络的报文安全体系", 《计算机系统与网络技术开发及应用实例》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109547195A (en) * | 2018-11-13 | 2019-03-29 | 阳光保险集团股份有限公司 | A kind of code data processing method and processing device |
CN116933285A (en) * | 2023-07-19 | 2023-10-24 | 贝壳找房(北京)科技有限公司 | Upgrading method, equipment, medium and computer program product for data encryption |
CN117201021A (en) * | 2023-11-08 | 2023-12-08 | 中孚信息股份有限公司 | Key dynamic switching method, system, device and medium for main service system |
CN117201021B (en) * | 2023-11-08 | 2024-02-23 | 中孚信息股份有限公司 | Key dynamic switching method, system, device and medium for main service system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110472428B (en) | Medical data sharing method and system based on block chain | |
CN110033258B (en) | Service data encryption method and device based on block chain | |
CN100561916C (en) | A kind of method and system that upgrades authenticate key | |
US9704159B2 (en) | Purchase transaction system with encrypted transaction information | |
CN102402664B (en) | Data access control device and data access control method | |
CN110120869A (en) | Key management system and cipher key service node | |
US20100325732A1 (en) | Managing Keys for Encrypted Shared Documents | |
CN108667605B (en) | Data encryption and decryption method and device | |
US20130073854A1 (en) | Data storage incorporating crytpographically enhanced data protection | |
CN102236766A (en) | Security data item level database encryption system | |
US20200175179A1 (en) | System for triple format preserving encryption | |
CN102571329A (en) | Password key management | |
CN107168998A (en) | A kind of database transparent encryption method based on reservation form | |
CN108154038A (en) | Data processing method and device | |
CN111008855B (en) | Retrospective data access control method based on improved proxy re-encryption | |
CN108055127A (en) | It calculates and supports heat update Encryption Algorithm and key data encryption method with data separating | |
CN112287392B (en) | Intelligent contract implementation method and system with privacy information protection function | |
US20160330022A1 (en) | Cryptographic system, key generation apparatus, re-encryption apparatus and user terminal | |
CN106022159B (en) | ERP data processing methods based on cloud computing | |
US10733317B2 (en) | Searchable encryption processing system | |
CN116340331A (en) | Large instrument experimental result evidence-storing method and system based on blockchain | |
US20210166222A1 (en) | Arrangement of blockchains with a restricted transaction | |
CN113127927B (en) | Attribute reconstruction encryption method and system for license chain data sharing and supervision | |
CN109784920B (en) | Transaction information auditing method and device based on blockchain | |
CN114372242A (en) | Ciphertext data processing method, authority management server and decryption server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180518 |