CN114282248B - Offline data tamper-proof system based on hash chain - Google Patents

Offline data tamper-proof system based on hash chain Download PDF

Info

Publication number
CN114282248B
CN114282248B CN202111622953.8A CN202111622953A CN114282248B CN 114282248 B CN114282248 B CN 114282248B CN 202111622953 A CN202111622953 A CN 202111622953A CN 114282248 B CN114282248 B CN 114282248B
Authority
CN
China
Prior art keywords
offline
user
hash
hash chain
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111622953.8A
Other languages
Chinese (zh)
Other versions
CN114282248A (en
Inventor
王成欢
孙鑫
陈晓东
秦天浩
黄家辉
马小乐
黄腾
范志超
周志昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aerospace Science And Engineering Intelligent Operation Research And Information Security Research Institute Wuhan Co ltd
Original Assignee
Aerospace Science And Engineering Intelligent Operation Research And Information Security Research Institute Wuhan Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aerospace Science And Engineering Intelligent Operation Research And Information Security Research Institute Wuhan Co ltd filed Critical Aerospace Science And Engineering Intelligent Operation Research And Information Security Research Institute Wuhan Co ltd
Priority to CN202111622953.8A priority Critical patent/CN114282248B/en
Publication of CN114282248A publication Critical patent/CN114282248A/en
Application granted granted Critical
Publication of CN114282248B publication Critical patent/CN114282248B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to an offline data tamper-proof system based on a hash chain, and belongs to the technical field of offline user tamper detection. The invention uses the hash chain technology to realize the record and the trace of the offline data, provides a reliable and safe technical scheme for the tamper resistance of the offline data, opens up a new application scene for the hash chain technology, and has important practical application value.

Description

Offline data tamper-proof system based on hash chain
Technical Field
The invention belongs to the technical field of offline data tampering detection behaviors of offline users, and particularly relates to an offline data tamper-proof system based on a hash chain.
Background
The data sharing service is a bridge and a medium for realizing the scientific data value, and a good sharing service form is a necessary condition for fully exerting the scientific data value. Offline data is an important ring in data sharing services, and with the sustainable development of open science, offline data security sharing is increasingly important. However, offline data is unique as a digital asset: in the offline mode, the user breaks away from the online supervision of the data sharing platform, the use condition is not supervised, and the data holder can use the data for illegal use under the condition of violating the supervision, so that the ecological development of the data sharing service is severely restricted. Therefore, the data sharing service platform can regularly require offline users to submit offline data in order to realize supervision of the offline data. Under the premise, the tamper resistance of offline data becomes one of key links of a data sharing service system.
The offline data security has important significance in promoting data sharing, and the tamper-proof mechanism can provide powerful security guarantee for interaction and sharing of the offline data. There are various ways of tamper-proofing data, including file curing techniques, hash value verification techniques, digital signature techniques, trusted time stamping techniques, blockchain techniques, and the like. The prior tamper-proof technology is mainly applied to the fields of webpage tamper-proof, blockchain application, file integrity verification and the like. The invention realizes the offline data tamper resistance and meets the requirement of offline data dynamic update by using the hash chain combined digital signature technology based on the hash value verification technology. Aiming at the difficult problem of offline data tamper resistance, the invention uses a hash value verification technology to verify the integrity and correctness of the offline data. In addition, in order to meet the requirement of dynamic update of the offline data and realize real-time recording of the offline data, the invention uses a hash chain to record the offline data. Finally, to prevent offline users from pruning the offline hash chain node hash digests, the present invention encrypts the offline hash chain link points using digital signature techniques.
The idea of hash chain (hash chain) was originally proposed by the american mathematician Lamport for application in various network security environments, such as authentication systems, cryptocurrency, and various blockchain driving systems. The hash chain is specifically implemented by performing multiple hash operations on the data asset, and the result of each hash operation is formed into a sequence (W0→W1→W2→ … … →Wn-1→Wn), which is called a hash chain. The security of the hash chain depends on the unidirectional nature of the one-way hash function, i.e., wn can be derived from Wn-1, but Wn cannot be derived from Wn-1. It follows that the hash chain is suitable for hash operations when data grows dynamically.
Disclosure of Invention
First, the technical problem to be solved
The invention aims to solve the technical problems that: the technical scheme of reliability and safety is provided for offline data tamper resistance.
(II) technical scheme
In order to solve the technical problems, the invention provides an offline data tamper-proof system based on a hash chain, which comprises a user terminal and a cloud service platform, wherein the user terminal is called a user for short;
the user sends a request to the cloud service platform, wherein the request comprises a unique user identity identifier, the cloud service platform verifies user identity information after receiving the request, and generates a unique hash value W0 and SM2 key pair bound with the user according to the request after the user identity information is verified, safely stores an SM2 private key, backs up the hash value W0, and then issues an encryption program comprising an SM2 public key and the hash value W0 to the user;
the user generates data D1 offline, the encryption program carries out hash operation on the hash value W0 and the offline data D1 to obtain a hash value W1, and after the encryption program completes the hash operation, the encryption program encrypts the hash value W0 by using an SM4 and SM2 mixed encryption algorithm; generating a hash value Wi and encrypting Wi-1 after each piece of data Di is generated in the subsequent offline process of the user, and finally, obtaining an offline hash chain with the length of n+1 when generating data with the length of n, wherein the offline hash chain nodes Wi, i=2, 1,2, the n+1 is encrypted, and the tail node Wn is not encrypted;
after receiving the offline data and the offline hash chain, the cloud service platform reads a locally backed-up hash value W0, and performs hash operation for multiple times by using the backed-up hash value W0 and the offline data submitted by the user to obtain the hash chain;
the cloud service platform carries out hash verification on the calculated hash chain and an offline hash chain submitted by the user, and if the verification is not passed, the cloud service platform judges that the offline user modifies the offline data;
the cloud service platform detects whether the tail node of the offline hash chain submitted by the user is an unencrypted hash value, and if the cloud service platform detects that the offline hash chain does not have the unencrypted tail node, the cloud service platform judges that the offline user deletes the hash chain;
the cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by the user, and if the encryption times of any node are detected to be greater than 1, the offline user is judged to delete the offline data and the offline hash chain node, and the offline data and the offline hash chain node are regenerated.
The specific flow of the encryption program issued by the cloud service platform for encrypting the offline hash chain node by the SM4 and SM2 hybrid algorithm is as follows:
(1) The offline user A randomly generates a key encrypted and decrypted by an SM4 algorithm; a user A acquires an SM2 public key publicKeyB issued by a cloud service platform B from an encryption program; the user A encrypts the plaintext Data by using an SM4 Key to obtain a ciphertext block CipherData; the user A encrypts the Key Key by using a public Key publicKey B of the cloud service platform B and an SM2 algorithm to obtain a Key block CipherKey; the user A adds the ciphertext block CipherData and the key block CipherKey to form encrypted data Cipher;
(2) The cloud service platform B divides the data Cipher into a ciphertext block cipherData and a key block cipherKey; the cloud server B decrypts the CipherKey by using an SM2 private Key PrivateKey B to obtain an SM4 Key; and the cloud server B uses the SM4 Key to perform SM4 decryption on the ciphertext block CipherData to obtain plaintext Data.
Preferably, the unique user identity identifier comprises a user certificate and personal information.
And the cloud service platform carries out Hash verification on the calculated Hash chain and an offline Hash chain submitted by the user, and if the Hash chain does not pass the verification, the cloud service platform judges that the offline user modifies the offline data according to the collision resistance of the Hash function.
The cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by the user, the encryption times of any node are detected to be more than 1, and after the offline user is judged to delete the hash chain, preset countermeasures are executed for the user.
The cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by the user, the encryption times of any node are detected to be more than 1, and after the offline user is judged to delete the hash chain, permission control measures are executed for the user.
The cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by a user, detects that the encryption times of any node is greater than 1, judges that the offline user deletes the offline data and the offline hash chain node, and executes preset countermeasures on the user after regenerating the offline data and the offline hash chain node.
The cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by a user, detects that the encryption times of any node are more than 1, judges that the offline user deletes offline data and offline hash chain nodes, regenerates the offline data and offline hash chain nodes, and then executes permission control measures for the user.
The invention also provides application of the system in the technical field of offline data tampering detection of offline users.
The invention also provides an application of the system in data sharing service.
(III) beneficial effects
In order to realize the tamper resistance of the offline data, the invention encrypts the offline data by adopting a hash chain technology and a hybrid encryption mechanism, uses a hash function to carry out hash operation on the offline data, relies on the unidirectional property of the hash function to prevent a user from modifying the offline data, and then encrypts the offline hash value by utilizing the hybrid encryption mechanism to prevent the user from deleting the offline hash chain. And finally, recovering the offline data to perform hash verification and encryption frequency verification. The scheme has the following advantages and beneficial effects:
1. the invention adopts the hash chain technology to realize the tamper resistance of the off-line data, and can carry out real-time hash operation and record the off-line data under the condition of dynamically generating the data on line;
2. the invention adopts a mixed encryption mechanism based on SM4 and SM2 algorithms, and utilizes the advantages of high encryption speed of the SM4 algorithm, high encryption security of the SM2 algorithm, simple key management and low bandwidth requirement to obtain a more efficient and safer encryption technology.
The invention uses the hash chain technology to realize the record and the trace of the offline data, provides a reliable and safe technical scheme for the tamper resistance of the offline data, exploits a new application scene for the hash chain technology, and has important practical application value.
Drawings
FIG. 1 is a schematic block diagram of offline data tamper resistance of the present invention;
FIG. 2 is a diagram of a hybrid encryption model of the SM4 and SM2 algorithms of the present invention;
FIG. 3 is a hash chain encryption model diagram of the present invention;
FIG. 4 is a hash chain check model diagram of the present invention.
Detailed Description
For the purposes of clarity, content, and advantages of the present invention, a detailed description of the embodiments of the present invention will be described in detail below with reference to the drawings and examples.
Aiming at the problem of offline data tamper resistance, the invention provides a safe and reliable offline data tamper resistance system based on a hash chain technology and a hybrid encryption mechanism. The offline data tamper resistance is realized by adopting a hash chain technology, and the offline hash chain is prevented from being deleted by an offline user by using a hybrid encryption mechanism. Some basic concepts related to the present invention are:
1. hash chain: a hash chain is generally defined as the repeated application of a cryptographic hash function to a given data asset, and is implemented by performing multiple hash operations on the data asset, with the results of each hash operation forming a sequence (w0→w1→w2→ … … →wn-1→wn), which is referred to as a hash chain.
Sm4 algorithm: the SM4 algorithm, which is collectively referred to as the SM4 block cipher algorithm, is a cipher industry standard published in the 23 rd publication issued by the national cipher administration, 2012, month 3. The SM4 algorithm is a group symmetric key algorithm, the plaintext, the key and the ciphertext are all 16 bytes, and the encryption key and the decryption key are the same. The encryption algorithm and the key expansion algorithm both adopt a 32-round nonlinear iterative structure. The decryption process is similar to the encryption process except that the round keys are used in reverse order.
SM2 algorithm: the SM2 algorithm is totally called SM2 elliptic curve public key cryptographic algorithm, and is a cryptographic industry standard published in the 21 st publication published by the national institutes of ciphers, month 12 of 2010. The SM2 algorithm belongs to an asymmetric key algorithm, uses a public key for encryption and a private key for decryption, and is not computationally feasible for the known public key. The encryptor encrypts the message into ciphertext by using the public key of the decryptor, and the decryptor decrypts the received ciphertext into the original message by using the private key of the decryptor.
4. Hybrid encryption mechanism: before data is communicated on a network, a sender randomly generates a random key of an SM4 algorithm, the SM4 algorithm is used for encrypting plaintext data to be transmitted, and then the SM2 algorithm is used for encrypting the key. After receiving the ciphertext data and the encrypted key data, the receiver also decrypts the random key by using the SM2 algorithm, and then decrypts the ciphertext by using the random key to perform SM4 decryption. The random key of each plaintext data encryption is different, the problem of SM4 key management does not exist, and the encryption and decryption scheme ensures the data security and improves the encryption and decryption speed.
Aiming at the problem of offline data security protection, the offline data tamper-proof system based on the hash chain technology and the hybrid encryption mechanism is used for preventing offline data tamper, preventing offline users from tampering with the data, encrypting the hash chain node by using the hybrid encryption algorithm, and detecting whether the offline users delete the offline data.
Referring to fig. 1 to 3, the system of the present invention includes a user terminal and a cloud service platform, where the user terminal is simply called a user, and the two implement system functions through the following interaction process:
a user sends a request to a cloud service platform, wherein the request comprises a user identity unique identifier such as a user certificate, personal information and the like, the cloud service platform verifies the user identity information after receiving the request, and generates a unique hash value W0 and SM2 key pair bound with the user according to the request after the user identity information is verified, the SM2 private key is safely stored, the hash value W0 is backed up, and then an encryption program comprising an SM2 public key and the hash value W0 is issued to the user;
the user generates data D1 offline, the encryption program carries out hash operation on the hash value W0 and the offline data D1 to obtain a hash value W1, and after the encryption program completes the hash operation, the encryption program encrypts the hash value W0 by using an SM4 and SM2 mixed encryption algorithm, as shown in FIG. 2;
generating a hash value Wi and encrypting Wi-1 after each piece of data Di is generated in the subsequent offline mode of a user, and finally, obtaining an offline hash chain with the length of n+1 when generating data with the length of n, wherein the offline hash chain nodes Wi, i=2, 1,2, the n+1 is encrypted, and the tail node Wn is not encrypted;
after receiving the offline data and the offline hash chain, the cloud service platform reads a locally backed-up hash value W0, and performs hash operation for multiple times by using the backed-up hash value W0 and the offline data submitted by the user to obtain the hash chain;
the cloud service platform carries out Hash verification on the calculated Hash chain and an offline Hash chain submitted by the user, and if the Hash chain does not pass the verification, the cloud service platform judges that the offline user modifies offline data according to the strong collision resistance of the Hash function;
the cloud service platform detects whether the tail node of the offline hash chain submitted by the user is an unencrypted hash value, if the cloud service platform detects that the offline hash chain does not have the unencrypted tail node, the cloud service platform judges that the offline user deletes the hash chain, and performs authority control or other countermeasures on the user;
the cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by the user, if the encryption times of any node are detected to be more than 1, the offline user is judged to delete the offline data and the offline hash chain node (offline hash node), the offline data and the offline hash chain node are regenerated, and authority control or other countermeasures are executed for the user.
In this embodiment, the specific flow of encrypting the offline hash chain node (corresponding hash value) by using the SM4 and SM2 hybrid algorithm is as follows:
(1) The offline user A randomly generates a key encrypted and decrypted by an SM4 algorithm; a user A acquires an SM2 public key publicKeyB issued by a cloud service platform B from an encryption program; the user A encrypts the plaintext Data by using an SM4 Key to obtain a ciphertext block CipherData; the user A encrypts the Key Key by using a public Key publicKey B of the cloud service platform B and an SM2 algorithm to obtain a Key block CipherKey; the user A adds the ciphertext block CipherData and the key block CipherKey to form encrypted data Cipher;
(2) The cloud service platform B divides the data Cipher into a ciphertext block cipherData and a key block cipherKey; the cloud server B decrypts the CipherKey by using an SM2 private Key PrivateKey B to obtain an SM4 Key; and the cloud server B uses the SM4 Key to perform SM4 decryption on the ciphertext block CipherData to obtain plaintext Data.
According to the invention, aiming at the problem of offline data tamper resistance and deletion resistance, the system can be used for detecting whether offline users tamper or delete offline data, so that the offline users are prevented from maliciously tampering or deleting the offline data which needs to be collected by the cloud service platform.
The foregoing is merely a preferred embodiment of the present invention, and it should be noted that modifications and variations could be made by those skilled in the art without departing from the technical principles of the present invention, and such modifications and variations should also be regarded as being within the scope of the invention.

Claims (10)

1. The offline data tamper-proof system based on the hash chain is characterized by comprising a user terminal and a cloud service platform, wherein the user terminal is called a user for short;
the user sends a request to the cloud service platform, wherein the request comprises a unique user identity identifier, the cloud service platform verifies user identity information after receiving the request, and generates a unique hash value W0 and SM2 key pair bound with the user according to the request after the user identity information is verified, safely stores an SM2 private key, backs up the hash value W0, and then issues an encryption program comprising an SM2 public key and the hash value W0 to the user;
the user generates data D1 offline, the encryption program carries out hash operation on the hash value W0 and the offline data D1 to obtain a hash value W1, and after the encryption program completes the hash operation, the encryption program encrypts the hash value W0 by using an SM4 and SM2 mixed encryption algorithm; generating a hash value Wi and encrypting Wi-1 in the same way after the user subsequently generates one piece of data Di offline, and finally, obtaining an offline hash chain with the length of n+1 when generating data with the length of n, wherein the offline hash chain nodes Wi, i=2, 1,2, & gt, n+1 are encrypted, and the tail node Wn is not encrypted;
after receiving the offline data and the offline hash chain, the cloud service platform reads a locally backed-up hash value W0, and performs hash operation for multiple times by using the backed-up hash value W0 and the offline data submitted by the user to obtain the hash chain;
the cloud service platform carries out hash verification on the calculated hash chain and an offline hash chain submitted by the user, and if the verification is not passed, the cloud service platform judges that the offline user modifies the offline data;
the cloud service platform detects whether the tail node of the offline hash chain submitted by the user is an unencrypted hash value, and if the cloud service platform detects that the offline hash chain does not have the unencrypted tail node, the cloud service platform judges that the offline user deletes the hash chain;
the cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by the user, and if the encryption times of any node are detected to be greater than 1, the offline user is judged to delete the offline data and the offline hash chain node, and the offline data and the offline hash chain node are regenerated.
2. The system of claim 1, wherein the specific flow of the encryption program issued by the cloud service platform to encrypt the offline hash chain node by the SM4 and SM2 hybrid algorithm is as follows:
(1) The offline user A randomly generates a key encrypted and decrypted by an SM4 algorithm; a user A acquires an SM2 public key publicKeyB issued by a cloud service platform B from an encryption program; the user A encrypts the plaintext Data by using an SM4 Key to obtain a ciphertext block CipherData; the user A encrypts the Key Key by using a public Key publicKey B of the cloud service platform B and an SM2 algorithm to obtain a Key block CipherKey; the user A adds the ciphertext block CipherData and the key block CipherKey to form encrypted data Cipher;
(2) The cloud service platform B divides the data Cipher into a ciphertext block cipherData and a key block cipherKey; the cloud server B decrypts the CipherKey by using an SM2 private Key PrivateKey B to obtain an SM4 Key; and the cloud server B uses the SM4 Key to perform SM4 decryption on the ciphertext block CipherData to obtain plaintext Data.
3. The system of claim 1, wherein the user identity unique identification comprises a user certificate, personal information.
4. The system of claim 1, wherein the cloud service platform hashes the computed Hash chain with an offline Hash chain submitted by the user, and if the Hash chain does not pass the Hash verification, determines that the offline user modified the offline data based on the collision resistance of the Hash function.
5. The system of claim 1, wherein the cloud service platform detects a mixed encryption number of SM4 and SM2 for each node of the offline hash chain submitted by the user, detects an encryption number of any node greater than 1, and performs a preset countermeasure for the user after determining that the offline user prunes the hash chain.
6. The system of claim 5, wherein the cloud service platform detects the number of times of SM4 and SM2 mixed encryption for each node of the offline hash chain submitted by the user, detects that the number of times of encryption for any node is greater than 1, and performs the rights control measure for the user after determining that the offline user has pruned the hash chain.
7. The system of claim 1, wherein the cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by the user, detects that the encryption times of any node is greater than 1, determines that the offline user deletes the offline data and the offline hash chain node, and executes a preset countermeasure for the user after regenerating the offline data and the offline hash chain node.
8. The system of claim 7, wherein the cloud service platform detects the SM4 and SM2 mixed encryption times of each node of the offline hash chain submitted by the user, detects that the encryption times of any node is greater than 1, determines that the offline user deletes the offline data and the offline hash chain node, and performs the permission control measure on the user after regenerating the offline data and the offline hash chain node.
9. Use of a system according to any of claims 1 to 8 in the technical field of detecting offline user tampering with offline data.
10. Use of the system of any of claims 1 to 8 in a data sharing service.
CN202111622953.8A 2021-12-28 2021-12-28 Offline data tamper-proof system based on hash chain Active CN114282248B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111622953.8A CN114282248B (en) 2021-12-28 2021-12-28 Offline data tamper-proof system based on hash chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111622953.8A CN114282248B (en) 2021-12-28 2021-12-28 Offline data tamper-proof system based on hash chain

Publications (2)

Publication Number Publication Date
CN114282248A CN114282248A (en) 2022-04-05
CN114282248B true CN114282248B (en) 2024-04-05

Family

ID=80876954

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111622953.8A Active CN114282248B (en) 2021-12-28 2021-12-28 Offline data tamper-proof system based on hash chain

Country Status (1)

Country Link
CN (1) CN114282248B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140033824A (en) * 2012-09-10 2014-03-19 남성학 Encryption systems and methods using hash value as symmetric key in the smart device
CN109145612A (en) * 2018-07-05 2019-01-04 东华大学 The cloud data sharing method of anti-data tampering, user's collusion is realized based on block chain
KR20190066668A (en) * 2017-12-06 2019-06-14 재단법인대구경북과학기술원 Method and system for providing digital test service based on hash chain
WO2020142603A1 (en) * 2019-01-03 2020-07-09 American Express Travel Related Services Co., Inc. Hybrid identity as a service for decentralized browser based wallets
CN112039870A (en) * 2020-08-28 2020-12-04 武汉见邦融智科技有限公司 Privacy protection-oriented vehicle-mounted network authentication method and system based on block chain
CN112367169A (en) * 2020-11-11 2021-02-12 平安科技(深圳)有限公司 Data encryption and decryption method, device, equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9553982B2 (en) * 2013-07-06 2017-01-24 Newvoicemedia, Ltd. System and methods for tamper proof interaction recording and timestamping
US11057366B2 (en) * 2018-08-21 2021-07-06 HYPR Corp. Federated identity management with decentralized computing platforms
US20210192516A1 (en) * 2019-09-19 2021-06-24 Atrium Separate IP Holdings Number 1, LLC Blockchain architecture, system, method and device for automated cybersecurity and data privacy law compliance with a streamlined block structure

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140033824A (en) * 2012-09-10 2014-03-19 남성학 Encryption systems and methods using hash value as symmetric key in the smart device
KR20190066668A (en) * 2017-12-06 2019-06-14 재단법인대구경북과학기술원 Method and system for providing digital test service based on hash chain
CN109145612A (en) * 2018-07-05 2019-01-04 东华大学 The cloud data sharing method of anti-data tampering, user's collusion is realized based on block chain
WO2020142603A1 (en) * 2019-01-03 2020-07-09 American Express Travel Related Services Co., Inc. Hybrid identity as a service for decentralized browser based wallets
CN112039870A (en) * 2020-08-28 2020-12-04 武汉见邦融智科技有限公司 Privacy protection-oriented vehicle-mounted network authentication method and system based on block chain
CN112367169A (en) * 2020-11-11 2021-02-12 平安科技(深圳)有限公司 Data encryption and decryption method, device, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种基于移动Agent的云端(Cloud-P2P)数据复合销毁机制;徐小龙;龚培培;章韵;毕朝国;;计算机科学;20151015(10);全文 *

Also Published As

Publication number Publication date
CN114282248A (en) 2022-04-05

Similar Documents

Publication Publication Date Title
CN111130757B (en) Multi-cloud CP-ABE access control method based on block chain
CN103179086B (en) Remote storage processing method and the system of data
CN110535868A (en) Data transmission method and system based on Hybrid Encryption algorithm
US6535607B1 (en) Method and apparatus for providing interoperability between key recovery and non-key recovery systems
CN111769938B (en) Key management system and data verification system of block chain sensor
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
US7894608B2 (en) Secure approach to send data from one system to another
CN111914291A (en) Message processing method, device, equipment and storage medium
CN112732695B (en) Cloud storage data security deduplication method based on block chain
Yu et al. Decim: Detecting endpoint compromise in messaging
CN112671735B (en) Data encryption sharing system and method based on block chain and re-encryption
CN115345618B (en) Block chain transaction verification method and system based on mixed quantum digital signature
CN112685786A (en) Financial data encryption and decryption method, system, equipment and storage medium
CN112749232A (en) Production data monitoring method and device, block chain node and storage medium
CN110233729B (en) Encrypted solid-state disk key management method based on PUF
CN111835510A (en) ETC safety management method
CN111049738A (en) E-mail data security protection method based on hybrid encryption
CN112187767A (en) Multi-party contract consensus system, method and medium based on block chain
CN112398655B (en) File transmission method, server and computer storage medium
CN112800462A (en) Method for storing confidential information in cloud computing environment
CN109495257B (en) Data acquisition unit encryption method based on improved SM2 cryptographic algorithm
CN110149205B (en) Method for protecting Internet of things terminal by using block chain
CN114282248B (en) Offline data tamper-proof system based on hash chain
CN116743372A (en) Quantum security protocol implementation method and system based on SSL protocol
CN114266061B (en) Offline data tamper-proof method based on hash chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant