CN102821098A - System and method for self-dissolving instant messaging under cloud environment - Google Patents

System and method for self-dissolving instant messaging under cloud environment Download PDF

Info

Publication number
CN102821098A
CN102821098A CN2012102483233A CN201210248323A CN102821098A CN 102821098 A CN102821098 A CN 102821098A CN 2012102483233 A CN2012102483233 A CN 2012102483233A CN 201210248323 A CN201210248323 A CN 201210248323A CN 102821098 A CN102821098 A CN 102821098A
Authority
CN
China
Prior art keywords
key
dissolving
communication information
sub
instant communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012102483233A
Other languages
Chinese (zh)
Inventor
邓玉辉
陈智科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan University
Original Assignee
Jinan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan University filed Critical Jinan University
Priority to CN2012102483233A priority Critical patent/CN102821098A/en
Publication of CN102821098A publication Critical patent/CN102821098A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a system and a method for self-dissolving the instant messaging under cloud environment; the system comprises an encryption and decryption module, a secret sharing module and a key storage module, wherein the encryption and decryption module is used for encrypting the instant messaging which is needed to be self-dissolved, or decrypting the ciphertext in the self-dissolving message; the secret sharing module is used for resolving and recombining the encryption key with the secret sharing algorithm, wherein the secret sharing module resolves the encryption key K into n parts of sub key; and the key storage module is used for calling the DHT network sub module. After the life cycles of a greater number of sub keys reach a certain time, because of the dynamic characteristics of the motorbike Emul kad network, the sub keys are disappeared from the network, so that the encrypted instant messaging is not decrypted again, and the instant messaging is self-dissolved to be destroyed. The method does not need the user to carry out any specific operation, so even the attacker obtains the copy of the self-dissolving data before finishing the life cycle, the data are also dissolved after the finishing of the life cycle.

Description

Instant communication information is from dissolving system and method under the cloud environment
Technical field
The present invention relates to the technical field of communication under the cloud environment, particularly a kind of system and method for destroying from dissolving in order to the data of protection user data privacy.
Background technology
The huge advantage that cloud computing brought makes increasing internet, applications all be deployed in the cloud environment with the mode of cloud service.Typical cloud computing provider often provides general Network to use; Can visit through softwares such as browser or other Web services; And software and user data all are stored on the server, and this is uncontrollable for user's data, thereby have caused the privacy concerns of user data.Therefore, under cloud environment, how to guarantee that through efficient strategy the privacy of user data becomes very important.
At present existing many schemes are used to protect the privacy of user data, and these schemes can be divided into several types.One type of scheme the most plain is exactly that the requirement user manually deletes them voluntarily and is kept at the data on the server or uses timed task to be used for deleted data.Yet be not that all cloud services all can provide the function of data dump, even provide the removing function can not guarantee that data really thoroughly have been eliminated, because user data possibly exist many parts buffer memory or backup in server yet.One type of scheme then use public-key encrypt or or the symmetric cryptography system user data is encrypted, how effectively this type scheme has been transformed into the privacy of key with the privacy of user data, but storage and preserve the problem that key becomes maximum.Key too simply can stay potential safety hazard, and key too complex man's brain is difficult to memory again, must note with certain form, and therefore, the key of noting is also dangerous.Another kind of scheme requires the third-party institution of one or more trusted to be used for the necessary information that trustship is used for the calling party data, for example based on the solution of Ephemerizer system.This scheme.Thereby the third-party institution will delete the data of trustship and cause user data to visit again after the specific time limit.The greatest problem of this type scheme is the trust degree of these third-party institutions, even they are believable, the user also maybe not can trust them.For example, Facebook still follows the tracks of user's behavior after the user logs off, and Google collects and the analysis user data through way of paying, and Twitter sells user profile and microblogging content to data mining company.These cases have all caused the worry of user for the important privacy information of individual.
Therefore, in order to comprise the privacy concerns of user data under cloud environment, people are badly in need of a kind of safer, more effective scheme.This scheme should be enough simple, and the user need not carry out too many specific operation, can not introduce new safety problem yet, need not rely on third party's service of the extra deployment of any needs simultaneously.
Summary of the invention
The shortcoming that the objective of the invention is to overcome prior art provides a kind of communication message that satisfies protection user data privacy requirement under the cloud environment from the dissolving system with not enough.
Another object of the present invention is to, provide a kind of communication message that satisfies protection user data privacy requirement under the cloud environment from the dissolving method.
In order to reach above-mentioned first purpose, the present invention adopts following technical scheme:
Instant communication information comprises from the dissolving system under a kind of cloud environment of the present invention:
The encrypting and decrypting module is responsible for needs are encrypted from the instant communication information of dissolving, or the ciphertext of dissolving certainly in the message is deciphered;
Secret sharing module, the secret shared algorithm of responsible use decomposes encryption key and recombinates, and secret sharing module resolves into n one's share of expenses for a joint undertaking key to encryption key K;
Key storage block is responsible for calling the DHT network submodular, uses random number generator to generate index index, stores sub-key the DHT network into or from the DHT network, fetches.
Preferably, the AES that uses when instant communication information is encrypted is the AES-CBC algorithm, and key length is 128 bits.
Preferably, to share algorithm be the secret algorithm of sharing of Shamir to the secret used of secret sharing module.
Preferably, the DHT network of storage sub-key is electric donkey eMule Kad network in the key storage block.
Preferably, the DHT submodule in the key storage block is stored sub-key as the notepad categorical data in the eMule Kad network.
In order to reach above-mentioned another purpose, the present invention adopts following technical scheme:
Instant communication information comprises the steps: from the dissolving method under the cloud environment of the present invention
The encryption and decryption module of S1, system is encrypted from the instant communication information of dissolving needs;
The secret sharing module of S2, system is responsible for using the secret algorithm of sharing that encryption key is decomposed;
S3, key storage block then store the sub-key after decomposing into electric donkey eMul kad network;
S4, before each sub-key reaches its life cycle, the user can fetch parton key recombinate out encryption key, the instant communication information behind the enabling decryption of encrypted then;
S5, after arriving the regular hour life cycle of most of sub-key; Because the dynamic characteristic of electric donkey eMul kad network; These sub-keys will disappear from this network, make that the instant communication information after encrypting can't be deciphered again, and the dissolving certainly that reaches instant communication information is destroyed.
Preferably, encrypting the concrete steps of dissolving message certainly is:
(1) for the instant communication information D of needs from dissolving; The encrypting and decrypting module of system will check in the key record that stores the DHT network in advance into whether satisfactory key is arranged; Obtain ciphertext C if having then directly use the key K that prestores that message is encrypted, then execution in step (4); Otherwise key K that generates at random of system is encrypted message and is obtained ciphertext C, execution in step (2) operation then;
(2) secret sharing module will resolve into n one's share of expenses for a joint undertaking key, i.e. k to encryption key 1, k 2..., k n, just can recombinate and restore encryption key K, wherein k when having k one's share of expenses for a joint undertaking key<n, execution in step (3) then;
(3) key storage block is used an index index:I who generates n DHT network with L as the PRNG of the cryptography safety of seed 1, I 2..., I n, system is with (I 1, k 1), (I 2, k 2) ..., (I n, k n) store in the corresponding node in the DHT network execution in step (4) then into;
(4) system will (n k) be packaged into certain form for C, L, is called from dissolving message, and the user can will be certainly dissolving message stores in cloud environment through cloud service.
Preferably, deblocking comprises the steps: from dissolving message
(1) for the dissolving message certainly that receives, the logical preliminary deblocking of system from dissolve message obtain (C, L, n, k), execution in step (2) then;
(2) key storage block is the index:I of n the DHT network of random number generator generation of seed in order to L 1, I 2..., I n, and use these index from the DHT network, to fetch sub-key, then execution in step (3);
(3) when the sub-key number of fetching during more than or equal to k, just can use the secret sharing module encryption key K that recombinates out, execution in step (4) then, otherwise can't decrypting ciphertext C, data have been accomplished dissolving certainly;
(4), thereby obtain clear-text message D with key K decrypting ciphertext C.
Preferably, the DHT submodule in the key storage block is done sub-key in fetching the process of single sub-key, to send request to a plurality of nodes simultaneously, if node return results promptly stops to wait for the response of other node at once.
Preferably, the DHT submodule in the key storage block carries out buffer memory to the result who stores the searching nodal operation that carries out in the sub-key process.
The present invention has following advantage and effect with respect to prior art:
1, the present invention is in life cycle, and validated user is visit data easily.
2, the present invention is after life cycle finishes, and data will be dissolved automatically, not need the user to carry out any specific operation.Even the assailant obtains self-dissolving and separates the copy of data before life cycle finishes, data still can finish the back dissolving in life cycle.
3, the present invention has versatility, does not rely on any additional Special Equipment, need not depend on third party authentication center, than prior art, has higher efficient.
4, the present invention need not revise any data of having stored or having filed, and does not need safety in utilization hardware yet, saves cost; Need not rely on simultaneously the external service of the extra deployment of any needs yet.
Description of drawings
Fig. 1 dissolves the system framework sketch map certainly for instant communication information of the present invention;
Fig. 2 is packaged into instant communication information from dissolving the workflow diagram of message for the present invention;
Fig. 3 dissolves the workflow diagram of message certainly for decapsulation of the present invention.
Embodiment
Below in conjunction with embodiment and accompanying drawing the present invention is described in further detail, but execution mode of the present invention is not limited thereto.
Embodiment
As shown in Figure 1, instant communication information of the present invention comprises from the dissolving system:
Encrypting and decrypting module: be responsible for needs are encrypted from the instant communication information of dissolving, the ciphertext of dissolving certainly in the message is deciphered.
Secret sharing module: the secret shared algorithm of responsible use decomposes encryption key and recombinates.Secret sharing module resolves into n one's share of expenses for a joint undertaking key to encryption key, i.e. k1, and k2 ..., kn is when having k (k < n) the one's share of expenses for a joint undertaking key encryption key K that just can recombinate out.The introducing of secret sharing module can enhanced system fail safe and reliability.
Key storage block: be responsible for calling the DHT network submodular, use random number generator to generate index, store sub-key the DHT network into or from the DHT network, fetch.Key storage block is with the DHT network of eMuleKad network as the storage sub-key at present.2, instant communication information is characterized in that from the dissolving system AES that uses when instant communication information is encrypted is the AES-CBC algorithm under the cloud environment according to claim 1, and key length is 128 bits.
In the present embodiment; The secret that secret sharing module is used is shared algorithm and is the secret algorithm of sharing of Shamir; The DHT network of storage sub-key is electric donkey eMule Kad network in the key storage block, and the DHT submodule in the key storage block is stored sub-key as the notepad categorical data in the eMule Kad network.
Said safety management platform will use the mobile device sequence number, be stored in the ciphering sequence number of mobile device encrypted area (this ciphering sequence number is generated and sent to mobile device by safety management platform when mobile device is registered successfully at random) and mobile network identification number (sending to mobile device by safety management platform when mobile device is registered successfully).The encryption and decryption module comprises two sub-module: symmetric key encryption and decryption submodule and mixing encryption and decryption submodule.
Instant communication information comprises the steps: from the dissolving method under the present embodiment cloud environment
The encryption and decryption module of S1, system is encrypted from the instant communication information of dissolving needs;
The secret sharing module of S2, system is responsible for using the secret algorithm of sharing that encryption key is decomposed;
S3, key storage block then store the sub-key after decomposing into electric donkey eMul kad network;
S4, before each sub-key reaches its life cycle, the user can fetch parton key recombinate out encryption key, the instant communication information behind the enabling decryption of encrypted then;
S5, after arriving the regular hour life cycle of most of sub-key; Because the dynamic characteristic of electric donkey eMul kad network; These sub-keys will disappear from this network, make that the instant communication information after encrypting can't be deciphered again, and the dissolving certainly that reaches instant communication information is destroyed.
For the ease of analyzing the present invention, below instant communication information is packaged into from dissolving the workflow diagram (Fig. 2) of message and workflow diagram (Fig. 3) that message is separated in the decapsulation self-dissolving remakes labor.
As shown in Figure 2; Instant communication information D for the needs transmission; The encrypting and decrypting module of system will check in the key record that stores the DHT network in advance into whether satisfactory key is arranged, and obtain ciphertext C if having then directly use the key K that prestores that message is encrypted; Otherwise key K that generates at random of system uses secret sharing module to resolve into n one's share of expenses for a joint undertaking key, i.e. k to encryption key then 1, k 2..., k n, when having k (k<n) the one's share of expenses for a joint undertaking key just can be recombinated and restored encryption key K, and key storage block is used an index:I who generates n DHT network with L as the PRNG of the cryptography safety of seed 1, I 2..., I n, then with (I 1, k 1), (I 2, k 2) ..., (I n, k n) store in the corresponding node in the DHT network, behind the successful storage key, the encrypting and decrypting module is encrypted message and is obtained ciphertext C.System will (n k) be packaged into certain form for C, L, is called from dissolving message, and the user can will be dissolved message certainly through cloud service and sent to the recipient.
As shown in Figure 3, for the dissolving message certainly that receives, the logical preliminary deblocking of system from dissolve message obtain (C, L, n, k), key storage block is the index:I that the random number generator of seed generates n DHT network in order to L 1, I 2..., I n, and use these index from the DHT network, to fetch sub-key, when the sub-key number of fetching during, just can use the secret sharing module encryption key K that recombinates out more than or equal to k, use key K decrypting ciphertext C then, thereby obtain clear-text message.If the sub-key number of fetching is during less than k then can't decrypting ciphertext C, data have been accomplished dissolving certainly and have been destroyed.
DHT submodule in the key storage block can carry out buffer memory to the result of FindNode (searching node) operation in the process of storage sub-key, carried out, so that raise the efficiency when fetching sub-key afterwards.
Further; In order to accelerate to fetch the process of sub-key; DHT submodule in the key storage block is done sub-key in fetching the process of single sub-key, to send request to a plurality of nodes simultaneously, if node return results promptly stops to wait for the response of other node at once.
The foregoing description is a preferred implementation of the present invention; But execution mode of the present invention is not restricted to the described embodiments; Other any do not deviate from change, the modification done under spirit of the present invention and the principle, substitutes, combination, simplify; All should be the substitute mode of equivalence, be included within protection scope of the present invention.

Claims (10)

1. instant communication information is characterized in that from the dissolving system under the cloud environment, comprising:
The encrypting and decrypting module is responsible for needs are encrypted from the instant communication information of dissolving, or the ciphertext of dissolving certainly in the message is deciphered;
Secret sharing module, the secret shared algorithm of responsible use decomposes encryption key and recombinates, and secret sharing module resolves into n one's share of expenses for a joint undertaking key to encryption key K;
Key storage block is responsible for calling the DHT network submodular, uses random number generator to generate index index, stores sub-key the DHT network into or from the DHT network, fetches.
2. instant communication information is characterized in that from the dissolving system under the cloud environment according to claim 1, and the AES that uses when instant communication information is encrypted is the AES-CBC algorithm, and key length is 128 bits.
3. instant communication information is characterized in that from the dissolving system under the cloud environment according to claim 1, and the secret that secret sharing module is used is shared algorithm and is the secret algorithm of sharing of Shamir.
4. instant communication information is characterized in that from the dissolving system under the cloud environment according to claim 1, and the DHT network of storage sub-key is electric donkey eMule Kad network in the key storage block.
5. instant communication information is characterized in that from the dissolving system under the cloud environment according to claim 1, and the DHT submodule in the key storage block is stored sub-key as the notepad categorical data in the eMule Kad network.
6. instant communication information is characterized in that from the dissolving method under the cloud environment according to claim 1, comprises the steps:
The encryption and decryption module of S1, system is encrypted from the instant communication information of dissolving needs;
The secret sharing module of S2, system is responsible for using the secret algorithm of sharing that encryption key is decomposed;
S3, key storage block then store the sub-key after decomposing into electric donkey eMul kad network;
S4, before each sub-key reaches its life cycle, the user can fetch parton key recombinate out encryption key, the instant communication information behind the enabling decryption of encrypted then;
S5, after arriving the regular hour life cycle of most of sub-key; Because the dynamic characteristic of electric donkey eMul kad network; These sub-keys will disappear from this network, make that the instant communication information after encrypting can't be deciphered again, and the dissolving certainly that reaches instant communication information is destroyed.
7. it is characterized in that from the dissolving method based on instant communication information under the described cloud environment of claim 6 that encryption from the concrete steps of dissolving message is:
(1) for the instant communication information D of needs from dissolving; The encrypting and decrypting module of system will check in the key record that stores the DHT network in advance into whether satisfactory key is arranged; Obtain ciphertext C if having then directly use the key K that prestores that message is encrypted, then execution in step (4); Otherwise key K that generates at random of system is encrypted message and is obtained ciphertext C, execution in step (2) operation then;
(2) secret sharing module will resolve into n one's share of expenses for a joint undertaking key, i.e. k to encryption key 1, k 2..., k n, just can recombinate and restore encryption key K, wherein k when having k one's share of expenses for a joint undertaking key<n, execution in step (3) then;
(3) key storage block is used an index index:I who generates n DHT network with L as the PRNG of the cryptography safety of seed 1, I 2..., I n, system is with (I 1, k 1), (I 2, k 2) ..., (I n, k n) store in the corresponding node in the DHT network execution in step (4) then into;
(4) system will (n k) be packaged into certain form for C, L, is called from dissolving message, and the user can will be certainly dissolving message stores in cloud environment through cloud service.
8. instant communication information is characterized in that from the dissolving method under the cloud environment according to claim 6, and deblocking comprises the steps: from dissolving message
(1) for the dissolving message certainly that receives, the logical preliminary deblocking of system from dissolve message obtain (C, L, n, k), execution in step (2) then;
(2) key storage block is the index:I of n the DHT network of random number generator generation of seed in order to L 1, I 2..., I n, and use these index from the DHT network, to fetch sub-key, then execution in step (3);
(3) when the sub-key number of fetching during more than or equal to k, just can use the secret sharing module encryption key K that recombinates out, execution in step (4) then, otherwise can't decrypting ciphertext C, data have been accomplished dissolving certainly;
(4), thereby obtain clear-text message D with key K decrypting ciphertext C.
9. instant communication information is from the dissolving method under the cloud environment according to claim 7; It is characterized in that; DHT submodule in the key storage block is done sub-key in fetching the process of single sub-key, to send request to a plurality of nodes simultaneously; If node is return results, promptly stop to wait for the response of other node at once.
10. instant communication information is characterized in that from the dissolving method under the cloud environment according to claim 7, and the DHT submodule in the key storage block carries out buffer memory to the result who stores the searching nodal operation that carries out in the sub-key process.
CN2012102483233A 2012-07-17 2012-07-17 System and method for self-dissolving instant messaging under cloud environment Pending CN102821098A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012102483233A CN102821098A (en) 2012-07-17 2012-07-17 System and method for self-dissolving instant messaging under cloud environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012102483233A CN102821098A (en) 2012-07-17 2012-07-17 System and method for self-dissolving instant messaging under cloud environment

Publications (1)

Publication Number Publication Date
CN102821098A true CN102821098A (en) 2012-12-12

Family

ID=47304955

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012102483233A Pending CN102821098A (en) 2012-07-17 2012-07-17 System and method for self-dissolving instant messaging under cloud environment

Country Status (1)

Country Link
CN (1) CN102821098A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338437A (en) * 2013-07-11 2013-10-02 成都三零瑞通移动通信有限公司 Encryption method and system of mobile instant message
CN103414682A (en) * 2013-04-07 2013-11-27 深圳大学 Method for cloud storage of data and system
CN103780626A (en) * 2014-01-27 2014-05-07 北京飞流九天科技有限公司 Data sharing method of cloud server and intelligent terminal
CN103973790A (en) * 2014-05-09 2014-08-06 中国电子科技集团公司第三十研究所 Automatic destroying method of Web application data stored in network
CN104601451A (en) * 2015-01-27 2015-05-06 深信服网络科技(深圳)有限公司 Instant message communication method and system
CN104660589A (en) * 2015-01-20 2015-05-27 中兴通讯股份有限公司 Method and system for controlling encryption of information and analyzing information as well as terminal
CN104851007A (en) * 2015-06-10 2015-08-19 深圳市瑞盟包装有限公司 Commodity information management system and method based on two-dimensional code and self-dissolving system
CN107769918A (en) * 2017-09-07 2018-03-06 广东工业大学 A kind of more copy associated deletion methods of safe cloud data
CN109255245A (en) * 2018-08-13 2019-01-22 海南新软软件有限公司 A kind of local cryptographic key protection method, apparatus and system
CN110401533A (en) * 2019-08-27 2019-11-01 腾讯科技(深圳)有限公司 A kind of private key encryption method and device
CN113411186A (en) * 2021-08-19 2021-09-17 北京电信易通信息技术股份有限公司 Video conference data security sharing method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
R.GEAMBASU 等: ""Vanish:Increasing data privacy with self-destructing data"", 《PROCEEDINGS OF THE 18TH USENIX SECURITY SYMPOSIUM》 *
岳风顺: ""云计算环境中数据自毁机制研究"", 《中国优秀硕士学位论文全文数据库(信息科技辑)》 *
王丽娜: ""一种适于云存储的数据确定性删除方法"", 《电子学报》 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103414682A (en) * 2013-04-07 2013-11-27 深圳大学 Method for cloud storage of data and system
CN103414682B (en) * 2013-04-07 2016-08-17 深圳大学 The method for cloud storage of a kind of data and system
CN103338437B (en) * 2013-07-11 2016-06-08 成都三零瑞通移动通信有限公司 The encryption method of a kind of mobile instant message and system
CN103338437A (en) * 2013-07-11 2013-10-02 成都三零瑞通移动通信有限公司 Encryption method and system of mobile instant message
CN103780626A (en) * 2014-01-27 2014-05-07 北京飞流九天科技有限公司 Data sharing method of cloud server and intelligent terminal
CN103973790A (en) * 2014-05-09 2014-08-06 中国电子科技集团公司第三十研究所 Automatic destroying method of Web application data stored in network
CN104660589A (en) * 2015-01-20 2015-05-27 中兴通讯股份有限公司 Method and system for controlling encryption of information and analyzing information as well as terminal
CN104601451A (en) * 2015-01-27 2015-05-06 深信服网络科技(深圳)有限公司 Instant message communication method and system
CN104601451B (en) * 2015-01-27 2017-11-28 深信服网络科技(深圳)有限公司 Instant information communication method and system
CN104851007A (en) * 2015-06-10 2015-08-19 深圳市瑞盟包装有限公司 Commodity information management system and method based on two-dimensional code and self-dissolving system
CN104851007B (en) * 2015-06-10 2018-05-15 深圳市瑞盟包装有限公司 Commodity information management system and its method based on Quick Response Code and from dissolution system
CN107769918A (en) * 2017-09-07 2018-03-06 广东工业大学 A kind of more copy associated deletion methods of safe cloud data
CN107769918B (en) * 2017-09-07 2020-12-04 广东工业大学 Safe cloud data multi-copy association deletion method
CN109255245A (en) * 2018-08-13 2019-01-22 海南新软软件有限公司 A kind of local cryptographic key protection method, apparatus and system
CN110401533A (en) * 2019-08-27 2019-11-01 腾讯科技(深圳)有限公司 A kind of private key encryption method and device
CN110401533B (en) * 2019-08-27 2021-07-27 腾讯科技(深圳)有限公司 Private key encryption method and device
CN113411186A (en) * 2021-08-19 2021-09-17 北京电信易通信息技术股份有限公司 Video conference data security sharing method

Similar Documents

Publication Publication Date Title
CN102821098A (en) System and method for self-dissolving instant messaging under cloud environment
Awan et al. Secure framework enhancing AES algorithm in cloud computing
US9985782B2 (en) Network bound decryption with offline encryption
US10951595B2 (en) Method, system and apparatus for storing website private key plaintext
Yang et al. Provable data possession of resource-constrained mobile devices in cloud computing
CN103138939B (en) Based on the key access times management method of credible platform module under cloud memory module
JP2020528224A (en) Secure execution of smart contract operations in a reliable execution environment
CN107342861B (en) Data processing method, device and system
CN111245597A (en) Key management method, system and equipment
CN112926051A (en) Multi-party security computing method and device
US20220014367A1 (en) Decentralized computing systems and methods for performing actions using stored private data
CN112115461B (en) Equipment authentication method and device, computer equipment and storage medium
CN104618096A (en) Method and device for protecting secret key authorized data, and TPM (trusted platform module) secrete key management center
US20210067334A1 (en) System and Method for Cryptographic Key Fragments Management
Bhandari et al. A framework for data security and storage in Cloud Computing
US20220216999A1 (en) Blockchain system for supporting change of plain text data included in transaction
Agarkhed et al. An efficient auditing scheme for data storage security in cloud
CN106257859A (en) A kind of password using method
CN109120576A (en) Data sharing method and device, computer equipment and storage medium
CN104811421A (en) Secure communication method and secure communication device based on digital rights management
Jabbar et al. Design and implementation of hybrid EC-RSA security algorithm based on TPA for cloud storage
CN114615087B (en) Data sharing method, device, equipment and medium
CN114553557B (en) Key calling method, device, computer equipment and storage medium
CN112565156B (en) Information registration method, device and system
CN105426771A (en) Method for realizing security of big data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20121212