CN104052750B - A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation - Google Patents

A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation Download PDF

Info

Publication number
CN104052750B
CN104052750B CN201410286312.3A CN201410286312A CN104052750B CN 104052750 B CN104052750 B CN 104052750B CN 201410286312 A CN201410286312 A CN 201410286312A CN 104052750 B CN104052750 B CN 104052750B
Authority
CN
China
Prior art keywords
msup
mrow
outsourcing
mtr
mtd
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410286312.3A
Other languages
Chinese (zh)
Other versions
CN104052750A (en
Inventor
苏森
双锴
桂俪文
王皘
徐鹏
王玉龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201410286312.3A priority Critical patent/CN104052750B/en
Publication of CN104052750A publication Critical patent/CN104052750A/en
Application granted granted Critical
Publication of CN104052750B publication Critical patent/CN104052750B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation, category calculates outsourcing field.This method includes:(1) user terminal input calculating parameter;(2) parameter information is hidden by random generator matrix and affine transformation, the calculating parameter formed after encryption;(3) calculating parameter after the encryption is sent to outsourcing end;(4) outsourcing end receives the calculating parameter after the encryption of user terminal transmission, chooses solution musical instruments used in a Buddhist or Taoist mass and is calculated and result of calculation is returned into client;(5) user terminal receives the result of calculation that outsourcing end is returned;(6) decrypt the result of calculation and obtain optimal solution, complete to calculate.

Description

A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation
Technical field
The invention belongs to calculate outsourcing field, and in particular to one kind is based on hidden in affine transformation protection convex quadratic programming outsourcing Private method, ensures user privacy information safety in outsourcing calculating task.
Background technology
With the high speed development of public cloud platform technology, public cloud can provide the user computing capability and the storage of magnanimity Space, at the same its advanced virtualization technology and elastic calculation ability can effectively reduce user's construction cost and O&M into There is provided the operation mode of a set of perfect pay-for-use for this.Increasing user's selection is by the program of local runtime and deposits Information is stored up, from public cloud platform is locally transferred to, commercial cost is effectively reduced, is greatly improved user job efficiency.
But the main factor that is widely popularized of the public cloud platform of influence is safety problem, user is by the resource outsourcing of oneself Trustship loses the ability to supervise to oneself resource to a certain extent to after cloud platform.Due to the virtualization technology of cloud computing, User can not learn that its resource is operated in the specific physical machine of which platform, and which other users is also run in this physical machine Whether resource, the keeper of public cloud platform has the ability to carry out being directly viewable sensitive information of user etc..Just it is in order at these Misgivings, many users hold wait-and-see attitude for the use of public cloud platform, especially require higher use to privacy Family, may abandon the use to public cloud platform, and this can influence the popularization of public cloud platform to a certain extent.
Protection processing outsourcing calculation is not carried out, as shown in Figure 1.Traditional outsourcing, which is calculated, passes through strict control information The administration means such as route of transmission and confidentiality agreement, protect the safety of cleartext information, in the data transmission and without corresponding guarantor Close processing, this secret protection mode is not particularly suited for the emerging outsourcing calculating platform such as public cloud platform.
The content of the invention
It is an object of the invention to solve problem present in above-mentioned prior art there is provided one kind based on affine transformation protection The method of privacy in convex quadratic programming outsourcing, convex two are hidden by the use of random generation invertible matrix as supplementary mode there is provided one kind The mechanism of secondary planning privacy information, user is intended to Solve problems sensitive information hidingization simultaneously Preserving problems using this mechanism Canonical form is constant there is provided the effective solution for ensureing convex quadratic programming outsourcing calculating safety, simply realizes that user exists Sensitive information is hiding during outsourcing is calculated, so as to meet demand for security of user's low cost using outsourcing platforms such as cloud platforms.
The present invention is achieved by the following technical solutions:
A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation, including:
(1) user terminal input calculating parameter;
(2) parameter information is hidden by random generator matrix and affine transformation, the calculating parameter formed after encryption;
(3) calculating parameter after the encryption is sent to outsourcing end;
(4) outsourcing end receives the calculating parameter after the encryption of user terminal transmission, chooses solution musical instruments used in a Buddhist or Taoist mass and is calculated and will calculated As a result user terminal is returned;
(5) user terminal receives the result of calculation that outsourcing end is returned;
(6) decrypt the result of calculation and obtain optimal solution, complete to calculate.
The step (2) is realized using following formula:
Wherein, N, M are the matrix for hiding parameter information and generating at random, are the parts of key;Ф is step (1) calculating parameter that user terminal is inputted in, Ф=(Q, E, A, c, d, b), wherein A is m * n matrix, and E is k × n matrix, Q matrixes Symmetry square matrix is tieed up for n, c is vectorial for n × 1, b is that m × 1 is vectorial, d is that k × 1 is vectorial, is the parameter of convex quadratic programming problem;H is In affine transformation, random generation n dimension nonsingular square matrixes, r is the n dimensional vectors generated at random, according to upper in affine transformation The operational formula in face, after being encrypted calculating parameter (hide after new parameter) Ф k, Ф k=(Q ', E ', A ', c ', D ', b '), i.e., using braces formula just from user's input parameter encrypted after parameter.
Choose solution musical instruments used in a Buddhist or Taoist mass in the step (4) to refer to choose the solution musical instruments used in a Buddhist or Taoist mass for convex quadratic programming, solution musical instruments used in a Buddhist or Taoist mass is according to encryption Calculating parameter Ф k afterwards are calculated, and obtain result of calculation y.
What the step (6) was realized in:
By result of calculation y, by formula x=Hy-r, the result x after being decrypted completes to calculate.
Compared with prior art, the beneficial effects of the invention are as follows:
(1) this method has provided the user the solution that the convex quadratic programming outsourcing of perfect protection user privacy information is calculated Scheme, the implementation of the program only needs to carry out simple encryption and decryption pretreatment in user terminal, it is not necessary to the excessive local meter of consumption Calculate resource, it is ensured that be transferred to subcontractor calculating parameter without practical significance, and the result calculated is also without actual value, Need that after user terminal is decrypted final result could be obtained.Pass through treaty and faith mechanism progress privacy compared to original The mode of protection compares, and is more beneficial for the popularization of the emerging outsourcing platform such as public cloud platform.
(2) this method only adds the privacyization processing of encryption and decryption in user side, does not change convex quadratic programming and solves Canonical form, that is, change the algorithm solution musical instruments used in a Buddhist or Taoist mass of outsourcing calculating platform, implementation of the invention need not simultaneously be carried out Large-scale transformation, with good inheritance, the performance optimization that outsourcing platform only needs to concern solution musical instruments used in a Buddhist or Taoist mass is used without concern The cipher mode at family, this programme has good isolation.
Brief description of the drawings
Fig. 1 is the outsourcing scheme for not carrying out protecting processing.
Fig. 2 is the solution of the hiding privacy information of the present invention.
Fig. 3 is the step block diagram of the inventive method.
Embodiment
The present invention is described in further detail below in conjunction with the accompanying drawings:
Current user is complex the problem of due in reality when solving the problems, such as the scientific algorithms such as convex quadratic programming, advises Mould is generally larger, and the disposal ability beyond PC is, it is necessary to which the substantial amounts of fund of user's consumption builds computing cluster and needs special messenger It is responsible for the normal operation of maintained equipment, with the popularization of public cloud platform, the proposition of pay-for-use theory, outside scientific algorithm task Bag has a larger market potential, and the personal secrets of user are numerous one of the problem of need to solve.The present invention is become based on affine The guard method that the convex quadratic programming outsourcing changed is calculated provides for this safety protecting mechanism, by affine transformation by former problem Coordinate system be transformed into another domain, and coefficient information is hidden using the invertible matrix that generates at random, realizes outsourcing The crypticity of coefficient and result in calculating.
Convex quadratic programming outsourcing Solve problems of the invention based on affine transformation are by user by way of affine transformation A kind of hiding processing mode of sensitive privacy information.The mode that outsourcing calculates process problem is often the mark according to Solve problems Quasi- form is there is provided the solver interface of corresponding problem, and user only need to be by the parameter needed for process problem according on the form of regulation Service provider is transmitted to, calculating terminates rear service provider and result is returned into user.Affine transformation technical finesse convex quadratic programming problem When, the domain of definition and Value space of former problem can be mapped to new space, and the form of problem is held essentially constant, and is not required to The solver of service provider is made any change, the demand for calculating outsourcing can be used by having reached, outsourcing service is can guarantee that again The parameter that provider obtains has been, without any practical significance, to realize that the secrecy in parameter transmitting procedure with operation result is pacified Entirely.
The convex quadratic programming outsourcing calculation hidden based on affine transformation information, as shown in Fig. 2 user will be by that will need The problem of calculating, carries out the processing of sensitive information hidingization on local backstage, then is sent to outsourcing calculating service provider and is calculated, this The parameter that sample outsourcing service provider obtains has been the information without any practical significance, but can be directly general using its Solution musical instruments used in a Buddhist or Taoist mass program, obtained result of calculation is not final result of calculation, it is necessary to be transferred to the local progress of user terminal yet Parsing, obtains final result of calculation, it is ensured that processing of the privacy information of user beyond user terminal is all hiding.
Convex quadratic programming outsourcing Solve problems based on affine transformation are by way of affine transformation that user is sensitive A kind of hiding processing mode of privacy information.The mode that outsourcing calculates process problem is often the canonical form according to Solve problems Formula is there is provided the solver interface of corresponding problem, and the parameter needed for process problem need to be only uploaded to by user according to the form of regulation Service provider, calculating terminates rear service provider and result is returned into user.During affine transformation technical finesse convex quadratic programming problem, energy It is enough that the domain of definition and Value space of former problem are mapped to new space, and the form of problem is held essentially constant, it is not necessary to it is right The solver of service provider is made any change, and the demand for calculating outsourcing can be used by having reached, parameter transmitting procedure is can guarantee that again Neutralize the secret and safe of operation result.
In summary, when convex quadratic programming problem quantity is many or solves huge, a large amount of high property are generally required The equipment of energy, by the way that problem solving outsourcing can be reduced effectively into requirement of the user to local device performance, and passes through affine become The corresponding processing means such as change, user privacy information is hidden, the outsourcing services such as public cloud platform safe to use are allowed users to Platform.
First, system enciphering and deciphering algorithm is designed
General, quadratic programming can be described as the optimization problem of following canonical form:
min
s.t.Ax≤b
Ex=d
Wherein, A is m * n matrix, and E is k × n matrix, it is generally the case that A, E matrix are row full rank;X, c be n × 1 to Amount, b is that m × 1 is vectorial, and d is that k × 1 is vectorial.Object function f (x) Q matrixes are that n ties up symmetry square matrix, when Q is positive semidefinite matrix When, i.e. whole non-negative of matrix exgenvalue, f (x) is convex function, and optimization problem is convex quadratic programming;When Q is positive definite matrix, i.e., The all positive numbers of matrix exgenvalue, f (x) is strict convex function, and optimization problem is strict convex quadratic programming.
Affine transformation is the conversion mapped one by one, and convexity is constant under affine transformation, i.e., original function is convex function, after conversion Function still be convex function.In affine transformation, random generation n dimension nonsingular square matrix H, n dimensional vectors r so that:
So, the standard type of quadratic programming problem can be converted into
min
s.t.A(Hy-r)≤b
E (Hy-r)=d
Further arrange and obtain:
min
By generating invertible matrix at random, the coefficient information in constraints is hidden, the encryption shape come finally is sorted out Formula is as follows:
min
S.t.NEHy=N (d+Er)
(A-ME)Hy≤b-Md+(A-ME)r
IfThen former problem is converted into
min
S.t.E ' y=d '
A′y≤b′
In summary, key K is made up of H, M, N, r, i.e. and K=(H, M, N, r), Ф=(Q, E, A, c, d, b), Ф k= (Q ', E ', A ', c ', d ', b ').Because key is by randomly generating, security intensity is limited, so calculate give birth to every time again Into key, it is ensured that calculate safety.
During decryption, by the result calculated, by the inverse transformation of affine transformation, final optimal solution can be obtained:
2nd, system flow
The schematic flow sheet of the inventive method as shown in figure 3, including:
User terminal inputs calculating parameter;
Parameter information is hidden by random generator matrix and affine transformation:Formula more than, it is known that user is defeated The parameter entered is Ф, and the matrix generated at random is H, according to the operational formula of braces, the new parameter Ф k after being hidden.;
Calculating parameter after encryption is sent to outsourcing end;
Outsourcing end receives the calculating task of user terminal transmission, chooses solution musical instruments used in a Buddhist or Taoist mass and (chooses solution musical instruments used in a Buddhist or Taoist mass to refer to, choose and be directed to convex two Which kind of the solution musical instruments used in a Buddhist or Taoist mass of secondary planning, because its solutions comparison is ripe, chooses and determined by cloud platform service provider, is computing cost than larger Part, therefore contract out outside.Cloud service provider may have the solution musical instruments used in a Buddhist or Taoist mass for being largely directed to different problems, not just for convex secondary rule The problem of drawing.And the application only focuses on the secret protection of convex quadratic programming problem.As a result former problem is substituted into, sees whether meet condition, It can be made whether the result for original parameter.) calculate and by result return client (this solution musical instruments used in a Buddhist or Taoist mass be general solution musical instruments used in a Buddhist or Taoist mass, It is the service that subcontractor is provided, without being concerned about how to realize, need to only ensures data normally interaction.Server is acquired After parameter Ф k, calculating obtains result y, and returns to client);
User terminal receives the result of calculation that outsourcing end is returned;
Decryption result of calculation obtains optimal solution, completes to calculate:By the result of calculation y of return, by formula x=Hy-r, obtain Result x after to decryption, completes to calculate.
It is of the invention to propose to realize that convex quadratic programming is asked by way of affine transformation and random generation invertible matrix for the first time The secret protection solution solved in outsourcing platform is inscribed, overall encryption and decryption scheme is simple and easy to apply, in the situation of one-time pad Under, bring enough safety guarantee.
The present invention directly make use of the solution musical instruments used in a Buddhist or Taoist mass of public outsourcing platform, by the reasonable design to encryption and decryption in client, It ensure that the form of standard solution device is constant, it is ensured that public outsourcing platform (versatility of such as public cloud platform) versatility, favorably In the Rapid Popularization of the present invention
Above-mentioned technical proposal is one embodiment of the present invention, for those skilled in the art, at this On the basis of disclosure of the invention application process and principle, it is easy to make various types of improvement or deformation, this is not limited solely to Invent the method described by above-mentioned embodiment, therefore previously described mode is preferred, and and without limitation The meaning of property.

Claims (3)

1. a kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation, it is characterised in that:Methods described includes:
(1) user terminal input calculating parameter;
(2) parameter information is hidden by random generator matrix and affine transformation, the calculating parameter formed after encryption;
(3) calculating parameter after the encryption is sent to outsourcing end;
(4) outsourcing end receives the calculating parameter after the encryption of user terminal transmission, chooses solution musical instruments used in a Buddhist or Taoist mass and is calculated and by result of calculation Return to user terminal;
(5) user terminal receives the result of calculation that outsourcing end is returned;
(6) decrypt the result of calculation and obtain optimal solution, complete to calculate,
The step (2) is realized using following formula:
<mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <msup> <mi>Q</mi> <mo>&amp;prime;</mo> </msup> <mo>=</mo> <msup> <mi>H</mi> <mi>T</mi> </msup> <mi>Q</mi> <mi>H</mi> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msup> <mi>c</mi> <mo>&amp;prime;</mo> </msup> <mo>=</mo> <msup> <mrow> <mo>(</mo> <msup> <mi>c</mi> <mi>T</mi> </msup> <mi>H</mi> <mo>-</mo> <msup> <mi>r</mi> <mi>T</mi> </msup> <mi>Q</mi> <mi>H</mi> <mo>)</mo> </mrow> <mi>T</mi> </msup> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msup> <mi>E</mi> <mo>&amp;prime;</mo> </msup> <mo>=</mo> <mi>N</mi> <mi>E</mi> <mi>H</mi> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msup> <mi>d</mi> <mo>&amp;prime;</mo> </msup> <mo>=</mo> <mi>N</mi> <mrow> <mo>(</mo> <mi>d</mi> <mo>+</mo> <mi>E</mi> <mi>r</mi> <mo>)</mo> </mrow> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msup> <mi>A</mi> <mo>&amp;prime;</mo> </msup> <mo>=</mo> <mrow> <mo>(</mo> <mi>A</mi> <mo>-</mo> <mi>M</mi> <mi>E</mi> <mo>)</mo> </mrow> <mi>H</mi> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msup> <mi>b</mi> <mo>&amp;prime;</mo> </msup> <mo>=</mo> <mi>b</mi> <mo>-</mo> <mi>M</mi> <mi>d</mi> <mo>+</mo> <mrow> <mo>(</mo> <mi>A</mi> <mo>-</mo> <mi>M</mi> <mi>E</mi> <mo>)</mo> </mrow> <mi>r</mi> </mrow> </mtd> </mtr> </mtable> </mfenced>
Wherein, N, M are the matrix for hiding parameter information and generating at random, are the parts of key;During Φ is step (1) The calculating parameter of user terminal input, Φ=(Q, E, A, c, d, b), wherein A is m * n matrix, and E is k × n matrix, and Q matrixes are tieed up for n Symmetry square matrix, c is vectorial for n × 1, and b is that m × 1 is vectorial, and d is that k × 1 is vectorial;H is the random generation n Wei Feiqi in affine transformation Different square formation, r is the n dimensional vectors generated at random, according to operational formula above, after being hidden in affine transformation New parameter Φ k, Φ k=(Q ', E ', A ', c ', d ', b ').
2. the method according to claim 1 that privacy in convex quadratic programming outsourcing is protected based on affine transformation, its feature is existed In:Choose solution musical instruments used in a Buddhist or Taoist mass in the step (4) to refer to choose the solution musical instruments used in a Buddhist or Taoist mass for convex quadratic programming, solution musical instruments used in a Buddhist or Taoist mass is according to the meter after encryption Calculate parameter Φ k to be calculated, obtain result of calculation y.
3. the method according to claim 2 that privacy in convex quadratic programming outsourcing is protected based on affine transformation, its feature is existed In:What the step (6) was realized in:
By result of calculation y, by formula x=Hy-r, the result x after being decrypted completes to calculate.
CN201410286312.3A 2014-06-24 2014-06-24 A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation Active CN104052750B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410286312.3A CN104052750B (en) 2014-06-24 2014-06-24 A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410286312.3A CN104052750B (en) 2014-06-24 2014-06-24 A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation

Publications (2)

Publication Number Publication Date
CN104052750A CN104052750A (en) 2014-09-17
CN104052750B true CN104052750B (en) 2017-09-22

Family

ID=51505114

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410286312.3A Active CN104052750B (en) 2014-06-24 2014-06-24 A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation

Country Status (1)

Country Link
CN (1) CN104052750B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104731860B (en) * 2015-02-04 2017-11-14 北京邮电大学 The spatial key querying method of secret protection
US10387670B2 (en) * 2016-09-21 2019-08-20 International Business Machines Corporation Handling sensitive data in an application using external processing
US10171431B2 (en) 2016-09-21 2019-01-01 International Business Machines Corporation Secure message handling of an application across deployment locations
CN113271293A (en) * 2021-04-09 2021-08-17 上海大学 Verifiable constrained quadratic programming security outsourcing calculation method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6941463B1 (en) * 1998-05-14 2005-09-06 Purdue Research Foundation Secure computational outsourcing techniques
CN102314580A (en) * 2011-09-20 2012-01-11 西安交通大学 Vector and matrix operation-based calculation-supported encryption method
CN103684742A (en) * 2013-11-29 2014-03-26 西安交通大学 Circulant matrix transformation based and ciphertext computation supportive encryption method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6941463B1 (en) * 1998-05-14 2005-09-06 Purdue Research Foundation Secure computational outsourcing techniques
CN102314580A (en) * 2011-09-20 2012-01-11 西安交通大学 Vector and matrix operation-based calculation-supported encryption method
CN103684742A (en) * 2013-11-29 2014-03-26 西安交通大学 Circulant matrix transformation based and ciphertext computation supportive encryption method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"可验证安全外包矩阵计算及应用";胡杏,裴定一,等;《中国科学:信息科学》;20131231;第43卷(第7期);第845页第3行至倒数第12行 *

Also Published As

Publication number Publication date
CN104052750A (en) 2014-09-17

Similar Documents

Publication Publication Date Title
CN104486315B (en) A kind of revocable key outsourcing decryption method based on contents attribute
CN103618728B (en) A kind of encryption attribute method at more mechanism centers
CN104079574B (en) User privacy protection method based on attribute and homomorphism mixed encryption under cloud environment
CN103957109B (en) A kind of cloud data-privacy protects safe re-encryption method
CN107294697B (en) Symmetrical full homomorphic cryptography method based on plaintext similar matrix
CN111898145B (en) Neural network model training method, device, equipment and medium
CN103532701B (en) Encryption and decryption method for numeric type data
CN103401839B (en) A kind of many authorization center encryption method based on attribute protection
CN108418784A (en) A kind of distributed cross-domain authorization and access control method based on properties secret
CN106788980B (en) Safe encryption method in a kind of matrix multiplication sub-contract management towards cloud computing
CN104021157A (en) Method for keyword searchable encryption based on bilinear pairs in cloud storage
CN104468615A (en) Data sharing based file access and permission change control method
CN103618729A (en) Multi-mechanism hierarchical attribute-based encryption method applied to cloud storage
CN106375346A (en) Condition-based broadcast agent re-encryption data protection method for cloud environment
CN108111540A (en) The hierarchical access control system and method for data sharing are supported in a kind of cloud storage
CN105049430A (en) Ciphertext-policy attribute-based encryption method having efficient user revocation capability
CN104052750B (en) A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation
CN108111295A (en) A kind of homomorphic encryption algorithm based on similar modul
CN103684742A (en) Circulant matrix transformation based and ciphertext computation supportive encryption method
CN104135473A (en) A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption
CN112491529B (en) Data file encryption and integrity verification method and system used in untrusted server environment
CN106059765A (en) Digital virtual asset access control method based on attribute password under cloud environment
CN103916248A (en) Fully homomorphic encryption public key space compression method
CN105162573A (en) Attribute encryption method based on multi-linear mapping and achieving strategy of secret key revocation in an authority separating way
CN105721148A (en) Data file encryption method and system based on double random numbers

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant