CN105956492B - A kind of file storage encryption method and device - Google Patents
A kind of file storage encryption method and device Download PDFInfo
- Publication number
- CN105956492B CN105956492B CN201610465692.6A CN201610465692A CN105956492B CN 105956492 B CN105956492 B CN 105956492B CN 201610465692 A CN201610465692 A CN 201610465692A CN 105956492 B CN105956492 B CN 105956492B
- Authority
- CN
- China
- Prior art keywords
- bit
- bits
- new
- binary
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 230000011218 segmentation Effects 0.000 claims abstract description 13
- 229910002056 binary alloy Inorganic materials 0.000 claims description 21
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 239000002131 composite material Substances 0.000 claims description 3
- 230000002441 reversible effect Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 4
- 238000007726 management method Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of file storage encryption method and devices, this method comprises: file is converted to binary data by way of io data flow;The binary data is split according to 8, if the binary data cannot be divided into 8 bits of integer, multiple 8 bits and a mantissa are obtained after segmentation;The mantissa is the last one inadequate 8 binary number, radix subject to the last one 8 bit in the multiple 8 bit;By the multiple 8 bit since first 8 bit, same or position is carried out according to Fibonacci sequence rule from the front to the back and is calculated, obtain multiple 8 new bits;It combines the 8 new bits in order, and connects the upper quasi- cardinal sum mantissa, form new binary data.This method realizes the safety for improving data.
Description
Technical field
The present invention relates to data storage security technical fields, store encryption method and device more particularly to a kind of file.
Background technique
Cloud data center manages platform at present, is substantially network operating system, is a kind of virtual based on browser
Operating system manages a large amount of cloud resource and file under cloud operating system, and these resources are eventually deposited in the form of data
On Cloud Server, when use, is read out by network for storage, reduces the size of cloud platform itself, especially stock number
When bigger, and the encryption of these files, data is just particularly important.The encryption used in the prior art for file storage
Mode is the reversible storage encryption of tradition, and the reversible storage encryption of tradition is generally divided into two ways: exclusive or encryption or displacement
Encryption, both modes are easily cracked, and cause the safety of data lower.Pacify in computers such as current internet, cloud computings
For full field, needs to improve and develop, do not stop the Internet era updated with reply technology, to make the number being stored on cloud
According to more safe and reliable.
Summary of the invention
The object of the present invention is to provide a kind of file storage encryption method and devices, to realize the safety for improving data.
In order to solve the above technical problems, the present invention provides a kind of file storage encryption method, this method comprises:
File is converted into binary data by way of io data flow;
The binary data is split according to 8, if the binary data cannot be divided into integer 8 two
System number obtains multiple 8 bits and a mantissa after segmentation;The mantissa is the last one inadequate 8 binary system
It counts, radix subject to the last one 8 bit in the multiple 8 bit;
By the multiple 8 bit since first 8 bit, from the front to the back according to Fibonacci sequence
Rule carries out same or position and calculates, and obtains multiple 8 new bits;
Combine the 8 new bits in order, and connect the upper quasi- cardinal sum mantissa, formed new two into
Data processed.
Preferably, the method also includes: using the new binary data as encrypted data, be stored in database
In.
Preferably, the formula that the same or position calculates are as follows: a ⊙ b=ab+a'b', a' are non-a, and b' is non-b, and ⊙ is expression
It carries out same or position and calculates symbol, a and b are two binary numbers that carry out same or position and calculate.
Preferably, it is described by the multiple 8 bit since first 8 bit, from the front to the back according to
Fibonacci sequence rule carries out same or position and calculates, and obtains multiple 8 new bits, comprising:
By the multiple 8 bit since first 8 bit, to every two adjacent 8 binary systems
Number carries out same or position and calculates, and obtains multiple 8 new bits.
The present invention also provides a kind of files to store encryption device, which includes:
Conversion module, for file to be converted to binary data by way of io data flow;
Divide module, for being split to the binary data according to 8, if the binary data cannot be divided
At 8 bits of integer, multiple 8 bits and a mantissa are obtained after segmentation;The mantissa be the last one not
8 binary systems are reached, radix subject to the last one 8 bit in the multiple 8 bit;
Computing module, for since first 8 bit, pressing the multiple 8 bit from the front to the back
Same or position is carried out according to Fibonacci sequence rule to calculate, and obtains multiple 8 new bits;
Composite module for combining the 8 new bits in order, and connects the upper quasi- cardinal sum tail
Number, forms new binary data.
Preferably, described device further include:
Memory module, for being stored in database using the new binary data as encrypted data.
Preferably, the formula that the same or position calculates are as follows: a ⊙ b=ab+a'b', a' are non-a, and b' is non-b, and ⊙ is expression
It carries out same or position and calculates symbol, a and b are two binary numbers that carry out same or position and calculate.
Preferably, the computing module, for it is described by the multiple 8 bit from first 8 bit
Start, carry out same or position according to Fibonacci sequence rule from the front to the back and calculate, obtains multiple 8 new bits, comprising:
The computing module, for by the multiple 8 bit since first 8 bit, to every phase
Two adjacent 8 bits carry out same or position and calculate, and obtain multiple 8 new bits.
A kind of file storage encryption method provided by the present invention and device, file is converted by way of io data flow
For binary data;The binary data is split according to 8, if the binary data cannot be divided into integer
8 bits obtain multiple 8 bits and a mantissa after segmentation;The mantissa be the last one inadequate 8 two
System number, radix subject to the last one 8 bit in the multiple 8 bit;By the multiple 8 bit
Since first 8 bit, same or position is carried out according to Fibonacci sequence rule from the front to the back and is calculated, obtain multiple new
8 bits;It combines the 8 new bits in order, and connects the upper quasi- cardinal sum mantissa, formed new
Binary data.As it can be seen that in file storing process, translates the file into as binary data, binary data is divided
It cuts, 8 bits after segmentation is calculated using Fibonacci sequence rule and same or position, calculated result is combined, and
Shang Zhun cardinal sum mantissa is connected, finally obtains new binary data, as encrypted data form new binary data
Whole process be exactly the process encrypted, due to avoiding calculating using traditional exclusive or, using Fibonacci sequence rule
It is calculated with same or position, the safety that this mode encrypts is very high, and the new binary data safety finally obtained is very high, reaches
Safer reversible encryption operation, so the present invention realizes the safety for improving data.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is the flow chart that a kind of file provided by the present invention stores encryption method;
Fig. 2 is ciphering process schematic diagram;
Fig. 3 is the structural schematic diagram that a kind of file provided by the present invention stores encryption device.
Specific embodiment
Core of the invention is to provide a kind of file storage encryption method and device, to realize the safety for improving data.
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Referring to FIG. 1, Fig. 1 is the flow chart that a kind of file provided by the present invention stores encryption method, this method comprises:
S11: file is converted into binary data by way of io data flow;
S12: being split binary data according to 8, if binary data cannot be divided into 8 binary systems of integer
Number, obtains multiple 8 bits and a mantissa after segmentation;
Wherein, mantissa is the last one inadequate 8 binary number, in multiple 8 bits the last one 8 two into
Radix subject to number processed;
S13: by multiple 8 bits since first 8 bit, from the front to the back according to Fibonacci sequence
Rule carries out same or position and calculates, and obtains multiple 8 new bits;
S14: combining 8 new bits in order, and connects Shang Zhun cardinal sum mantissa, forms new binary number
According to.
As it can be seen that this method divides binary data in file storing process, translating the file into as binary data
It cuts, 8 bits after segmentation is calculated using Fibonacci sequence rule and same or position, calculated result is combined, and
Shang Zhun cardinal sum mantissa is connected, finally obtains new binary data, as encrypted data form new binary data
Whole process be exactly the process encrypted, due to avoiding calculating using traditional exclusive or, using Fibonacci sequence rule
It is calculated with same or position, the safety that this mode encrypts is very high, and the new binary data safety finally obtained is very high, reaches
Safer reversible encryption operation, realizes the safety for improving data in this way.
Based on the above method, further, the method also includes: using new binary data as encrypted number
According in deposit database.
Wherein, the formula that same or position calculates are as follows: a ⊙ b=ab+a'b', a' are non-a, and b' is non-b, and ⊙ carries out same for expression
Or position calculates symbol, a and b are two binary numbers that carry out same or position and calculate.
Further, the process of step S13 specifically: open multiple 8 bits from first 8 bit
Begin, same or position is carried out to every two adjacent 8 bits and is calculated, obtains multiple 8 new bits.Specifically,
By first 8 binary system and second 8 binary system carry out with or position the one 8 new bit is calculated, by the
8 binary systems of two 8 binary systems and third carry out same or position and the 2nd 8 new bit are calculated, by third 8
Position binary system and the 4th 8 binary system carry out same or position and the 3rd 8 new bit are calculated, and successively recursion, obtains
Multiple 8 new bits.
The above method can be used for entire cloud management platform, stores to file and carries out reversible encryption, utilizes Fibonacci design method
It is calculated with same or position, Fibonacci design method is Fibonacci sequence rule.
It is detailed, it is based on the above method, specific embodiment is as follows:
1, file is converted to two-stage system by way of io flows, then binary system is split by 8, if cannot
It is divided into integer, the last one inadequate 8 referred to as mantissa, while penultimate is known as base value;If can be divided into
Just several, then the last one binary number is known as base value, and mantissa is not present, and secondary standard number is used to that use is decrypted;It can join
Fig. 2 is examined, Fig. 2 is ciphering process schematic diagram;
2, inclusive OR operation is carried out according to Fibonacci sequence rule, for example the first two binary numeral bit manipulation obtains the
One binary system obtains second binary number after second and the bit manipulation of third binary number, and so on, to can obtain
The ordered series of numbers new to one, it is not all 0 that inclusive OR operation, which is mutually all 1,;
3, new ordered series of numbers is combined the upper base value of connection in order and then mantissa, as encrypted data is stored in number
According to library, Information Security is promoted.
Wherein, file is converted into binary number, is divided with 8, successively presses inclusive OR position according to Fibonacci sequence rule
Operation.
Wherein, it carries out same or position according to Fibonacci sequence rule to calculate, i.e. F (0)=0, F (1)=1, F (n)=F (n-
1) ⊙ F (n-2) (n >=2, n ∈ N*), F (n) are ordered series of numbers, and the expression formula of F (n) is recurrence formula.It is from first 8 in this method
Bit number and second 8 bit number start recursion.
Wherein, based on or position calculate, specifically a ⊙ b=ab+a'b', wherein a' be non-a, b' be non-b, avoid using
Traditional exclusive or calculates, to reach relatively more safe reversible encryption operation.
Referring to FIG. 3, Fig. 3 is the structural schematic diagram that a kind of file provided by the present invention stores encryption device, the device
Include:
Conversion module 101, for file to be converted to binary data by way of io data flow;
Divide module 102, for being split to binary data according to 8, if binary data cannot be divided into it is whole
Several 8 bits obtain multiple 8 bits and a mantissa after segmentation;Mantissa be the last one inadequate 8 two
System, radix subject to the last one 8 bit in multiple 8 bits;
Computing module 103, for by multiple 8 bits since first 8 bit, from the front to the back according to
Fibonacci sequence rule carries out same or position and calculates, and obtains multiple 8 new bits;
Composite module 104 for combining 8 new bits in order, and connects Shang Zhun cardinal sum mantissa, is formed
New binary data.
As it can be seen that the device divides binary data in file storing process, translating the file into as binary data
It cuts, 8 bits after segmentation is calculated using Fibonacci sequence rule and same or position, calculated result is combined, and
Shang Zhun cardinal sum mantissa is connected, finally obtains new binary data, as encrypted data form new binary data
Whole process be exactly the process encrypted, due to avoiding calculating using traditional exclusive or, using Fibonacci sequence rule
It is calculated with same or position, the safety that this mode encrypts is very high, and the new binary data safety finally obtained is very high, reaches
Safer reversible encryption operation, so the device realizes the safety for improving data.
Based on above-mentioned apparatus, further, described device further include:
Memory module, for being stored in database using new binary data as encrypted data.
Above-mentioned apparatus can be used for entire cloud management platform.
Wherein, the formula that same or position calculates are as follows: a ⊙ b=ab+a'b', a' are non-a, and b' is non-b, and ⊙ carries out same for expression
Or position calculates symbol, a and b are two binary numbers that carry out same or position and calculate.
Further, computing module, specifically for by multiple 8 bits since first 8 bit, it is right
Same or position is carried out per two adjacent 8 bits to calculate, and obtains multiple 8 new bits.Specifically, by first
A 8 binary systems and second 8 binary system carry out same or position and the one 8 new bit are calculated, by second 8
Binary system and third 8 binary systems carry out with or position the 2nd 8 new bit is calculated, by third 8 two into
System and the 4th 8 binary system carry out same or position and the 3rd 8 new bit are calculated, successively recursion, obtain multiple new
8 bits.
To sum up, file, is passed through the shape of io data flow by a kind of file storage encryption method provided by the present invention and device
Formula is converted to binary data;Binary data is split according to 8, if binary data cannot be divided into integer 8
Bit obtains multiple 8 bits and a mantissa after segmentation;Mantissa is the last one inadequate 8 binary system
It counts, radix subject to the last one 8 bit in multiple 8 bits;By multiple 8 bits from first 8
Binary number starts, and carries out same or position according to Fibonacci sequence rule from the front to the back and calculates, and obtains multiple 8 new binary systems
Number;It combines 8 new bits in order, and connects Shang Zhun cardinal sum mantissa, form new binary data.As it can be seen that
To in file storing process, translating the file into as binary data, binary data is split, to 8 two after segmentation
System number is calculated using Fibonacci sequence rule and same or position, and calculated result is combined, and connects Shang Zhun cardinal sum mantissa,
New binary data is finally obtained, as encrypted data, the whole process for forming new binary data is exactly to encrypt
Process, due to avoiding calculating using traditional exclusive or, using Fibonacci sequence rule and with or position calculate, this side
The safety of formula encryption is very high, and the new binary data safety finally obtained is very high, reaches safer reversible encryption
Operation, so the present invention realizes the safety for improving data.
A kind of file storage encryption method provided by the present invention and device are described in detail above.It answers herein
With a specific example illustrates the principle and implementation of the invention, the explanation of above example is only intended to help to manage
Solve method and its core concept of the invention.It should be pointed out that for those skilled in the art, not departing from
, can be with several improvements and modifications are made to the present invention under the premise of the principle of the invention, these improvement and modification also fall into this hair
In bright scope of protection of the claims.
Claims (6)
1. a kind of file stores encryption method characterized by comprising
File is converted into binary data by way of io data flow;
The binary data is split according to 8, if the binary data cannot be divided into 8 binary systems of integer
Number, obtains multiple 8 bits and a mantissa after segmentation;The mantissa is the last one inadequate 8 binary number, institute
State in multiple 8 bits radix subject to the last one 8 bit;
By the multiple 8 bit since first 8 bit, from the front to the back according to Fibonacci sequence rule
It carries out same or position to calculate, obtains multiple 8 new bits;Wherein, the formula that the same or position calculates are as follows: a ⊙ b=ab+
A'b', a' are non-a, and b' is non-b, and ⊙ calculates symbol to indicate to carry out same or position, and a and b are two that carry out same or position and calculate
Binary number;The Fibonacci sequence rule is F (0)=0, F (1)=1, F (n)=F (n-1) ⊙ F (n-2) recursion rule
Rule, wherein F (n) is any one 8 bit in the multiple 8 bit, n >=2, n ∈ N*;
Combine the multiple 8 new bits in order, and connect the upper quasi- cardinal sum mantissa, formed new two into
Data processed.
2. the method as described in claim 1, which is characterized in that further include: after using the new binary data as encryption
Data, be stored in database in.
3. method according to claim 1 or 2, which is characterized in that it is described by the multiple 8 bit from first 8
Bit starts, from the front to the back according to Fibonacci sequence rule carry out with or position calculate, obtain multiple new 8 two into
Number processed, comprising:
It is equal to every two adjacent 8 bits by the multiple 8 bit since first 8 bit
It carries out same or position to calculate, obtains multiple 8 new bits.
4. a kind of file stores encryption device characterized by comprising
Conversion module, for file to be converted to binary data by way of io data flow;
Divide module, for being split to the binary data according to 8, if the binary data cannot be divided into it is whole
Several 8 bits obtain multiple 8 bits and a mantissa after segmentation;The mantissa is the last one inadequate 8
Binary system, radix subject to the last one 8 bit in the multiple 8 bit;
Computing module, for by the multiple 8 bit since first 8 bit, from the front to the back according to striking
Fibonacci ordered series of numbers rule carries out same or position and calculates, and obtains multiple 8 new bits;Wherein, the public affairs that the same or position calculates
Formula are as follows: a ⊙ b=ab+a'b', a' are non-a, and b' is non-b, and ⊙ is that expression progress is same or position calculates symbol, and a and b are to carry out together
Or two binary numbers that position calculates;The Fibonacci sequence rule is F (0)=0, F (1)=1, F (n)=F (n-1) ⊙ F
(n-2) recursion rule, wherein F (n) is any one 8 bit in the multiple 8 bit, n >=2, n
∈N*;
Composite module for combining the multiple 8 new bits in order, and connects the upper quasi- cardinal sum tail
Number, forms new binary data.
5. device as claimed in claim 4, which is characterized in that further include:
Memory module, for being stored in database using the new binary data as encrypted data.
6. device as described in claim 4 or 5, which is characterized in that the computing module, for described by the multiple 8
Binary number carries out same or position according to Fibonacci sequence rule from the front to the back and calculates, obtain since first 8 bit
To multiple 8 new bits, comprising:
The computing module, for by the multiple 8 bit since first 8 bit, to every adjacent
Two 8 bits carry out same or position and calculate, and obtain multiple 8 new bits.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610465692.6A CN105956492B (en) | 2016-06-23 | 2016-06-23 | A kind of file storage encryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610465692.6A CN105956492B (en) | 2016-06-23 | 2016-06-23 | A kind of file storage encryption method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105956492A CN105956492A (en) | 2016-09-21 |
CN105956492B true CN105956492B (en) | 2019-01-25 |
Family
ID=56903765
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610465692.6A Active CN105956492B (en) | 2016-06-23 | 2016-06-23 | A kind of file storage encryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105956492B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107276744B (en) * | 2017-05-27 | 2020-12-18 | 王蕴卓 | File storage encryption method and system |
CN108804933B (en) * | 2018-05-25 | 2020-06-05 | 东北大学 | Method for carrying out scale conversion on big data in information hiding technology |
CN108875408A (en) * | 2018-06-22 | 2018-11-23 | 南京擎天科技有限公司 | A kind of file of Android platform quickly encrypts and decryption method |
CN110659508B (en) * | 2019-08-16 | 2021-08-31 | 苏州浪潮智能科技有限公司 | Encryption and decryption method and device based on Lucas number sequence and readable medium |
CN112235319B (en) * | 2020-12-09 | 2021-03-16 | 卓尔智联(武汉)研究院有限公司 | Data encryption and decryption method and device and encryption and decryption circuit |
CN114584390B (en) * | 2022-03-22 | 2023-02-17 | 重庆师范大学 | Anti-crawling method for map service |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2137662A1 (en) * | 2007-03-13 | 2009-12-30 | Nxp B.V. | Encryption and decryption of a dataset in at least two dimensions |
CN102411616A (en) * | 2011-10-28 | 2012-04-11 | 北京地拓科技发展有限公司 | Method and system for storing data and data management method |
US8510568B2 (en) * | 2006-02-15 | 2013-08-13 | Samsung Electronics Co., Ltd. | Method and apparatus for importing a transport stream |
CN104657679A (en) * | 2015-03-03 | 2015-05-27 | 浪潮电子信息产业股份有限公司 | Method for storing file HASH based on NTFS (New Technology File System) alternative data stream |
CN104657677A (en) * | 2015-03-05 | 2015-05-27 | 北京安普诺信息技术有限公司 | File encryption method based on alternate data streams |
CN105279440A (en) * | 2015-07-06 | 2016-01-27 | 深圳市美贝壳科技有限公司 | Photo file encryption method |
-
2016
- 2016-06-23 CN CN201610465692.6A patent/CN105956492B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8510568B2 (en) * | 2006-02-15 | 2013-08-13 | Samsung Electronics Co., Ltd. | Method and apparatus for importing a transport stream |
EP2137662A1 (en) * | 2007-03-13 | 2009-12-30 | Nxp B.V. | Encryption and decryption of a dataset in at least two dimensions |
CN102411616A (en) * | 2011-10-28 | 2012-04-11 | 北京地拓科技发展有限公司 | Method and system for storing data and data management method |
CN104657679A (en) * | 2015-03-03 | 2015-05-27 | 浪潮电子信息产业股份有限公司 | Method for storing file HASH based on NTFS (New Technology File System) alternative data stream |
CN104657677A (en) * | 2015-03-05 | 2015-05-27 | 北京安普诺信息技术有限公司 | File encryption method based on alternate data streams |
CN105279440A (en) * | 2015-07-06 | 2016-01-27 | 深圳市美贝壳科技有限公司 | Photo file encryption method |
Non-Patent Citations (1)
Title |
---|
基于广义斐波那契数列的密码系统设计;苏蕴娜等;《西南师范大学学报》;西南师范大学学报;20151130;第40卷(第11期);第61-66页 |
Also Published As
Publication number | Publication date |
---|---|
CN105956492A (en) | 2016-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105956492B (en) | A kind of file storage encryption method and device | |
CN106127075B (en) | Encryption method can search for based on secret protection under a kind of cloud storage environment | |
US20190158296A1 (en) | Redactable document signatures | |
CN110689349B (en) | Transaction hash value storage and searching method and device in blockchain | |
CN104866985B (en) | The recognition methods of express delivery odd numbers, apparatus and system | |
CN109474423A (en) | Data encryption/decryption method, server and storage medium | |
US10055602B2 (en) | Securely processing range predicates on cloud databases | |
CN103049709B (en) | Based on password recovery system and the restoration methods thereof of generator expansion rainbow table | |
CN107196840B (en) | Data processing method, device and equipment | |
CN111026788A (en) | Homomorphic encryption-based multi-keyword ciphertext sorting and retrieving method in hybrid cloud | |
CN108038128A (en) | A kind of search method, system, terminal device and storage medium for encrypting file | |
CN104967693A (en) | Document similarity calculation method facing cloud storage based on fully homomorphic password technology | |
CN109257176A (en) | Decruption key segmentation and decryption method, device and medium based on SM2 algorithm | |
CN104954329A (en) | Method and apparatus for processing biological characteristic information | |
CN105279198A (en) | Data table storage method, data table modification method, data table query method and data table statistical method | |
CN112541775A (en) | Transaction tracing method based on block chain, electronic device and computer storage medium | |
CN106130717B (en) | A kind of file storage decryption method and device | |
CN107422980A (en) | Internet of Things data document storage system and its data file storage method | |
CN107992725A (en) | A kind of code encryption, decryption method and device | |
CN112489742A (en) | Prescription circulation processing method and device | |
CN107391541A (en) | A kind of real time data merging method and device | |
CN108055230A (en) | The method and apparatus of data request processing | |
CN107329911B (en) | Cache replacement method based on CP-ABE attribute access mechanism | |
CN107330339B (en) | A kind of generation method and device of electronic record identity card | |
CN103138922A (en) | Method, system and device for transmitting digital contents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |