CN108055127A - It calculates and supports heat update Encryption Algorithm and key data encryption method with data separating - Google Patents

It calculates and supports heat update Encryption Algorithm and key data encryption method with data separating Download PDF

Info

Publication number
CN108055127A
CN108055127A CN201711337142.7A CN201711337142A CN108055127A CN 108055127 A CN108055127 A CN 108055127A CN 201711337142 A CN201711337142 A CN 201711337142A CN 108055127 A CN108055127 A CN 108055127A
Authority
CN
China
Prior art keywords
encryption
ciphertext
key
data
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711337142.7A
Other languages
Chinese (zh)
Inventor
廖强
吴群林
李优优
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ji Qi (chengdu) Science And Technology Co Ltd
Original Assignee
Ji Qi (chengdu) Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ji Qi (chengdu) Science And Technology Co Ltd filed Critical Ji Qi (chengdu) Science And Technology Co Ltd
Priority to CN201711337142.7A priority Critical patent/CN108055127A/en
Publication of CN108055127A publication Critical patent/CN108055127A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of calculating and supports heat update Encryption Algorithm and key data encryption method with data separating.The calculating supports heat update Encryption Algorithm with data separating, and encrypted computing is abstracted first, forms a unified service;It is closely knit existing by the encryption of working key, the upgrading of working key, encryption reconciliation again.The key data encryption method includes encrypted data service and encryption upgrading two parts.Beneficial technique effect:The calculating of the present invention and data separating, enhance Information Security;The upgrade encryption algorithm or change key of the present invention is transparent to called side, is changed without called side;The dual different modes encryption of working key of the present invention, reduces Key Exposure risk.

Description

It calculates and supports heat update Encryption Algorithm and key data encryption method with data separating
Technical field
The invention belongs to data confidentiality, technical field of security and protection, and in particular to a kind of calculating supports heat update with data separating Encryption Algorithm and key data encryption method.
Background technology
Present data safety, customer privacy are more and more important.In order to after preventing to drag storehouse to occur and it is possible it is artificial caused by Leaking data takes privacy-sensitive data encryption storage just critically important.General encryption method have symmetric cryptography and it is asymmetric plus It is close, in general exploitation, a set of encrypting and decrypting method can be realized in respective program.But micro services are popular now, only our portions Door just has tens micro services, and still maintains certain growth trend.Some sensitive datas may be shared for some services, Some services share a set of identical encryption method again.If each realizing a set of encipher-decipher method, the pipe of service is not easy to Reason, upgrading etc..In addition, there are following technological difficulties for available data secrecy technology:
1. most encipherment scheme can not support that the update of Encryption Algorithm or key or newer cost are very big.
2. existing major part encipherment scheme calculates and storage does not separate, the security of encryption data still has larger hidden Suffer from.
3. working key single ply protective is easily revealed, and very high to the safety requirements of master key
In conclusion for the deficiencies in the prior art, it is necessary to a shared cryptographic services.
The content of the invention
The object of the present invention is to provide a kind of calculating and data separating to support heat update Encryption Algorithm and key data encryption Method.Its concrete implementation method is as follows:
It calculates and supports heat update Encryption Algorithm with data separating, which is characterized in that encrypted computing is abstracted first, Form a unified service;It carries out as follows again:
The encryption of step 1. working key;The cryptographic work key by the way of double-encryption:
The weight of first layer/first:First upset the original structure of working key using key structure, retrieve the work after upsetting Make key;
The weight of the second layer/second:By master key encryption first layer obtain upset after working key;
The upgrading of step 2. working key;Working key is only upgraded by increased mode;In other words, working key cannot Change, can not delete;It can only be increased based on working key, cannot change and delete, business holds legacy data or new at any time Data can successful decryption.
Step 3. is encrypted;
3.1 obtain former ciphertext according to corresponding Encryption Algorithm;
The new ciphertext of 3.2 combinations, the ciphertext structure are:Encryption Algorithm id length+Encryption Algorithm id length+original ciphertext length + original ciphertext;
3.3 encrypt new ciphertext structure with 3BASE64, obtain ciphertext to the end.
Step 4. is decrypted;
4.1 first unlock ciphertext structure, obtain algorithm id and real ciphertext;
4.2 find corresponding algorithm types, encrypted algorithm secret key according still further to algorithm id;
After 4.3, encrypted algorithm secret key is unlocked using key structure and master key, obtains real algorithm secret key;
4.4 is last, then solves ciphertext.Even if request of data of so haveing been friends in the past is decrypted, can also it unlock.
Furtherly, in step 1, key structure is a kind of Encryption Algorithm, and one kind is upset at random, a kind of insertion constant Or the mode of variable.
Furtherly, key structure is stored in database, and master key is stored in configuration;In other words, master key and key Structure is individually stored separately.Preferred scheme is that master key is stored in configuration and by key person's kept secure in other peaces Full place.In this way, no matter key structure or master key are individually revealed, ciphertext data is all unable to.And it also reduces both The risk of leakage.
Furtherly, Encryption Algorithm id is 1 16 system;Encryption Algorithm id is 16 systems, and length is variable;Former ciphertext is long It spends for 4 16 systems.
Furtherly, including encrypted data service and encryption upgrading two parts;Wherein,
Encrypted data service is specially:Data service can store the encrypted ciphertext of original text, and business side of throwing to is to be every The ciphertext id that ciphertext is individually issued;Any business service can obtain identical ciphertext id with after identical request of data encryption;
Encryption upgrades:A cryptographic secret table is created, to the data in original code ciphertext table one by one according to new Encryption method re-encrypted, and store in newly-built cryptographic secret table;
If there is password request encryption at this time, can be encrypted twice:According to old algorithm for encryption, storage to Old Password ciphertext In table;It encrypts, and is stored in new cryptographic secret table according still further to new algorithm;
Although different ciphertexts can be obtained, ciphertext id is really the same;Ciphertext id is returned into calling service side again; When the data in Old Password ciphertext table all have new correspondence in new password ciphertext table, type of message can be changed With the correspondence of algorithm, when there is new request of data encryption again, just only with new algorithm for encryption and it is only stored in new In cryptographic secret table.Furtherly, the upgrading of other type of messages is also identical.
Furtherly, the working key of cryptographic calculation service can upgrade, and just encrypted data service be needed to upgrade accordingly;Cause The direct interface to calling service side is only for encrypted data service in fact;The encrypting and decrypting of service is required when upgrading Function remains to externally provide, therefore is smooth upgrade;
Furtherly, when upgrading, upgrade according to original text type to do;For example, it may be possible to the independent upgrade cipher of meeting, and Cell-phone number does not have to upgrading.If all data, all in same table, amount will be very big when upgrading, and it also requires protecting The ciphertext for demonstrate,proving the data of the same type in same table is with re-request cryptographic calculation service at that time, and obtained ciphertext needs phase Deng.Not so the ciphertext id that business side is ignorant of can be returned, when being related to service interaction, business side is may result in and is thought as two Different data.
For this purpose, divide table according to type of message, data (such as password, cell-phone number, the data of identification card number) are respectively present In the table of different (three).If the security of password needs to improve at this time, it need to be upgraded, just with after the method for the present invention, just Can upgrade cipher ciphertext table and realize improve password security.
Beneficial technique effect
The technological merit outstanding behaviours of the present invention is at following aspect:
1. calculating and data separating, enhance Information Security;
2. upgrade encryption algorithm or change key are transparent to called side, changed without called side;
3. the dual different modes encryption of working key, reduces Key Exposure risk.
Description of the drawings
Fig. 1 is the flow chart of the present invention.
Fig. 2 is the sequence diagram of the present invention.
Fig. 3 is the update flow chart of the present invention.
Specific embodiment
In conjunction with attached drawing the technical characterstic and remarkable advantage that the present invention will be described in detail.
First, cryptographic calculation service
With reference to Fig. 1 to 2, in the present invention, some encrypted computings are abstracted first, form a unified clothes Business.This design philosophy is relatively easy to implement.But this means that a service simultaneously, possess whole doors or even The decrypted rights of the sensitive data of full companies, this just allows the cryptographic calculation service safety problem of itself to be increased to very high grade. For this purpose, the present invention makes following improvement and optimization:
The encryption of 1.1 working keys
General way is the working key of all algorithms all by the master key encryption serviced and then storage.But this is in fact The security of all working key is relied on to an individual master key.The management of master key may take HD encryption Mode encrypt.Although so the safety is improved, every time the complexity of master key is asked to add, it could even be possible to shadow Ring the performance to service.
For this purpose, the cryptographic work key by the way of double-encryption in the present invention.First layer is first beaten using key structure The random original structure of working key, retrieves the working key after upsetting.Key structure can define a kind of encryption to calculate Method can also be that one kind is upset at random, be inserted into constant, the mode of variable.The second layer is beaten by what master key encryption first layer obtained Working key after unrest.
In use, key structure is stored in database, master key is stored in configuration, and is existed by key person's kept secure Other safe places.In this way, no matter key structure or master key are individually revealed, ciphertext data is all unable to.And master key and Key structure is individually stored separately, and also reduces the risk both revealed.
The upgrading of 1.2 working keys
The encryption intensity of Encryption Algorithm can generally be increased as the length of encryption key increases.Encryption intensity is bigger, meaning Taste, which, to be more difficult to be cracked, and the duration and CPU that when decryption needs are higher.So need the key of one suitable length of selection.If A key that may be cracked is selected to pursue performance, then needs regular upgrade key.
The present invention be one towards common service, and itself not storage service data, if so the service is adopted The upgrading of key is carried out with the mode of change key, then needs the re-request encryption simultaneously of business side.When the service being related to very When more, cooperate with multiple departments, entire thing will become fairly cumbersome.So working key in the present invention does not allow more Change and delete, can only increase.
1.3 encryptions and decryption
It needs to consider decryption while encryption, therefore the encryption of the present invention comes together to illustrate herein with decryption.
Algorithm in the present invention may there are a variety of keys, some keys therein to be likely to be at safety problem, It is eliminated to reuse and carrys out encryption data.But in the present invention, this key cannot still be deleted, because business can It is encrypted using old key that legacy data can be had, decryption is just still to old key.
But security consideration is in order at, during cryptographic calculation service encryption, can't inform that called side add using Decryption method.And for the convenience of business side, being given to the data of business side should simplify enough, it should only encrypted ciphertext. So the improvement of the present invention stresses in ciphertext:
1) former ciphertext is obtained according to corresponding Encryption Algorithm
2) new ciphertext structure is combined:(16 systems, length can by+Encryption Algorithm id for Encryption Algorithm id length (1 16 system) Become)+original ciphertext length (4 16 systems)+former ciphertext
3) BASE64 encrypts new ciphertext structure, obtains ciphertext to the end
Since the working key that the present invention is based on is can only to increase, it cannot change and delete, business holds old number at any time According to or new data can successful decryption.
When being decrypted using the present invention, ciphertext structure can be first unlocked, obtains algorithm id and real ciphertext.According to algorithm Id finds corresponding algorithm types, encrypted algorithm secret key etc..Key structure and master key is recycled to unlock encrypted calculation Method key obtains real algorithm secret key, finally solves ciphertext again.Even if request of data of so haveing been friends in the past is decrypted, can also it unlock.
2nd, encrypted data service
With reference to Fig. 2 to 3, there is cryptographic calculation service, solve multi-services and be required for realizing a set of encrypting and decrypting Algorithm, key the work such as management.But actual business requirement is more complicated.Business is often what is intersected, services to obtain from A Data, need with B service databases mileage according to being compared.This requires A, when B services are just encrypted with the data of system sample, It need to obtain identical ciphertext.After the encryption algorithm upgrade of A services, B services must also obtain to be upgraded simultaneously, otherwise comparing meeting Failure.This provides for improved business complexities.For this purpose, the present invention also provides a kind of using Data Encryption Scheme, it is specific as follows
2.1 encrypted data service
Data service can store the encrypted ciphertext of original text, and business side of throwing to is the ciphertext individually issued for every ciphertext id.Any business service can obtain identical ciphertext id with after identical request of data encryption.The technical characteristic of the present invention Cryptographic calculation service and encrypted data service are exactly divided into two relatively independent services.Cryptographic calculation service is CPU intensive Type, high amount of computing.Encrypted data service is I/O intensive type, and operand is small, but data management is more.In the present invention by two Person separates, i.e., there are two services, is conducive to respective server configuration and extension etc..
2.2 encryption upgradings
In the present invention, the working key of cryptographic calculation service can upgrade, and just encrypted data service be needed to upgrade accordingly. Because encrypted data service is only the direct interface to calling service side in fact.The encryption solution of service is required when upgrading Close function remains to externally provide, and exactly needs smooth upgrade.
When upgrading is needed, it can generally upgrade according to original text type to do.Such as may independent upgrade cipher, and Cell-phone number does not have to upgrading.If all data, all in same table, amount will be very big when upgrading, and it also requires protecting The ciphertext for demonstrate,proving the data of the same type in same table is with re-request cryptographic calculation service at that time, and obtained ciphertext needs phase Deng.Not so the ciphertext id that business side is ignorant of can be returned, when being related to service interaction, business side is may result in and is thought as two Different data.
For this purpose, the present invention is to divide table, such as password, cell-phone number according to type of message, the data of identification card number can deposit respectively In different tables.Therefore, when using the present invention program, and when the security of password needs to improve, the liter of required progress Grade is only just the upgrading of cryptographic secret table, efficient, speed is fast, reliability is secure with respect to traditional scheme.
The present invention upgrade method be specifically:A cryptographic secret table is created first, to the data in original code ciphertext table One by one according to new encryption method re-encrypted, and store in newly-built cryptographic secret table.If there is password request encryption at this time, It can then be encrypted twice:According to old algorithm for encryption, storage is arrived in Old Password ciphertext table;It encrypts, and stores according still further to new algorithm To in new cryptographic secret table.Although they can obtain different ciphertexts, ciphertext id is really the same.Ciphertext id is returned again Back to calling service side.When the data in Old Password ciphertext table have all had new correspondence in new password ciphertext table When, the correspondence of type of message and algorithm can be changed, when there is new request of data encryption again, just only can use new algorithm It encrypts and is only stored in new cryptographic secret table.The upgrading of other type of messages is identical.

Claims (9)

  1. Heat update Encryption Algorithm is supported with data separating, which is characterized in that encrypted computing is abstracted first, group 1. calculating The service unified into one;It carries out as follows again:
    The encryption of step 1. working key;The cryptographic work key by the way of double-encryption:
    First layer first upsets the original structure of working key using key structure, retrieves the working key after upsetting;
    The second layer by master key encryption first layer obtain upset after working key;
    The upgrading of step 2. working key;The upgrading of working key;Working key is only upgraded by increased mode;
    Step 3. is encrypted;
    3.1 obtain former ciphertext according to corresponding Encryption Algorithm;
    The new ciphertext of 3.2 combinations, the ciphertext structure are:Encryption Algorithm id length+Encryption Algorithm id length+original ciphertext length+original Ciphertext;
    3.3 encrypt new ciphertext structure with 3BASE64, obtain ciphertext to the end.
    Step 4. is decrypted;
    4.1 first unlock ciphertext structure, obtain algorithm id and real ciphertext;
    4.2 find corresponding algorithm types, encrypted algorithm secret key according still further to algorithm id;
    After 4.3, encrypted algorithm secret key is unlocked using key structure and master key, obtains real algorithm secret key;
    4.4 is last, then solves ciphertext.
  2. 2. calculating according to claim 1 supports heat update Encryption Algorithm with data separating, which is characterized in that in step 1 In, key structure is a kind of Encryption Algorithm, and one kind is upset at random, a kind of mode for being inserted into constant or variable.
  3. 3. calculating according to claim 1 supports heat update Encryption Algorithm with data separating, which is characterized in that key structure Database is stored in, master key is stored in configuration;In other words, master key and key structure are individually stored separately.
  4. 4. calculating according to claim 1 supports heat update Encryption Algorithm with data separating, which is characterized in that Encryption Algorithm Id is 1 16 system;Encryption Algorithm id is 16 systems, and length is variable;Former ciphertext length is 4 16 systems.
  5. 5. the encryption data method of heat update Encryption Algorithm is supported with data separating using any calculating of Claims 1-4, it is special Sign is, including encrypted data service and encryption upgrading two parts;Wherein, the encrypted data service storage encrypted ciphertext of original text, And that business side of throwing to is the ciphertext id individually issued for every ciphertext;Any business service is encrypted with identical request of data Afterwards, identical ciphertext id can be obtained;
    Encryption upgrades:A cryptographic secret table is created, to the data in original code ciphertext table one by one according to new encryption Method re-encrypted, and store in newly-built cryptographic secret table;If there is password request encryption at this time, can carry out adding twice It is close:According to old algorithm for encryption, storage is arrived in Old Password ciphertext table;It encrypts, and is stored to new cryptographic secret according still further to new algorithm In table;Different ciphertexts is obtained, but ciphertext id is really the same;Then, then by ciphertext id calling service side is returned to.
  6. 6. encryption data method according to claim 5, which is characterized in that it is during upgrading encrypting, when Old Password ciphertext table In data when all having new correspondence in new password ciphertext table, change the corresponding pass of type of message and algorithm System;When there is new request of data encryption again, then only with new algorithm for encryption and it is only stored in new cryptographic secret table.
  7. 7. encryption data method according to claim 5, which is characterized in that when the working key of cryptographic calculation service carries out During upgrading, corresponding encrypted data service is just upgraded;And encrypted data service is the direct interface to calling service side, therefore In the method upgrade to smooth upgrade.
  8. 8. encryption data method according to claim 5, which is characterized in that when upgrading, come according to original text type It does and upgrades;In other words, when the security of password needs to improve and needs upgrading, a upgrade cipher ciphertext table achieves that raising The security of password.
  9. 9. encryption data method according to claim 5, which is characterized in that after the present invention is ensured by returning to encryption id Continuous Encryption Algorithm or key upgrading, on business without influence;The service of the present invention is split as encrypted data service and cryptographic calculation clothes Business, will calculating and data separating;I.e. in the present invention, the data between different data source are mutually invisible.
CN201711337142.7A 2017-12-14 2017-12-14 It calculates and supports heat update Encryption Algorithm and key data encryption method with data separating Pending CN108055127A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711337142.7A CN108055127A (en) 2017-12-14 2017-12-14 It calculates and supports heat update Encryption Algorithm and key data encryption method with data separating

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711337142.7A CN108055127A (en) 2017-12-14 2017-12-14 It calculates and supports heat update Encryption Algorithm and key data encryption method with data separating

Publications (1)

Publication Number Publication Date
CN108055127A true CN108055127A (en) 2018-05-18

Family

ID=62132814

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711337142.7A Pending CN108055127A (en) 2017-12-14 2017-12-14 It calculates and supports heat update Encryption Algorithm and key data encryption method with data separating

Country Status (1)

Country Link
CN (1) CN108055127A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109547195A (en) * 2018-11-13 2019-03-29 阳光保险集团股份有限公司 A kind of code data processing method and processing device
CN116933285A (en) * 2023-07-19 2023-10-24 贝壳找房(北京)科技有限公司 Upgrading method, equipment, medium and computer program product for data encryption
CN117201021A (en) * 2023-11-08 2023-12-08 中孚信息股份有限公司 Key dynamic switching method, system, device and medium for main service system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281299A (en) * 2013-04-26 2013-09-04 天地融科技股份有限公司 Encryption and decryption devices and information processing method and system
US20140341375A1 (en) * 2013-05-16 2014-11-20 Megachips Corporation Random number generating device, cipher processing device, storage device, and information processing system
CN105790925A (en) * 2014-12-24 2016-07-20 北京奇虎科技有限公司 Data encryption method, data decryption method, data encryption device and data decryption device
CN106789004A (en) * 2016-12-15 2017-05-31 国云科技股份有限公司 A kind of network communication method of highly effective and safe

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281299A (en) * 2013-04-26 2013-09-04 天地融科技股份有限公司 Encryption and decryption devices and information processing method and system
US20140341375A1 (en) * 2013-05-16 2014-11-20 Megachips Corporation Random number generating device, cipher processing device, storage device, and information processing system
CN105790925A (en) * 2014-12-24 2016-07-20 北京奇虎科技有限公司 Data encryption method, data decryption method, data encryption device and data decryption device
CN106789004A (en) * 2016-12-15 2017-05-31 国云科技股份有限公司 A kind of network communication method of highly effective and safe

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张建华: "5.1.3 WEB文件加密存储", 《WEB安全与容侵》 *
王世昌: "国外银行卡互联网络的报文安全体系", 《计算机系统与网络技术开发及应用实例》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109547195A (en) * 2018-11-13 2019-03-29 阳光保险集团股份有限公司 A kind of code data processing method and processing device
CN116933285A (en) * 2023-07-19 2023-10-24 贝壳找房(北京)科技有限公司 Upgrading method, equipment, medium and computer program product for data encryption
CN117201021A (en) * 2023-11-08 2023-12-08 中孚信息股份有限公司 Key dynamic switching method, system, device and medium for main service system
CN117201021B (en) * 2023-11-08 2024-02-23 中孚信息股份有限公司 Key dynamic switching method, system, device and medium for main service system

Similar Documents

Publication Publication Date Title
CN110472428B (en) Medical data sharing method and system based on block chain
CN110033258B (en) Service data encryption method and device based on block chain
CN100561916C (en) A kind of method and system that upgrades authenticate key
US9704159B2 (en) Purchase transaction system with encrypted transaction information
CN102402664B (en) Data access control device and data access control method
CN110120869A (en) Key management system and cipher key service node
US20100325732A1 (en) Managing Keys for Encrypted Shared Documents
CN108667605B (en) Data encryption and decryption method and device
US20130073854A1 (en) Data storage incorporating crytpographically enhanced data protection
CN102236766A (en) Security data item level database encryption system
US20200175179A1 (en) System for triple format preserving encryption
CN102571329A (en) Password key management
CN107168998A (en) A kind of database transparent encryption method based on reservation form
CN108154038A (en) Data processing method and device
CN111008855B (en) Retrospective data access control method based on improved proxy re-encryption
CN108055127A (en) It calculates and supports heat update Encryption Algorithm and key data encryption method with data separating
CN112287392B (en) Intelligent contract implementation method and system with privacy information protection function
US20160330022A1 (en) Cryptographic system, key generation apparatus, re-encryption apparatus and user terminal
CN106022159B (en) ERP data processing methods based on cloud computing
US10733317B2 (en) Searchable encryption processing system
CN116340331A (en) Large instrument experimental result evidence-storing method and system based on blockchain
US20210166222A1 (en) Arrangement of blockchains with a restricted transaction
CN113127927B (en) Attribute reconstruction encryption method and system for license chain data sharing and supervision
CN109784920B (en) Transaction information auditing method and device based on blockchain
CN114372242A (en) Ciphertext data processing method, authority management server and decryption server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180518