CN112994887A - Communication encryption method and system suitable for power Internet of things terminal - Google Patents
Communication encryption method and system suitable for power Internet of things terminal Download PDFInfo
- Publication number
- CN112994887A CN112994887A CN201911292005.5A CN201911292005A CN112994887A CN 112994887 A CN112994887 A CN 112994887A CN 201911292005 A CN201911292005 A CN 201911292005A CN 112994887 A CN112994887 A CN 112994887A
- Authority
- CN
- China
- Prior art keywords
- sequence
- key
- terminal
- chaotic
- chaotic system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Abstract
The invention discloses a communication encryption method and a communication encryption system applicable to a power Internet of things terminal in the technical field of power Internet of things communication, wherein the power terminal executes the following steps: constructing a conditional symmetric chaotic system, and discretizing by adopting an Euler algorithm; inputting an initial key as an initial value of the chaotic system, calculating a chaotic sequence through the initial key, and arranging and combining the chaotic sequence into a key sequence; intercepting and binarizing the key sequence to obtain a binarized key sequence; carrying out XOR on the binarization key sequence and a plaintext data sequence acquired by the terminal to obtain a ciphertext; sending the ciphertext to the intelligent terminal; and the intelligent terminal acquires the binary key sequence by adopting the same method, and performs exclusive OR on the binary key sequence and the ciphertext to obtain the decrypted original data. The method has higher reliability and reduces the resource consumption of the terminal equipment in the encryption algorithm.
Description
Technical Field
The invention belongs to the technical field of power internet of things communication, and particularly relates to a communication encryption method and system suitable for a power internet of things terminal.
Background
In order to solve the problems that the real-time processing performance of the terminal is poor due to insufficient communication bandwidth caused by the increase of terminal equipment, an intelligent terminal is introduced and is used for carrying out data processing such as edge calculation on the terminal equipment. And communication safety problems can be caused when the terminal equipment communicates with the intelligent terminal. The general encryption methods include hardware encryption and software encryption, where the hardware encryption is to add an encryption chip to the device to achieve the encryption effect, which increases the cost of the device. There are many ways of software encryption, and some conventional methods such as DES encryption will perform 16 rounds of round-robin encryption, and there is a certain correlation between the 16 rounds of keys, which reduces the confidentiality of the password. Many people also use chaotic Logistic mapping for Internet of things encryption, the encryption method is simple, the performance requirement on encryption master control is not high, but the Logistic mapping is one-dimensional mapping, the state change of a chaotic key is less, and the chaotic key is easy to predict.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention provides the communication encryption method and the communication encryption system suitable for the power internet of things terminal, the chaotic system with symmetrical conditions is selected, the reliability is higher, and the resource consumption of the terminal equipment in an encryption algorithm is reduced.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows: a communication encryption method suitable for a power Internet of things terminal, wherein the power terminal uploads encrypted information to an intelligent terminal, and the method is executed by the power terminal and comprises the following steps:
constructing a conditional symmetric chaotic system, and discretizing by adopting an Euler algorithm;
inputting an initial key as an initial value of the chaotic system, calculating a chaotic sequence through the initial key, and arranging and combining the chaotic sequence into a key sequence;
intercepting and binarizing the key sequence to obtain a binarized key series;
carrying out XOR on the binarization key sequence and a plaintext data sequence acquired by the terminal to obtain a ciphertext;
and sending the ciphertext to the intelligent terminal.
A communication encryption method suitable for an electric power Internet of things terminal is characterized in that the electric power terminal uploads encryption information to an intelligent terminal, and the method is executed by the intelligent terminal and comprises the following steps:
constructing a conditional symmetric chaotic system, and discretizing by adopting an Euler algorithm;
inputting an initial key as an initial value of the chaotic system, calculating a chaotic sequence through the initial key, and arranging and combining the chaotic sequence into a key sequence;
intercepting and binarizing the key sequence to obtain a binarized key series;
and carrying out exclusive OR on the binary key sequence and the ciphertext to obtain decrypted original data.
The equation of the chaotic system is as follows:
wherein x represents a transverse axis variable of the three-dimensional chaotic system, y represents a longitudinal axis variable of the three-dimensional chaotic system, z represents a height axis variable of the three-dimensional chaotic system,meaning that the derivative is taken on the variable x,meaning that the derivative is taken on the variable y,represents the derivation of the variable z;
the equation after the Euler algorithm is adopted for dispersion is as follows:
wherein, T is a positive integer and represents the state position of the sequence, x (T) represents the discrete variable of the transverse axis of the three-dimensional chaotic system, and x (T +1) is the next state of x (T); y (T) represents a discrete variable of a vertical axis of the three-dimensional chaotic system, and y (T +1) is the next state of y (T); z (T) represents a discrete variable of the height axis of the three-dimensional chaotic system, and z (T +1) is the next state of z (T).
The chaotic system is characterized in that: when the chaotic system is given different initial values at different moments, the chaotic system can generate attractors with symmetrical conditions, wherein the symmetry comprises but is not limited to axial symmetry, rotational symmetry and point symmetry.
The key sequence is as follows:
where S (3T-2), S (3T-1), S (3T) denote consecutive key sequences, and S (3T) equals z (T), S (3T-1) equals y (T), S (3T-3) equals x (T), the key sequences are composed of discrete chaotic sequence permutations of x (T), y (T), z (T), as S (1) ═ x (1), S (2) ═ y (1), S (3) ═ z (1), S (4) ═ x (2), S (5) ═ y (2), S (6) ═ z (2) … …, and so on in sequence.
The interception and binarization processing mode is as follows: the truncated and binarized key sequence bs (t) is in the form of an integer 4 bits after the decimal point of the key sequence s (t).
One intelligent terminal can access a plurality of power terminals.
A communication encryption system suitable for a power Internet of things terminal comprises: a memory for storing instructions and a processor for operating in accordance with the instructions to perform the steps of the aforementioned method.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the aforementioned method.
Compared with the prior art, the invention has the following beneficial effects:
(1) the chaotic system with symmetrical conditions is adopted, so that the chaotic system has higher reliability, reduces the resource consumption of terminal equipment on an encryption algorithm, and is suitable for equipment with poorer computing capabilities such as an ammeter, a concentrator, a TTU (time to live) and the like;
(2) the invention only needs to calculate the key once during decryption, and for terminal devices of the same type, the keys are the same, thereby greatly shortening the decryption time of multiple devices.
Drawings
Fig. 1 is a phase rail diagram of an X-Y plane of a conditional symmetric chaotic system constructed by a communication encryption method suitable for a terminal of an internet of things of electric power according to an embodiment of the invention;
fig. 2 is a phase rail diagram of an X-Z plane of a conditional symmetric chaotic system constructed by a communication encryption method suitable for a terminal of the power internet of things according to an embodiment of the invention;
fig. 3 is a schematic process diagram of encryption of a power terminal and decryption of an intelligent terminal according to a communication encryption method for a power internet of things terminal provided by an embodiment of the invention;
fig. 4 is a flowchart of encryption by a communication encryption method suitable for a power internet of things terminal according to an embodiment of the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
Constructing a conditional symmetric chaotic system, discretizing the system by adopting an Euler algorithm, and generating a key sequence of data communication in power system terminal equipment; the conditional symmetric chaotic system equation is as follows:
wherein x represents a transverse axis variable of the three-dimensional chaotic system, y represents a longitudinal axis variable of the three-dimensional chaotic system, z represents a height axis variable of the three-dimensional chaotic system,meaning that the derivative is taken on the variable x,meaning that the derivative is taken on the variable y,represents the derivation of the variable z;
the equation after the Euler algorithm is adopted for dispersion is as follows:
wherein, T is a positive integer and represents the state position of the sequence, x (T) represents the discrete variable of the transverse axis of the three-dimensional chaotic system, and x (T +1) is the next state of x (T); y (T) represents a discrete variable of a vertical axis of the three-dimensional chaotic system, and y (T +1) is the next state of y (T); z (T) represents a discrete variable of a height axis of the three-dimensional chaotic system, z (T +1) is the next state of z (T), and the selected discretization interval is 0.001. When the chaotic system is given different initial values at different moments, the chaotic system can generate attractors with symmetrical conditions, wherein the symmetry comprises but is not limited to axial symmetry, rotational symmetry and point symmetry. In programs of the power terminal and the intelligent terminal, the discretized chaotic system equation is directly used.
As shown in fig. 1 and 2, when the initial value of the chaotic system is selected to be (3, 1, 0.5), the chaotic attractor is represented in a state of a solid line in the figure; when the initial value of the selected chaotic system is (-3, 1, 0.5), the chaotic attractor is in a state of a dotted line in the graph; the two chaotic attractors have different state expression forms under the condition of different initial values, and the two chaotic attractors are in central rotational symmetry around a certain point in coordinates.
Inputting an initial key as an initial value of the chaotic system, calculating a chaotic sequence through the initial key, and arranging and combining the chaotic sequence into a key sequence, wherein the key sequence is as follows:
where S (3T-2), S (3T-1), S (3T) denote consecutive key sequences, and S (3T) equals z (T), S (3T-1) equals y (T), S (3T-3) equals x (T), the key sequences are composed of discrete chaotic sequence permutations of x (T), y (T), z (T), as S (1) ═ x (1), S (2) ═ y (1), S (3) ═ z (1), S (4) ═ x (2), S (5) ═ y (2), S (6) ═ z (2) … …, and so on in sequence.
Intercepting and binarizing the key sequence, and then performing exclusive OR on the binarized key sequence and a plaintext data sequence acquired by the terminal to obtain a ciphertext; the interception and binarization processing mode is as follows: the key sequence s (t) is formed by arranging and combining chaotic sequences, so that s (t) is a floating point number type, and considering that the processing precision of most controllers (such as MCU and ARM) for single-precision floating point numbers is 7 bits after the decimal point, the intercepted and binarized key number sequence bs (t) is in an integer form taking 4 bits after the decimal point s (t). Such as: taking S (1) ═ 3.1415926, the first 4 bits of the fractional part of S (1) are taken to be 0.1415, then 0.1415 is multiplied by 10000 to become 1415, and BS (1) is 1415. The plaintext data sequence is generally data collected from the power terminal by a sensor, and is therefore generally binarized data. And carrying out exclusive OR on the data acquired in the terminal equipment and the key sequence BS (T) after binarization to obtain a ciphertext. The intelligent terminal is a data processing device, is a pivot positioned between a field communication network and a wide area communication network in the top-level design of the ubiquitous power Internet of things, is used for connecting a service terminal and a platform layer, and mainly realizes 'unified access, edge intelligence, multidimensional perception, unified modeling, safety protection and resource arrangement'. The intelligent terminal has multiple functions, wherein edge calculation and data transmission and storage are mainly realized, and generally one intelligent terminal is connected with a plurality of power terminals in a downward mode.
And sending the ciphertext to an intelligent terminal of upper data processing equipment of the terminal, calculating a key sequence by adopting the method after the intelligent terminal receives the ciphertext, and then carrying out XOR on the binary key sequence and the ciphertext sequence to obtain the decrypted original data.
As shown in fig. 3, is a block diagram of the encryption and decryption process of the present invention. The encryption of data is mainly completed by the power terminal, the decryption is completed by the intelligent terminal, and the encrypted ciphertext is sent to the intelligent terminal through a channel. Encryption is completed by carrying out exclusive or on a plaintext and an intercepted binary key sequence; decryption is the reverse process of encryption, the method is the same as the encryption mode, and original data are obtained after decryption.
As shown in fig. 4, it is a program flow chart of the encryption process of the present invention, and the steps are as follows:
1) inputting an initial key as an initial value of the chaotic system, and bringing the initial key into a discretized conditional symmetric chaotic equation;
2) calculating the chaos sequence (x (T), y (T), z (T)) by iteration through the initial key;
3) arranging and combining the chaotic sequences, and converting the chaotic sequences into a key sequence according to a formula (3);
4) intercepting and binarizing the key sequence S (T) to form a binarized key sequence BS (T); the treatment method comprises the following steps: the key sequence S (T) is formed by arranging and combining chaotic sequences, so that S (T) is a floating point number type, and considering that the processing precision of most controllers (such as MCU and ARM) for single-precision floating point numbers is 7 bits after a decimal point, the intercepted and binarized key sequence BS (T) is in an integer form of taking 4 bits after the decimal point of S (T); such as: taking 3.1415926 as S (1), taking 0.1415 as the first 4 bits of the fractional part of S (1), and then multiplying 0.1415 by 10000 to obtain 1415, wherein BS (1) is 1415;
5) and judging whether the data acquisition of the power terminal is finished, and if not, performing XOR on the binary key sequence and the plaintext data sequence acquired by the terminal to obtain a ciphertext. If the data acquisition is finished, the encryption is finished;
6) and if the program is not ended in the step 5), sending the ciphertext to the intelligent terminal. The calculation and encryption of the key sequence is started again.
Based on the method, the invention also provides a communication encryption system suitable for the power internet of things terminal, which comprises the following steps: a memory for storing instructions and a processor for operating in accordance with the instructions to perform the steps of the aforementioned method.
Based on the above method, the present invention also provides a computer readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the aforementioned method.
The method is suitable for some equipment with general computing capability in the power Internet of things terminal, such as an ammeter, a concentrator, a TTU (distribution transformer monitoring terminal) and the like; compared with the traditional method or other chaotic encryption methods, the encryption method has higher reliability, and can occupy less CPU resources compared with the traditional chaotic encryption method. In the encryption method, the selected chaotic system is a three-dimensional system, and each iteration of the discrete chaotic system is performed, 3 secret keys are generated, so that 3 groups of plaintext data can be encrypted; and the chaotic system equation only has a multiplication term y in the first term2Different from a general chaotic system, the chaotic system has more than 2 multiplication terms, which simplifies the resource consumption of a CPU on an encryption algorithm. The invention can decrypt a plurality of terminal devices of the same type which work simultaneously and are hung under the intelligent terminal at the same time. The key is calculated only once during decryption, and for terminal devices of the same type, the keys are the same, so that the decryption time of multiple devices is greatly shortened.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.
Claims (9)
1. A communication encryption method suitable for an electric power Internet of things terminal is characterized in that the electric power terminal uploads encryption information to an intelligent terminal, and the method is executed by the electric power terminal and comprises the following steps:
constructing a conditional symmetric chaotic system, and discretizing by adopting an Euler algorithm;
inputting an initial key as an initial value of the chaotic system, calculating a chaotic sequence through the initial key, and arranging and combining the chaotic sequence into a key sequence;
intercepting and binarizing the key sequence to obtain a binarized key series;
carrying out XOR on the binarization key sequence and a plaintext data sequence acquired by the terminal to obtain a ciphertext;
and sending the ciphertext to the intelligent terminal.
2. A communication encryption method suitable for an electric power Internet of things terminal is characterized in that the electric power terminal uploads encryption information to an intelligent terminal, and the method is executed by the intelligent terminal and comprises the following steps:
constructing a conditional symmetric chaotic system, and discretizing by adopting an Euler algorithm;
inputting an initial key as an initial value of the chaotic system, calculating a chaotic sequence through the initial key, and arranging and combining the chaotic sequence into a key sequence;
intercepting and binarizing the key sequence to obtain a binarized key series;
and carrying out exclusive OR on the binary key sequence and the ciphertext to obtain decrypted original data.
3. The communication encryption method suitable for the power internet of things terminal as claimed in claim 1 or 2, wherein the equation of the chaotic system is as follows:
wherein x represents a transverse axis variable of the three-dimensional chaotic system, y represents a longitudinal axis variable of the three-dimensional chaotic system, z represents a height axis variable of the three-dimensional chaotic system,meaning that the derivative is taken on the variable x,meaning that the derivative is taken on the variable y,represents the derivation of the variable z;
the equation after the Euler algorithm is adopted for dispersion is as follows:
wherein, T is a positive integer and represents the state position of the sequence, x (T) represents the discrete variable of the transverse axis of the three-dimensional chaotic system, and x (T +1) is the next state of x (T); y (T) represents a discrete variable of a vertical axis of the three-dimensional chaotic system, and y (T +1) is the next state of y (T); z (T) represents a discrete variable of the height axis of the three-dimensional chaotic system, and z (T +1) is the next state of z (T).
4. The communication encryption method suitable for the power internet of things terminal as claimed in claim 1 or 2, wherein the chaotic system is characterized in that: when the chaotic system is given different initial values at different moments, the chaotic system can generate attractors with symmetrical conditions, wherein the symmetry comprises but is not limited to axial symmetry, rotational symmetry and point symmetry.
5. The communication encryption method suitable for the power internet of things terminal as claimed in claim 1 or 2, wherein the key sequence is as follows:
where S (3T-2), S (3T-1), S (3T) denote consecutive key sequences, and S (3T) equals z (T), S (3T-1) equals y (T), S (3T-3) equals x (T), the key sequences are composed of discrete chaotic sequence permutations of x (T), y (T), z (T), as S (1) ═ x (1), S (2) ═ y (1), S (3) ═ z (1), S (4) ═ x (2), S (5) ═ y (2), S (6) ═ z (2) … …, and so on in sequence.
6. The communication encryption method suitable for the power internet of things terminal as claimed in claim 1 or 2, wherein the intercepting and binarization processing mode is as follows: the truncated and binarized key sequence bs (t) is in the form of an integer 4 bits after the decimal point of the key sequence s (t).
7. The communication encryption method suitable for the terminals of the internet of things of electric power according to claim 1 or 2, wherein one intelligent terminal can be connected to a plurality of electric power terminals.
8. The utility model provides a communication encryption system suitable for electric power thing networking terminal, characterized by includes: a memory for storing instructions and a processor for operating in accordance with the instructions to perform the steps of the method of claim 1 or 2.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method as claimed in claim 1 or 2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911292005.5A CN112994887B (en) | 2019-12-16 | 2019-12-16 | Communication encryption method and system suitable for power Internet of things terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911292005.5A CN112994887B (en) | 2019-12-16 | 2019-12-16 | Communication encryption method and system suitable for power Internet of things terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112994887A true CN112994887A (en) | 2021-06-18 |
CN112994887B CN112994887B (en) | 2023-01-31 |
Family
ID=76343124
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911292005.5A Active CN112994887B (en) | 2019-12-16 | 2019-12-16 | Communication encryption method and system suitable for power Internet of things terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112994887B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113795023A (en) * | 2021-09-26 | 2021-12-14 | 深圳市芯中芯科技有限公司 | Bluetooth data transmission encryption method based on chaotic sequence and block encryption |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001285279A (en) * | 2000-03-29 | 2001-10-12 | Murata Mach Ltd | Encryption communication method and encryption communication system |
JP2002252610A (en) * | 2001-02-22 | 2002-09-06 | C4 Technology Inc | Encryption device and decryption device, and public key encryption system and public key decryption system |
CN103236921A (en) * | 2013-04-11 | 2013-08-07 | 成都秦川科技发展有限公司 | Information security management module of intelligent ammeter of internet of things |
CN106375079A (en) * | 2016-09-22 | 2017-02-01 | 华侨大学 | Chaotic encryption method for voice information |
WO2018153317A1 (en) * | 2017-02-24 | 2018-08-30 | 陈伟 | Chaotic map-based digital chaotic encryption method |
-
2019
- 2019-12-16 CN CN201911292005.5A patent/CN112994887B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001285279A (en) * | 2000-03-29 | 2001-10-12 | Murata Mach Ltd | Encryption communication method and encryption communication system |
JP2002252610A (en) * | 2001-02-22 | 2002-09-06 | C4 Technology Inc | Encryption device and decryption device, and public key encryption system and public key decryption system |
CN103236921A (en) * | 2013-04-11 | 2013-08-07 | 成都秦川科技发展有限公司 | Information security management module of intelligent ammeter of internet of things |
CN106375079A (en) * | 2016-09-22 | 2017-02-01 | 华侨大学 | Chaotic encryption method for voice information |
WO2018153317A1 (en) * | 2017-02-24 | 2018-08-30 | 陈伟 | Chaotic map-based digital chaotic encryption method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113795023A (en) * | 2021-09-26 | 2021-12-14 | 深圳市芯中芯科技有限公司 | Bluetooth data transmission encryption method based on chaotic sequence and block encryption |
CN113795023B (en) * | 2021-09-26 | 2024-03-19 | 深圳市芯中芯科技有限公司 | Bluetooth data transmission encryption method based on chaotic sequence and packet encryption |
Also Published As
Publication number | Publication date |
---|---|
CN112994887B (en) | 2023-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107819569B (en) | The encryption method and terminal device of log-on message | |
CN107145791B (en) | K-means clustering method and system with privacy protection function | |
CN104486316B (en) | A kind of quantum key graduation offer method for improving electric power data transmission security | |
CN109474583B (en) | Data security management system | |
CN112035695B (en) | Spatial data encryption method suitable for mobile terminal | |
CN110650116B (en) | Multi-type multi-dimensional data aggregation method for security smart power grid | |
CN104967693A (en) | Document similarity calculation method facing cloud storage based on fully homomorphic password technology | |
CN114218322B (en) | Data display method, device, equipment and medium based on ciphertext transmission | |
CN110620660A (en) | Key distribution method for data communication based on block chain | |
CN114125831B (en) | 5G smart grid user side data acquisition method and system based on proxy re-encryption | |
CN112994887B (en) | Communication encryption method and system suitable for power Internet of things terminal | |
Zhan et al. | Efficient function queryable and privacy preserving data aggregation scheme in smart grid | |
CN115664629A (en) | Homomorphic encryption-based data privacy protection method for intelligent Internet of things platform | |
EP3570488A1 (en) | Online/offline signature system and method based on multivariate cryptography | |
CN110266484B (en) | Data encryption method, device, equipment and medium | |
CN109697613B (en) | Security authentication method and system for network transaction in block chain | |
CN117056961A (en) | Privacy information retrieval method and computer readable storage medium | |
CN114372595B (en) | Automatic inspection system and method for power grid dispatching control running state | |
Almuseelem | Energy-Efficient and Security-Aware Task Offloading for Multi-Tier Edge-Cloud Computing Systems | |
CN113938270A (en) | Data encryption method and device capable of flexibly reducing complexity | |
CN114362997A (en) | Data transmission method and device for intelligent equipment of transformer substation, intelligent equipment and medium | |
CN112507366A (en) | Method and system for efficient data aggregation of multidimensional data in smart power grid | |
Deng et al. | A security multi-dimensional range query protocol based on left 0-1 encoding in two-tiered wireless sensor networks | |
CN108235798A (en) | A kind of public private key pair acquisition methods, system and POS terminal | |
Wang et al. | An SM9-based secondary authentication framework for 5G technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |