CN104052750B - A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation - Google Patents
A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation Download PDFInfo
- Publication number
- CN104052750B CN104052750B CN201410286312.3A CN201410286312A CN104052750B CN 104052750 B CN104052750 B CN 104052750B CN 201410286312 A CN201410286312 A CN 201410286312A CN 104052750 B CN104052750 B CN 104052750B
- Authority
- CN
- China
- Prior art keywords
- msup
- mrow
- outsourcing
- mtr
- mtd
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation, category calculates outsourcing field.This method includes:(1) user terminal input calculating parameter;(2) parameter information is hidden by random generator matrix and affine transformation, the calculating parameter formed after encryption;(3) calculating parameter after the encryption is sent to outsourcing end;(4) outsourcing end receives the calculating parameter after the encryption of user terminal transmission, chooses solution musical instruments used in a Buddhist or Taoist mass and is calculated and result of calculation is returned into client;(5) user terminal receives the result of calculation that outsourcing end is returned;(6) decrypt the result of calculation and obtain optimal solution, complete to calculate.
Description
Technical field
The invention belongs to calculate outsourcing field, and in particular to one kind is based on hidden in affine transformation protection convex quadratic programming outsourcing
Private method, ensures user privacy information safety in outsourcing calculating task.
Background technology
With the high speed development of public cloud platform technology, public cloud can provide the user computing capability and the storage of magnanimity
Space, at the same its advanced virtualization technology and elastic calculation ability can effectively reduce user's construction cost and O&M into
There is provided the operation mode of a set of perfect pay-for-use for this.Increasing user's selection is by the program of local runtime and deposits
Information is stored up, from public cloud platform is locally transferred to, commercial cost is effectively reduced, is greatly improved user job efficiency.
But the main factor that is widely popularized of the public cloud platform of influence is safety problem, user is by the resource outsourcing of oneself
Trustship loses the ability to supervise to oneself resource to a certain extent to after cloud platform.Due to the virtualization technology of cloud computing,
User can not learn that its resource is operated in the specific physical machine of which platform, and which other users is also run in this physical machine
Whether resource, the keeper of public cloud platform has the ability to carry out being directly viewable sensitive information of user etc..Just it is in order at these
Misgivings, many users hold wait-and-see attitude for the use of public cloud platform, especially require higher use to privacy
Family, may abandon the use to public cloud platform, and this can influence the popularization of public cloud platform to a certain extent.
Protection processing outsourcing calculation is not carried out, as shown in Figure 1.Traditional outsourcing, which is calculated, passes through strict control information
The administration means such as route of transmission and confidentiality agreement, protect the safety of cleartext information, in the data transmission and without corresponding guarantor
Close processing, this secret protection mode is not particularly suited for the emerging outsourcing calculating platform such as public cloud platform.
The content of the invention
It is an object of the invention to solve problem present in above-mentioned prior art there is provided one kind based on affine transformation protection
The method of privacy in convex quadratic programming outsourcing, convex two are hidden by the use of random generation invertible matrix as supplementary mode there is provided one kind
The mechanism of secondary planning privacy information, user is intended to Solve problems sensitive information hidingization simultaneously Preserving problems using this mechanism
Canonical form is constant there is provided the effective solution for ensureing convex quadratic programming outsourcing calculating safety, simply realizes that user exists
Sensitive information is hiding during outsourcing is calculated, so as to meet demand for security of user's low cost using outsourcing platforms such as cloud platforms.
The present invention is achieved by the following technical solutions:
A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation, including:
(1) user terminal input calculating parameter;
(2) parameter information is hidden by random generator matrix and affine transformation, the calculating parameter formed after encryption;
(3) calculating parameter after the encryption is sent to outsourcing end;
(4) outsourcing end receives the calculating parameter after the encryption of user terminal transmission, chooses solution musical instruments used in a Buddhist or Taoist mass and is calculated and will calculated
As a result user terminal is returned;
(5) user terminal receives the result of calculation that outsourcing end is returned;
(6) decrypt the result of calculation and obtain optimal solution, complete to calculate.
The step (2) is realized using following formula:
Wherein, N, M are the matrix for hiding parameter information and generating at random, are the parts of key;Ф is step
(1) calculating parameter that user terminal is inputted in, Ф=(Q, E, A, c, d, b), wherein A is m * n matrix, and E is k × n matrix, Q matrixes
Symmetry square matrix is tieed up for n, c is vectorial for n × 1, b is that m × 1 is vectorial, d is that k × 1 is vectorial, is the parameter of convex quadratic programming problem;H is
In affine transformation, random generation n dimension nonsingular square matrixes, r is the n dimensional vectors generated at random, according to upper in affine transformation
The operational formula in face, after being encrypted calculating parameter (hide after new parameter) Ф k, Ф k=(Q ', E ', A ', c ',
D ', b '), i.e., using braces formula just from user's input parameter encrypted after parameter.
Choose solution musical instruments used in a Buddhist or Taoist mass in the step (4) to refer to choose the solution musical instruments used in a Buddhist or Taoist mass for convex quadratic programming, solution musical instruments used in a Buddhist or Taoist mass is according to encryption
Calculating parameter Ф k afterwards are calculated, and obtain result of calculation y.
What the step (6) was realized in:
By result of calculation y, by formula x=Hy-r, the result x after being decrypted completes to calculate.
Compared with prior art, the beneficial effects of the invention are as follows:
(1) this method has provided the user the solution that the convex quadratic programming outsourcing of perfect protection user privacy information is calculated
Scheme, the implementation of the program only needs to carry out simple encryption and decryption pretreatment in user terminal, it is not necessary to the excessive local meter of consumption
Calculate resource, it is ensured that be transferred to subcontractor calculating parameter without practical significance, and the result calculated is also without actual value,
Need that after user terminal is decrypted final result could be obtained.Pass through treaty and faith mechanism progress privacy compared to original
The mode of protection compares, and is more beneficial for the popularization of the emerging outsourcing platform such as public cloud platform.
(2) this method only adds the privacyization processing of encryption and decryption in user side, does not change convex quadratic programming and solves
Canonical form, that is, change the algorithm solution musical instruments used in a Buddhist or Taoist mass of outsourcing calculating platform, implementation of the invention need not simultaneously be carried out
Large-scale transformation, with good inheritance, the performance optimization that outsourcing platform only needs to concern solution musical instruments used in a Buddhist or Taoist mass is used without concern
The cipher mode at family, this programme has good isolation.
Brief description of the drawings
Fig. 1 is the outsourcing scheme for not carrying out protecting processing.
Fig. 2 is the solution of the hiding privacy information of the present invention.
Fig. 3 is the step block diagram of the inventive method.
Embodiment
The present invention is described in further detail below in conjunction with the accompanying drawings:
Current user is complex the problem of due in reality when solving the problems, such as the scientific algorithms such as convex quadratic programming, advises
Mould is generally larger, and the disposal ability beyond PC is, it is necessary to which the substantial amounts of fund of user's consumption builds computing cluster and needs special messenger
It is responsible for the normal operation of maintained equipment, with the popularization of public cloud platform, the proposition of pay-for-use theory, outside scientific algorithm task
Bag has a larger market potential, and the personal secrets of user are numerous one of the problem of need to solve.The present invention is become based on affine
The guard method that the convex quadratic programming outsourcing changed is calculated provides for this safety protecting mechanism, by affine transformation by former problem
Coordinate system be transformed into another domain, and coefficient information is hidden using the invertible matrix that generates at random, realizes outsourcing
The crypticity of coefficient and result in calculating.
Convex quadratic programming outsourcing Solve problems of the invention based on affine transformation are by user by way of affine transformation
A kind of hiding processing mode of sensitive privacy information.The mode that outsourcing calculates process problem is often the mark according to Solve problems
Quasi- form is there is provided the solver interface of corresponding problem, and user only need to be by the parameter needed for process problem according on the form of regulation
Service provider is transmitted to, calculating terminates rear service provider and result is returned into user.Affine transformation technical finesse convex quadratic programming problem
When, the domain of definition and Value space of former problem can be mapped to new space, and the form of problem is held essentially constant, and is not required to
The solver of service provider is made any change, the demand for calculating outsourcing can be used by having reached, outsourcing service is can guarantee that again
The parameter that provider obtains has been, without any practical significance, to realize that the secrecy in parameter transmitting procedure with operation result is pacified
Entirely.
The convex quadratic programming outsourcing calculation hidden based on affine transformation information, as shown in Fig. 2 user will be by that will need
The problem of calculating, carries out the processing of sensitive information hidingization on local backstage, then is sent to outsourcing calculating service provider and is calculated, this
The parameter that sample outsourcing service provider obtains has been the information without any practical significance, but can be directly general using its
Solution musical instruments used in a Buddhist or Taoist mass program, obtained result of calculation is not final result of calculation, it is necessary to be transferred to the local progress of user terminal yet
Parsing, obtains final result of calculation, it is ensured that processing of the privacy information of user beyond user terminal is all hiding.
Convex quadratic programming outsourcing Solve problems based on affine transformation are by way of affine transformation that user is sensitive
A kind of hiding processing mode of privacy information.The mode that outsourcing calculates process problem is often the canonical form according to Solve problems
Formula is there is provided the solver interface of corresponding problem, and the parameter needed for process problem need to be only uploaded to by user according to the form of regulation
Service provider, calculating terminates rear service provider and result is returned into user.During affine transformation technical finesse convex quadratic programming problem, energy
It is enough that the domain of definition and Value space of former problem are mapped to new space, and the form of problem is held essentially constant, it is not necessary to it is right
The solver of service provider is made any change, and the demand for calculating outsourcing can be used by having reached, parameter transmitting procedure is can guarantee that again
Neutralize the secret and safe of operation result.
In summary, when convex quadratic programming problem quantity is many or solves huge, a large amount of high property are generally required
The equipment of energy, by the way that problem solving outsourcing can be reduced effectively into requirement of the user to local device performance, and passes through affine become
The corresponding processing means such as change, user privacy information is hidden, the outsourcing services such as public cloud platform safe to use are allowed users to
Platform.
First, system enciphering and deciphering algorithm is designed
General, quadratic programming can be described as the optimization problem of following canonical form:
min
s.t.Ax≤b
Ex=d
Wherein, A is m * n matrix, and E is k × n matrix, it is generally the case that A, E matrix are row full rank;X, c be n × 1 to
Amount, b is that m × 1 is vectorial, and d is that k × 1 is vectorial.Object function f (x) Q matrixes are that n ties up symmetry square matrix, when Q is positive semidefinite matrix
When, i.e. whole non-negative of matrix exgenvalue, f (x) is convex function, and optimization problem is convex quadratic programming;When Q is positive definite matrix, i.e.,
The all positive numbers of matrix exgenvalue, f (x) is strict convex function, and optimization problem is strict convex quadratic programming.
Affine transformation is the conversion mapped one by one, and convexity is constant under affine transformation, i.e., original function is convex function, after conversion
Function still be convex function.In affine transformation, random generation n dimension nonsingular square matrix H, n dimensional vectors r so that:
So, the standard type of quadratic programming problem can be converted into
min
s.t.A(Hy-r)≤b
E (Hy-r)=d
Further arrange and obtain:
min
By generating invertible matrix at random, the coefficient information in constraints is hidden, the encryption shape come finally is sorted out
Formula is as follows:
min
S.t.NEHy=N (d+Er)
(A-ME)Hy≤b-Md+(A-ME)r
IfThen former problem is converted into
min
S.t.E ' y=d '
A′y≤b′
In summary, key K is made up of H, M, N, r, i.e. and K=(H, M, N, r), Ф=(Q, E, A, c, d, b), Ф k=
(Q ', E ', A ', c ', d ', b ').Because key is by randomly generating, security intensity is limited, so calculate give birth to every time again
Into key, it is ensured that calculate safety.
During decryption, by the result calculated, by the inverse transformation of affine transformation, final optimal solution can be obtained:
2nd, system flow
The schematic flow sheet of the inventive method as shown in figure 3, including:
User terminal inputs calculating parameter;
Parameter information is hidden by random generator matrix and affine transformation:Formula more than, it is known that user is defeated
The parameter entered is Ф, and the matrix generated at random is H, according to the operational formula of braces, the new parameter Ф k after being hidden.;
Calculating parameter after encryption is sent to outsourcing end;
Outsourcing end receives the calculating task of user terminal transmission, chooses solution musical instruments used in a Buddhist or Taoist mass and (chooses solution musical instruments used in a Buddhist or Taoist mass to refer to, choose and be directed to convex two
Which kind of the solution musical instruments used in a Buddhist or Taoist mass of secondary planning, because its solutions comparison is ripe, chooses and determined by cloud platform service provider, is computing cost than larger
Part, therefore contract out outside.Cloud service provider may have the solution musical instruments used in a Buddhist or Taoist mass for being largely directed to different problems, not just for convex secondary rule
The problem of drawing.And the application only focuses on the secret protection of convex quadratic programming problem.As a result former problem is substituted into, sees whether meet condition,
It can be made whether the result for original parameter.) calculate and by result return client (this solution musical instruments used in a Buddhist or Taoist mass be general solution musical instruments used in a Buddhist or Taoist mass,
It is the service that subcontractor is provided, without being concerned about how to realize, need to only ensures data normally interaction.Server is acquired
After parameter Ф k, calculating obtains result y, and returns to client);
User terminal receives the result of calculation that outsourcing end is returned;
Decryption result of calculation obtains optimal solution, completes to calculate:By the result of calculation y of return, by formula x=Hy-r, obtain
Result x after to decryption, completes to calculate.
It is of the invention to propose to realize that convex quadratic programming is asked by way of affine transformation and random generation invertible matrix for the first time
The secret protection solution solved in outsourcing platform is inscribed, overall encryption and decryption scheme is simple and easy to apply, in the situation of one-time pad
Under, bring enough safety guarantee.
The present invention directly make use of the solution musical instruments used in a Buddhist or Taoist mass of public outsourcing platform, by the reasonable design to encryption and decryption in client,
It ensure that the form of standard solution device is constant, it is ensured that public outsourcing platform (versatility of such as public cloud platform) versatility, favorably
In the Rapid Popularization of the present invention
Above-mentioned technical proposal is one embodiment of the present invention, for those skilled in the art, at this
On the basis of disclosure of the invention application process and principle, it is easy to make various types of improvement or deformation, this is not limited solely to
Invent the method described by above-mentioned embodiment, therefore previously described mode is preferred, and and without limitation
The meaning of property.
Claims (3)
1. a kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation, it is characterised in that:Methods described includes:
(1) user terminal input calculating parameter;
(2) parameter information is hidden by random generator matrix and affine transformation, the calculating parameter formed after encryption;
(3) calculating parameter after the encryption is sent to outsourcing end;
(4) outsourcing end receives the calculating parameter after the encryption of user terminal transmission, chooses solution musical instruments used in a Buddhist or Taoist mass and is calculated and by result of calculation
Return to user terminal;
(5) user terminal receives the result of calculation that outsourcing end is returned;
(6) decrypt the result of calculation and obtain optimal solution, complete to calculate,
The step (2) is realized using following formula:
<mfenced open = "{" close = "">
<mtable>
<mtr>
<mtd>
<mrow>
<msup>
<mi>Q</mi>
<mo>&prime;</mo>
</msup>
<mo>=</mo>
<msup>
<mi>H</mi>
<mi>T</mi>
</msup>
<mi>Q</mi>
<mi>H</mi>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msup>
<mi>c</mi>
<mo>&prime;</mo>
</msup>
<mo>=</mo>
<msup>
<mrow>
<mo>(</mo>
<msup>
<mi>c</mi>
<mi>T</mi>
</msup>
<mi>H</mi>
<mo>-</mo>
<msup>
<mi>r</mi>
<mi>T</mi>
</msup>
<mi>Q</mi>
<mi>H</mi>
<mo>)</mo>
</mrow>
<mi>T</mi>
</msup>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msup>
<mi>E</mi>
<mo>&prime;</mo>
</msup>
<mo>=</mo>
<mi>N</mi>
<mi>E</mi>
<mi>H</mi>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msup>
<mi>d</mi>
<mo>&prime;</mo>
</msup>
<mo>=</mo>
<mi>N</mi>
<mrow>
<mo>(</mo>
<mi>d</mi>
<mo>+</mo>
<mi>E</mi>
<mi>r</mi>
<mo>)</mo>
</mrow>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msup>
<mi>A</mi>
<mo>&prime;</mo>
</msup>
<mo>=</mo>
<mrow>
<mo>(</mo>
<mi>A</mi>
<mo>-</mo>
<mi>M</mi>
<mi>E</mi>
<mo>)</mo>
</mrow>
<mi>H</mi>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msup>
<mi>b</mi>
<mo>&prime;</mo>
</msup>
<mo>=</mo>
<mi>b</mi>
<mo>-</mo>
<mi>M</mi>
<mi>d</mi>
<mo>+</mo>
<mrow>
<mo>(</mo>
<mi>A</mi>
<mo>-</mo>
<mi>M</mi>
<mi>E</mi>
<mo>)</mo>
</mrow>
<mi>r</mi>
</mrow>
</mtd>
</mtr>
</mtable>
</mfenced>
Wherein, N, M are the matrix for hiding parameter information and generating at random, are the parts of key;During Φ is step (1)
The calculating parameter of user terminal input, Φ=(Q, E, A, c, d, b), wherein A is m * n matrix, and E is k × n matrix, and Q matrixes are tieed up for n
Symmetry square matrix, c is vectorial for n × 1, and b is that m × 1 is vectorial, and d is that k × 1 is vectorial;H is the random generation n Wei Feiqi in affine transformation
Different square formation, r is the n dimensional vectors generated at random, according to operational formula above, after being hidden in affine transformation
New parameter Φ k, Φ k=(Q ', E ', A ', c ', d ', b ').
2. the method according to claim 1 that privacy in convex quadratic programming outsourcing is protected based on affine transformation, its feature is existed
In:Choose solution musical instruments used in a Buddhist or Taoist mass in the step (4) to refer to choose the solution musical instruments used in a Buddhist or Taoist mass for convex quadratic programming, solution musical instruments used in a Buddhist or Taoist mass is according to the meter after encryption
Calculate parameter Φ k to be calculated, obtain result of calculation y.
3. the method according to claim 2 that privacy in convex quadratic programming outsourcing is protected based on affine transformation, its feature is existed
In:What the step (6) was realized in:
By result of calculation y, by formula x=Hy-r, the result x after being decrypted completes to calculate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410286312.3A CN104052750B (en) | 2014-06-24 | 2014-06-24 | A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410286312.3A CN104052750B (en) | 2014-06-24 | 2014-06-24 | A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104052750A CN104052750A (en) | 2014-09-17 |
CN104052750B true CN104052750B (en) | 2017-09-22 |
Family
ID=51505114
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410286312.3A Active CN104052750B (en) | 2014-06-24 | 2014-06-24 | A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104052750B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104731860B (en) * | 2015-02-04 | 2017-11-14 | 北京邮电大学 | The spatial key querying method of secret protection |
US10387670B2 (en) * | 2016-09-21 | 2019-08-20 | International Business Machines Corporation | Handling sensitive data in an application using external processing |
US10171431B2 (en) | 2016-09-21 | 2019-01-01 | International Business Machines Corporation | Secure message handling of an application across deployment locations |
CN113271293A (en) * | 2021-04-09 | 2021-08-17 | 上海大学 | Verifiable constrained quadratic programming security outsourcing calculation method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6941463B1 (en) * | 1998-05-14 | 2005-09-06 | Purdue Research Foundation | Secure computational outsourcing techniques |
CN102314580A (en) * | 2011-09-20 | 2012-01-11 | 西安交通大学 | Vector and matrix operation-based calculation-supported encryption method |
CN103684742A (en) * | 2013-11-29 | 2014-03-26 | 西安交通大学 | Circulant matrix transformation based and ciphertext computation supportive encryption method |
-
2014
- 2014-06-24 CN CN201410286312.3A patent/CN104052750B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6941463B1 (en) * | 1998-05-14 | 2005-09-06 | Purdue Research Foundation | Secure computational outsourcing techniques |
CN102314580A (en) * | 2011-09-20 | 2012-01-11 | 西安交通大学 | Vector and matrix operation-based calculation-supported encryption method |
CN103684742A (en) * | 2013-11-29 | 2014-03-26 | 西安交通大学 | Circulant matrix transformation based and ciphertext computation supportive encryption method |
Non-Patent Citations (1)
Title |
---|
"可验证安全外包矩阵计算及应用";胡杏,裴定一,等;《中国科学:信息科学》;20131231;第43卷(第7期);第845页第3行至倒数第12行 * |
Also Published As
Publication number | Publication date |
---|---|
CN104052750A (en) | 2014-09-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104486315B (en) | A kind of revocable key outsourcing decryption method based on contents attribute | |
CN103618728B (en) | A kind of encryption attribute method at more mechanism centers | |
CN104079574B (en) | User privacy protection method based on attribute and homomorphism mixed encryption under cloud environment | |
CN103957109B (en) | A kind of cloud data-privacy protects safe re-encryption method | |
CN107294697B (en) | Symmetrical full homomorphic cryptography method based on plaintext similar matrix | |
CN111898145B (en) | Neural network model training method, device, equipment and medium | |
CN103532701B (en) | Encryption and decryption method for numeric type data | |
CN103401839B (en) | A kind of many authorization center encryption method based on attribute protection | |
CN108418784A (en) | A kind of distributed cross-domain authorization and access control method based on properties secret | |
CN106788980B (en) | Safe encryption method in a kind of matrix multiplication sub-contract management towards cloud computing | |
CN104021157A (en) | Method for keyword searchable encryption based on bilinear pairs in cloud storage | |
CN104468615A (en) | Data sharing based file access and permission change control method | |
CN103618729A (en) | Multi-mechanism hierarchical attribute-based encryption method applied to cloud storage | |
CN106375346A (en) | Condition-based broadcast agent re-encryption data protection method for cloud environment | |
CN108111540A (en) | The hierarchical access control system and method for data sharing are supported in a kind of cloud storage | |
CN105049430A (en) | Ciphertext-policy attribute-based encryption method having efficient user revocation capability | |
CN104052750B (en) | A kind of method that privacy in convex quadratic programming outsourcing is protected based on affine transformation | |
CN108111295A (en) | A kind of homomorphic encryption algorithm based on similar modul | |
CN103684742A (en) | Circulant matrix transformation based and ciphertext computation supportive encryption method | |
CN104135473A (en) | A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption | |
CN112491529B (en) | Data file encryption and integrity verification method and system used in untrusted server environment | |
CN106059765A (en) | Digital virtual asset access control method based on attribute password under cloud environment | |
CN103916248A (en) | Fully homomorphic encryption public key space compression method | |
CN105162573A (en) | Attribute encryption method based on multi-linear mapping and achieving strategy of secret key revocation in an authority separating way | |
CN105721148A (en) | Data file encryption method and system based on double random numbers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |