CN114282248A - Offline data tamper-proof system based on hash chain - Google Patents

Offline data tamper-proof system based on hash chain Download PDF

Info

Publication number
CN114282248A
CN114282248A CN202111622953.8A CN202111622953A CN114282248A CN 114282248 A CN114282248 A CN 114282248A CN 202111622953 A CN202111622953 A CN 202111622953A CN 114282248 A CN114282248 A CN 114282248A
Authority
CN
China
Prior art keywords
offline
user
hash
hash chain
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111622953.8A
Other languages
Chinese (zh)
Other versions
CN114282248B (en
Inventor
王成欢
孙鑫
陈晓东
秦天浩
黄家辉
马小乐
黄腾
范志超
周志昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aerospace Science And Engineering Intelligent Operation Research And Information Security Research Institute Wuhan Co ltd
Original Assignee
Aerospace Science And Engineering Intelligent Operation Research And Information Security Research Institute Wuhan Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aerospace Science And Engineering Intelligent Operation Research And Information Security Research Institute Wuhan Co ltd filed Critical Aerospace Science And Engineering Intelligent Operation Research And Information Security Research Institute Wuhan Co ltd
Priority to CN202111622953.8A priority Critical patent/CN114282248B/en
Publication of CN114282248A publication Critical patent/CN114282248A/en
Application granted granted Critical
Publication of CN114282248B publication Critical patent/CN114282248B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to an offline data tamper-proofing system based on a hash chain, and belongs to the technical field of offline data tamper-proofing detection for offline users. The invention realizes the recording and tracing of the off-line data by using the hash chain technology, provides a reliable and safe technical scheme for the anti-tampering of the off-line data, develops a new application scene for the hash chain technology, and has important practical application value.

Description

Offline data tamper-proof system based on hash chain
Technical Field
The invention belongs to the technical field of offline data tampering detection of offline users, and particularly relates to an offline data tampering prevention system based on a hash chain.
Background
The data sharing service is a bridge and a medium for realizing the scientific data value, and a good sharing service form is a necessary condition for fully exerting the scientific data value. Offline data is an important ring in data sharing service, and as open science continues to develop, offline data security sharing becomes more important. However, offline data is unique as a digital asset: in the off-line mode, the user is separated from the on-line supervision of the data sharing platform, the use condition of the user is not supervised, and a data holder can use the data for illegal use under the condition of violating the supervision, so that the ecological development of the data sharing service is severely restricted. Therefore, the data sharing service platform can regularly require the offline user to submit the offline data in order to realize the supervision on the offline data. Under the premise assumption, the anti-tampering of the offline data becomes one of the key links of the data sharing service system.
The offline data security has important significance for promoting data sharing, and the anti-tampering mechanism can provide powerful security guarantee for interaction and sharing of the offline data. Data is tamperproof in various ways, including a file curing technology, a hash value verification technology, a digital signature technology, a trusted timestamp technology, a block chain technology, and the like. The existing tamper-proof technology is mainly applied to the fields of webpage tamper-proof, block chain application, file integrity verification and the like. The invention uses the hash chain combined digital signature technology to realize off-line data tamper resistance and meet the off-line data dynamic updating requirement on the basis of the hash value verification technology. Aiming at the problem of offline data tamper resistance, the invention uses a hash value verification technology to verify the integrity and correctness of the offline data. In addition, in order to meet the requirement of dynamically updating the offline data and realize the real-time recording of the offline data, the invention records the offline data by using the hash chain. Finally, to prevent offline users from pruning the offline hash chain node hash digests, the present invention encrypts the offline hash chain nodes using digital signature techniques.
The idea of hash chain (hash chain) was originally proposed by american mathematician Lamport for application to various network security environments, such as authentication systems, cryptocurrency, and various blockchain driven systems. The hash chain is implemented by performing multiple hash operations on the data assets, and combining the results of each hash operation into a sequence (W0 → W1 → W2 → … … → Wn-1 → Wn), which is called a hash chain. The security of the hash chain relies on the one-way nature of the one-way hash function, i.e., Wn can be derived from Wn-1, but Wn-1 cannot. Therefore, the hash chain is suitable for the hash operation when the data is dynamically increased.
Disclosure of Invention
Technical problem to be solved
The technical problem to be solved by the invention is as follows: and a reliable and safe technical scheme is provided for offline data tamper resistance.
(II) technical scheme
In order to solve the technical problem, the invention provides an offline data tamper-proofing system based on a hash chain, which comprises a user terminal and a cloud service platform, wherein the user terminal is simply called as a user;
the method comprises the steps that a user sends a request to a cloud service platform, the request comprises a user identity unique identifier, the cloud service platform verifies user identity information after receiving the request, a unique hash value W0 and an SM2 key pair bound with the user are generated according to the request after the user identity information is verified, an SM2 private key is safely stored, a hash value W0 is backed up, and an encryption program comprising an SM2 public key and a hash value W0 is issued to the user;
the user generates data D1 offline, the encryption program performs hash operation on the hash value W0 and the offline data D1 to obtain a hash value W1, and the encryption program encrypts the hash value W0 by using a SM4 and SM2 mixed encryption algorithm after the hash operation is completed; each user subsequently generates one piece of data Di offline, that is, according to step S2, a hash value Wi is generated and Wi-1 is encrypted, and finally, when data with a length of n is generated, an offline hash chain with a length of n +1 is obtained, where nodes Wi, i of the offline hash chain are 2,1, 2.
The method comprises the steps that a user submits offline data and an offline hash chain online, a cloud service platform reads a local backup hash value W0 after receiving the offline data and the offline hash chain, and multiple hash operations are carried out on the backup hash value W0 and the offline data submitted by the user to obtain the hash chain;
the cloud service platform performs hash verification on the hash chain obtained by calculation and the offline hash chain submitted by the user, and if the hash chain does not pass the verification, the offline data is judged to be modified by the offline user;
the cloud service platform detects whether the tail node of the offline hash chain submitted by the user is not encrypted with the hash value, and if the cloud service platform detects that the offline hash chain is not provided with the tail node which is not encrypted, the offline user is judged to delete the hash chain;
the cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by the user, if the encryption times of any node is detected to be larger than 1, the offline user is judged to delete the offline data and the offline hash chain node, and the offline data and the offline hash chain node are regenerated.
The specific flow of the encryption program issued by the cloud service platform for carrying out SM4 and SM2 hybrid algorithm encryption on the offline hash chain nodes is as follows:
(1) the off-line user A randomly generates an SM4 algorithm encryption and decryption key; the user A acquires an SM2 public key public Key PublicKeyB issued by the cloud service platform B from the encryption program; the user A uses the SM4 Key to carry out SM4 encryption on the plaintext Data to obtain a ciphertext block CipherData; a user A encrypts a Key Key by using a public Key public KeyB of a cloud service platform B through an SM2 algorithm to obtain a Key block CipherKey; the user A adds the ciphertext block CipherData and the key block CipherKey to form encrypted data Cipher;
(2) the cloud service platform B divides the data Cipher into a ciphertext block CipherData and a key block CipherKey; the cloud server B uses an SM2 private Key PravateKeyB to decrypt the CipherKey in an SM2 mode to obtain an SM4 Key; and the cloud server B uses the SM4 Key to carry out SM4 decryption on the ciphertext block CipherData to obtain plaintext Data.
Preferably, the user identity unique identifier comprises user certificate and personal information.
And the cloud service platform performs Hash verification on the Hash chain obtained by calculation and the offline Hash chain submitted by the user, and if the Hash chain does not pass the Hash verification, the offline data is judged to be modified by the offline user according to the collision resistance of the Hash function.
The cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by the user, detects that the encryption times of any node is larger than 1, and executes preset countermeasures on the user after judging that the offline user deletes the hash chain.
The cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by the user, detects that the encryption times of any node is larger than 1, and executes an authority control measure on the user after judging that the offline user deletes the hash chain.
The cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by the user, detects that the encryption times of any node is larger than 1, judges that the offline user deletes the offline data and the offline hash chain node, and executes preset countermeasures on the user after the offline data and the offline hash chain node are regenerated.
The cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by the user, detects that the encryption times of any node is larger than 1, judges that the offline user deletes the offline data and the offline hash chain node, and executes authority control measures on the user after the offline data and the offline hash chain node are regenerated.
The invention also provides application of the system in the technical field of detecting offline user tampering offline data behaviors.
The invention also provides an application of the system in the data sharing service.
(III) advantageous effects
In order to realize the anti-tampering of the off-line data, the off-line data is encrypted by adopting a hash chain technology and a hybrid encryption mechanism, the hash function is used for carrying out hash operation on the off-line data, the off-line data is prevented from being modified by a user depending on the unidirectionality of the hash function, and then the off-line hash value is encrypted by utilizing the hybrid encryption mechanism, so that the off-line hash chain is prevented from being deleted by the user. And finally, recovering the offline data and performing hash verification and encryption times verification. The scheme has the following advantages and beneficial effects:
1. the off-line data is prevented from being tampered by adopting a hash chain technology, real-time hash operation can be carried out under the condition that data is dynamically generated under the line, and the off-line data is recorded;
2. the invention adopts a hybrid encryption mechanism based on SM4 and SM2 algorithms, and can obtain a higher-efficiency and safer encryption technology by utilizing the advantages of high encryption speed of the SM4 algorithm, high encryption safety of the SM2 algorithm, simple key management and low bandwidth requirement.
The invention realizes the recording and tracing of the off-line data by using the hash chain technology, provides a reliable and safe technical scheme for the anti-tampering of the off-line data, develops a new application scene for the hash chain technology, and has important practical application value.
Drawings
FIG. 1 is an off-line data tamper-resistant functional block diagram of the present invention;
FIG. 2 is a diagram of the SM4 and SM2 algorithm hybrid encryption models of the present invention;
FIG. 3 is a diagram of a hash chain encryption model of the present invention;
FIG. 4 is a diagram of a hash chain check model of the present invention.
Detailed Description
In order to make the objects, contents, and advantages of the present invention clearer, the following detailed description of the embodiments of the present invention will be made in conjunction with the accompanying drawings and examples.
Aiming at the problem of offline data tamper resistance, the invention provides a safe and reliable offline data tamper resistance system based on a hash chain technology and a hybrid encryption mechanism. The off-line data tamper-proofing is realized by adopting a hash chain technology, and then a mixed encryption mechanism is used for preventing off-line users from deleting off-line hash chains. Some basic concepts related to the present invention are:
1. hash chain: a hash chain is generally defined as the repeated application of a cryptographic hash function to a given data asset, and is implemented by performing multiple hash operations on the data asset, and grouping the results of each hash operation into a sequence (W0 → W1 → W2 → … … → Wn-1 → Wn), which is referred to as a hash chain.
The SM4 algorithm: the SM4 algorithm is known as the SM4 group cipher algorithm and is a cipher industry standard published in bulletin No. 23 issued by the national cipher authority in 3 months of 2012. The SM4 algorithm is a block symmetric key algorithm, plaintext, key and ciphertext are all 16 bytes, and encryption and decryption keys are the same. Both the encryption algorithm and the key expansion algorithm adopt 32-round nonlinear iteration structures. The decryption process is similar in structure to the encryption process except that the round keys are used in the reverse order.
The SM2 algorithm: the SM2 algorithm is called SM2 elliptic curve public key cryptographic algorithm, and is a cryptographic industry standard published in No. 21 bulletin issued by the State crypto administration in 12 months in 2010. The SM2 algorithm belongs to an asymmetric key algorithm, and uses a public key for encryption and a private key for decryption, and it is known that public key solving for the private key is computationally infeasible. The encipherer uses the public key of the decryptor to encrypt the message into a ciphertext, and the decryptor uses the own private key to decrypt the received ciphertext to restore the original message.
4. A hybrid encryption mechanism: before data is communicated on the network, a sender randomly generates a random key of an SM4 algorithm, encrypts plaintext data to be transmitted by using an SM4 algorithm and then encrypts the key by using an SM2 algorithm. Thus, after receiving the ciphertext data and the encrypted key data, the receiving party decrypts the random key by using the SM2 algorithm, and then decrypts the ciphertext by using the random key SM 4. The random key of each plaintext data encryption is different, the SM4 key management problem does not exist, and the encryption and decryption scheme not only ensures the data security, but also improves the encryption and decryption speed.
Aiming at the problem of offline data security protection, offline user tampering, offline data deletion and other behaviors exist, the offline data tampering preventing system based on the hash chain technology and the hybrid encryption mechanism is used, offline data can be traced under the condition that offline data are dynamically updated, the offline data are prevented from being tampered, hash chain nodes are encrypted by using a hybrid encryption algorithm, and whether the offline data are deleted by an offline user or not is detected.
Referring to fig. 1 to 3, the system of the present invention includes a user terminal and a cloud service platform, where the user terminal is referred to as a user for short, and the user terminal and the cloud service platform implement system functions through the following interaction processes:
the method comprises the steps that a user sends a request to a cloud service platform, the request comprises user identity unique identification such as a user certificate and personal information, the cloud service platform verifies the user identity information after receiving the request, and generates a unique hash value W0 and SM2 key pair bound with the user according to the request after the user identity information is verified, an SM2 private key is safely stored, the hash value W0 is backed up, and then an encryption program comprising an SM2 public key and a hash value W0 is issued to the user;
the user generates data D1 offline, the encryption program performs hash operation on the hash value W0 and the offline data D1 to obtain a hash value W1, and the encryption program encrypts the hash value W0 by using a SM4 and SM2 mixed encryption algorithm after the hash operation is completed, as shown in FIG. 2;
the method comprises the following steps that a user generates a hash value Wi and encrypts Wi-1 after each piece of data Di is generated in a subsequent off-line mode, and finally an off-line hash chain with the length of n +1 is obtained when data with the length of n are generated, wherein nodes Wi, i of the off-line hash chain are 2,1, n +1 are encrypted, and a tail node Wn is not encrypted;
the method comprises the steps that a user submits offline data and an offline hash chain online, a cloud service platform reads a local backup hash value W0 after receiving the offline data and the offline hash chain, and multiple hash operations are carried out on the backup hash value W0 and the offline data submitted by the user to obtain the hash chain;
the cloud service platform carries out Hash verification on the Hash chain obtained by calculation and the offline Hash chain submitted by the user, and if the Hash chain does not pass the Hash verification, the offline data is judged to be modified by the offline user according to the strong collision resistance of the Hash function;
the cloud service platform detects whether the tail node of the offline hash chain submitted by the user is not encrypted with the hash value, if the cloud service platform detects that the offline hash chain does not have the unencrypted tail node, the offline user is judged to delete the hash chain, and authority control or other corresponding measures are executed on the user;
the cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by the user, if the encryption times of any node is detected to be larger than 1, the offline user is judged to delete the offline data and the offline hash chain node (offline hash node), the offline data and the offline hash chain node are regenerated, and authority control or other corresponding measures are executed on the user.
In this embodiment, a specific flow of performing the SM4 and SM2 hybrid algorithm to encrypt the offline hash chain node (corresponding hash value) is as follows:
(1) the off-line user A randomly generates an SM4 algorithm encryption and decryption key; the user A acquires an SM2 public key public Key PublicKeyB issued by the cloud service platform B from the encryption program; the user A uses the SM4 Key to carry out SM4 encryption on the plaintext Data to obtain a ciphertext block CipherData; a user A encrypts a Key Key by using a public Key public KeyB of a cloud service platform B through an SM2 algorithm to obtain a Key block CipherKey; the user A adds the ciphertext block CipherData and the key block CipherKey to form encrypted data Cipher;
(2) the cloud service platform B divides the data Cipher into a ciphertext block CipherData and a key block CipherKey; the cloud server B uses an SM2 private Key PravateKeyB to decrypt the CipherKey in an SM2 mode to obtain an SM4 Key; and the cloud server B uses the SM4 Key to carry out SM4 decryption on the ciphertext block CipherData to obtain plaintext Data.
The system is designed aiming at the problems of tampering prevention and deletion prevention of the offline data, and can be used for detecting whether the offline user has behaviors of tampering and deleting the offline data, so that the offline user is prevented from being maliciously tampered and the offline data required to be collected by the cloud service platform is deleted.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.

Claims (10)

1. An offline data tamper-proofing system based on a hash chain is characterized by comprising a user terminal and a cloud service platform, wherein the user terminal is referred to as a user for short;
the method comprises the steps that a user sends a request to a cloud service platform, the request comprises a user identity unique identifier, the cloud service platform verifies user identity information after receiving the request, a unique hash value W0 and an SM2 key pair bound with the user are generated according to the request after the user identity information is verified, an SM2 private key is safely stored, a hash value W0 is backed up, and an encryption program comprising an SM2 public key and a hash value W0 is issued to the user;
the user generates data D1 offline, the encryption program performs hash operation on the hash value W0 and the offline data D1 to obtain a hash value W1, and the encryption program encrypts the hash value W0 by using a SM4 and SM2 mixed encryption algorithm after the hash operation is completed; the method comprises the following steps that each user generates data Di in a subsequent off-line mode, namely, a hash value Wi is generated and Wi-1 is encrypted in the same mode, and finally, when data with the length of n are generated, an off-line hash chain with the length of n +1 is obtained, wherein nodes Wi, i of the off-line hash chain are 2,1, 2.
The method comprises the steps that a user submits offline data and an offline hash chain online, a cloud service platform reads a local backup hash value W0 after receiving the offline data and the offline hash chain, and multiple hash operations are carried out on the backup hash value W0 and the offline data submitted by the user to obtain the hash chain;
the cloud service platform performs hash verification on the hash chain obtained by calculation and the offline hash chain submitted by the user, and if the hash chain does not pass the verification, the offline data is judged to be modified by the offline user;
the cloud service platform detects whether the tail node of the offline hash chain submitted by the user is not encrypted with the hash value, and if the cloud service platform detects that the offline hash chain is not provided with the tail node which is not encrypted, the offline user is judged to delete the hash chain;
the cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by the user, if the encryption times of any node is detected to be larger than 1, the offline user is judged to delete the offline data and the offline hash chain node, and the offline data and the offline hash chain node are regenerated.
2. The system of claim 1, wherein the specific flow of the encryption program issued by the cloud service platform for performing the SM4 and SM2 hybrid algorithm encryption of the offline hash chain node is as follows:
(1) the off-line user A randomly generates an SM4 algorithm encryption and decryption key; the user A acquires an SM2 public key public Key PublicKeyB issued by the cloud service platform B from the encryption program; the user A uses the SM4 Key to carry out SM4 encryption on the plaintext Data to obtain a ciphertext block CipherData; a user A encrypts a Key Key by using a public Key public KeyB of a cloud service platform B through an SM2 algorithm to obtain a Key block CipherKey; the user A adds the ciphertext block CipherData and the key block CipherKey to form encrypted data Cipher;
(2) the cloud service platform B divides the data Cipher into a ciphertext block CipherData and a key block CipherKey; the cloud server B uses an SM2 private Key PravateKeyB to decrypt the CipherKey in an SM2 mode to obtain an SM4 Key; and the cloud server B uses the SM4 Key to carry out SM4 decryption on the ciphertext block CipherData to obtain plaintext Data.
3. The system of claim 1, wherein the user identity unique identifier comprises a user certificate, personal information.
4. The system of claim 1, wherein the cloud service platform performs Hash check on the computed Hash chain and an offline Hash chain submitted by the user, and if the Hash chain does not pass the Hash check, the offline data is determined to be modified by the offline user according to the collision resistance of the Hash function.
5. The system of claim 1, wherein the cloud service platform detects the number of mixed encryption times of SM4 and SM2 of each node of the offline hash chain submitted by the user, detects that the number of encryption times of any node is more than 1, and executes preset countermeasures for the user after determining that the offline user deletes the hash chain.
6. The system of claim 5, wherein the cloud service platform detects the mixed encryption times of SM4 and SM2 of each node of the offline hash chain submitted by the user, detects that the encryption times of any node is more than 1, and executes the authority control measure on the user after determining that the offline user deletes the hash chain.
7. The system of claim 1, wherein the cloud service platform detects the number of mixed encryption times of SM4 and SM2 of each node of the offline hash chain submitted by the user, detects that the number of encryption times of any node is greater than 1, judges that the offline user deletes the offline data and the offline hash chain node, and executes preset countermeasures on the user after regenerating the offline data and the offline hash chain node.
8. The system of claim 7, wherein the cloud service platform detects the number of mixed encryption times of SM4 and SM2 of each node of the offline hash chain submitted by the user, detects that the number of encryption times of any node is greater than 1, determines that the offline user deletes the offline data and the offline hash chain node, and executes the authority control measure on the user after regenerating the offline data and the offline hash chain node.
9. Use of the system according to any one of claims 1 to 8 in the technical field of detecting the tampering of offline data by an offline user.
10. Use of the system according to any of claims 1 to 8 in a data sharing service.
CN202111622953.8A 2021-12-28 2021-12-28 Offline data tamper-proof system based on hash chain Active CN114282248B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111622953.8A CN114282248B (en) 2021-12-28 2021-12-28 Offline data tamper-proof system based on hash chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111622953.8A CN114282248B (en) 2021-12-28 2021-12-28 Offline data tamper-proof system based on hash chain

Publications (2)

Publication Number Publication Date
CN114282248A true CN114282248A (en) 2022-04-05
CN114282248B CN114282248B (en) 2024-04-05

Family

ID=80876954

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111622953.8A Active CN114282248B (en) 2021-12-28 2021-12-28 Offline data tamper-proof system based on hash chain

Country Status (1)

Country Link
CN (1) CN114282248B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140033824A (en) * 2012-09-10 2014-03-19 남성학 Encryption systems and methods using hash value as symmetric key in the smart device
US20160371509A1 (en) * 2013-07-06 2016-12-22 Newvoicemedia, Ltd. System and methods for tamper proof interaction recording and timestamping
CN109145612A (en) * 2018-07-05 2019-01-04 东华大学 The cloud data sharing method of anti-data tampering, user's collusion is realized based on block chain
KR20190066668A (en) * 2017-12-06 2019-06-14 재단법인대구경북과학기술원 Method and system for providing digital test service based on hash chain
US20200067907A1 (en) * 2018-08-21 2020-02-27 HYPR Corp. Federated identity management with decentralized computing platforms
WO2020142603A1 (en) * 2019-01-03 2020-07-09 American Express Travel Related Services Co., Inc. Hybrid identity as a service for decentralized browser based wallets
CN112039870A (en) * 2020-08-28 2020-12-04 武汉见邦融智科技有限公司 Privacy protection-oriented vehicle-mounted network authentication method and system based on block chain
CN112367169A (en) * 2020-11-11 2021-02-12 平安科技(深圳)有限公司 Data encryption and decryption method, device, equipment and storage medium
US20210192516A1 (en) * 2019-09-19 2021-06-24 Atrium Separate IP Holdings Number 1, LLC Blockchain architecture, system, method and device for automated cybersecurity and data privacy law compliance with a streamlined block structure

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140033824A (en) * 2012-09-10 2014-03-19 남성학 Encryption systems and methods using hash value as symmetric key in the smart device
US20160371509A1 (en) * 2013-07-06 2016-12-22 Newvoicemedia, Ltd. System and methods for tamper proof interaction recording and timestamping
KR20190066668A (en) * 2017-12-06 2019-06-14 재단법인대구경북과학기술원 Method and system for providing digital test service based on hash chain
CN109145612A (en) * 2018-07-05 2019-01-04 东华大学 The cloud data sharing method of anti-data tampering, user's collusion is realized based on block chain
US20200067907A1 (en) * 2018-08-21 2020-02-27 HYPR Corp. Federated identity management with decentralized computing platforms
WO2020142603A1 (en) * 2019-01-03 2020-07-09 American Express Travel Related Services Co., Inc. Hybrid identity as a service for decentralized browser based wallets
US20210192516A1 (en) * 2019-09-19 2021-06-24 Atrium Separate IP Holdings Number 1, LLC Blockchain architecture, system, method and device for automated cybersecurity and data privacy law compliance with a streamlined block structure
CN112039870A (en) * 2020-08-28 2020-12-04 武汉见邦融智科技有限公司 Privacy protection-oriented vehicle-mounted network authentication method and system based on block chain
CN112367169A (en) * 2020-11-11 2021-02-12 平安科技(深圳)有限公司 Data encryption and decryption method, device, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
徐小龙;龚培培;章韵;毕朝国;: "一种基于移动Agent的云端(Cloud-P2P)数据复合销毁机制", 计算机科学, no. 10, 15 October 2015 (2015-10-15) *

Also Published As

Publication number Publication date
CN114282248B (en) 2024-04-05

Similar Documents

Publication Publication Date Title
CN111130757B (en) Multi-cloud CP-ABE access control method based on block chain
CN109478223B (en) Method and system for realizing block chain
CN110069918B (en) Efficient double-factor cross-domain authentication method based on block chain technology
CN112507363A (en) Data supervision method, device and equipment based on block chain and storage medium
KR20040033159A (en) Method for cryptographing wireless data and apparatus thereof
CN111914291A (en) Message processing method, device, equipment and storage medium
CN112732695B (en) Cloud storage data security deduplication method based on block chain
CN113886856A (en) Dual verifiable cloud storage method based on block chain
CN112671735B (en) Data encryption sharing system and method based on block chain and re-encryption
CN115345618B (en) Block chain transaction verification method and system based on mixed quantum digital signature
CN112749232A (en) Production data monitoring method and device, block chain node and storage medium
CN115001775B (en) Data processing method, device, electronic equipment and computer readable storage medium
CN111327419A (en) Method and system for resisting quantum computation block chain based on secret sharing
CN114357492A (en) Medical data privacy fusion method and device based on block chain
CN114499875B (en) Service data processing method, device, computer equipment and storage medium
CN113315745A (en) Data processing method, device, equipment and medium
CN110784488B (en) Controllable anonymous block chain system
CN109495257B (en) Data acquisition unit encryption method based on improved SM2 cryptographic algorithm
CN117155549A (en) Key distribution method, key distribution device, computer equipment and storage medium
CN114266061B (en) Offline data tamper-proof method based on hash chain
CN114282248B (en) Offline data tamper-proof system based on hash chain
CN110708155A (en) Copyright information protection method, copyright information protection system, copyright confirming method, copyright confirming device, copyright confirming equipment and copyright confirming medium
US11436351B1 (en) Homomorphic encryption of secure data
CN112910641A (en) Verification method and device for cross-link transaction supervision, relay link node and medium
CN113362065A (en) Online signature transaction implementation method based on distributed private key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant