CN106911702B - Based on the cloud storage block encryption access control method for improving CP-ABE - Google Patents
Based on the cloud storage block encryption access control method for improving CP-ABE Download PDFInfo
- Publication number
- CN106911702B CN106911702B CN201710133566.5A CN201710133566A CN106911702B CN 106911702 B CN106911702 B CN 106911702B CN 201710133566 A CN201710133566 A CN 201710133566A CN 106911702 B CN106911702 B CN 106911702B
- Authority
- CN
- China
- Prior art keywords
- user
- key
- access control
- access
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The present invention is disclosed based on the cloud storage block encryption access control method for improving CP-ABE, access structure tree T in CP-ABE ciphering process is traversed, it obtains all user property group A being likely to occur, all user property group A is further encrypted and generate the corresponding decrypted private key of each set of properties.When user property changes, need to only re-encryption be carried out to place set of properties before oneself, without carrying out re-encryption to all properties.Key is stored in attribute authority (aa) center always, and private key does not need to be retransmitted after re-encryption, thus avoid because user it is not online caused by can not receive newest code key.By these user property group A and corresponding decrypted private key, attribute authority (aa) center is stored in using Hash table, when subscriber authentication, can directly be matched user property collection with set of properties, and the key that user receives is pseudo- key, can reduce the risk of information leakage in transmission process.
Description
Technical field
The present invention relates to based on the cloud storage block encryption access control method for improving CP-ABE.
Background technique
It is being based on CP-ABE cloud storage access control in the related technology at present, major defect shows themselves in that user property collection is sent out
It can all lead to re-encryption after changing, when re-encryption, needs to cause the computing cost of re-encryption to increase whole attribute re-encryptions,
Computational efficiency is low;Influencing property set, there is no the user of variation access;When user can miss newest code key because of not online
Distribution;It is directly traversed using tree construction when authentication, efficiency is lower;It directly is distributed to private key for user, may be transmitted across
Private key is revealed in journey, safety is low.
Summary of the invention
It is an object of the invention to overcome the prior art to cause defect present in re-encryption as user property change, mention
For reducing the computing cost of re-encryption based on the cloud storage block encryption access control method for improving CP-ABE, key point is avoided
User does not miss the case where reception online when hair, improves the efficiency of subscriber authentication, solves the safety in private key transmission process
Property problem, it is insufficient.
The technical solution adopted by the present invention is that:
Based on the cloud storage block encryption access control method for improving CP-ABE comprising following steps:
S1: being centrally generated open parameter PK and master key MK by attribute authority (aa), and open parameter PK be distributed to user, and
Master key MK is stored in attribute authority (aa) center;
S2: data subject obtains data ciphertext CT using open parameter PK and access structure T encryption data plaintext M, and will
Data ciphertext CT is uploaded to resource management center;
S3: attribute authority (aa) center obtain access structure T, and carry out traversal obtain it is all can be by the user property of access
Group A;Due to store relation on attributes in access structure tree T and whether may have access to standard, user property group A is then that can pass through visit
Any one set of properties asked, the partitioning standards of user property group A are relations on attributes in access structure tree T
S4: attribute authority (aa) center encrypts user property group A all obtained in step S3 using master key MK respectively
The corresponding private key SK of each user property group A is obtained, and is saved user property group A and corresponding private key SK using Hash table;
S5: user issues access application to access control authentication points and resource management center respectively;
S6: access control authentication points extract user's symbolic animal of the birth year collection from the application that user issues, and generate encryption and decryption
The user property collection and parameter P are sent to attribute authority (aa) center by the parameter P of private key jointly;
S7: attribute authority (aa) central authentication user identity;
The property set of user itself can be matched with what traversal in S3 obtained by the set of properties of access, if
Pass through with unanimously i.e. authentication, matches inconsistent authentication failure.
When subscriber authentication passes through, attribute authority (aa) center issues the verifying knot being verified to access control authentication points
Fruit, attribute authority (aa) center obtain the private key SK that the user corresponds to set of properties, and attribute authority (aa) center is based on private key SK and generates pseudo- key
SK ' is simultaneously sent to user;
When subscriber authentication is obstructed out-of-date, to the unacceptable verification result of access control authentication points sending verifying;
S8: access control authentication points are based on whether subscriber authentication result notice resource management center sends ciphertext;
When subscriber authentication result is that verifying is obstructed out-of-date, access control authentication points notify user to access failure, access
Control authentication points notice resource management center does not send data ciphertext CT to user;
When subscriber authentication result is to be verified, parameter P is sent to user, access control by access control authentication points
Authentication points notify resource management center to send data ciphertext CT to user;
S9: user carries out respective handling according to access result is received:
When subscriber authentication failure, user can not access data ciphertext CT, and user accesses failure;
When subscriber authentication success, decrypts the data ciphertext CT received and obtain data clear text M.
Further, the step S7, in when subscriber authentication passes through, attribute authority (aa) center using obtain parameter P
Encryption key SK obtains pseudo- key SK '.
Further, in the step S9, when subscriber authentication success, user obtains pseudo- key SK ', parameter P, number
According to ciphertext CT, pseudo- key SK is decrypted using parameter P ' private key SK is obtained, user executes M=Decrypt (CT, SK), with private key SK
Ciphertext data ciphertext CT obtains data clear text M.
The invention adopts the above technical scheme, traverses to the access structure tree T in CP-ABE ciphering process, obtains institute
Having can be divided in the third step encryption of CP-ABE algorithm by the user property group A of access, the set of properties all to these
It does not encrypt, generates the corresponding decrypted private key of each set of properties.It, only need to be to place attribute before oneself when user property changes
Group carries out re-encryption, without carrying out re-encryption to all properties.Because key is stored in attribute authority (aa) center, re-encryption always
Private key does not need to be retransmitted and (issues request when user needs) afterwards, thus avoid because user it is not online caused by
Newest key can not be received.By these user property group A and corresponding decrypted private key, it is stored in attribute authority (aa) using Hash table
The heart when subscriber authentication, can directly match user property collection with set of properties.And the key that user receives is pseudo- key,
The risk of information leakage in transmission process can be further decreased.
The present invention can effectively make up these defects using CP-ABE block encryption.Using block encryption, reduce
Computing cost during re-encryption, only to part set of properties re-encryption;Set of properties and private key are deposited in into symbolic animal of the birth year with Hash table
Authoritative center, when authentication, directly match user property collection with set of properties, improve authentication efficiency, and because not needing
The retransmission of new private key is carried out, and then it is online not need user.Present invention introduces pseudo- key, the private key avoided in transmission is let out
Dew.
Detailed description of the invention
The present invention is described in further details below in conjunction with the drawings and specific embodiments;
Fig. 1 is that the present invention is based on the schematic illustrations for the cloud storage block encryption access control method for improving CP-ABE;
Fig. 2 is that the present invention is based on the flow diagrams for the cloud storage block encryption access control method for improving CP-ABE.
Specific embodiment
As shown in one of Fig. 1-2, the present invention discloses a kind of based on the cloud storage block encryption access control for improving CP-ABE
Method comprising following steps:
S1: being centrally generated open parameter PK and master key MK by attribute authority (aa), and open parameter PK be distributed to user, and
Master key MK is stored in attribute authority (aa) center;
S2: data subject obtains data ciphertext CT using open parameter PK and access structure T encryption data plaintext M, and will
Data ciphertext CT is uploaded to resource management center;
S3: attribute authority (aa) center obtain access structure T, and carry out traversal obtain it is all can be by the user property of access
Group A;Due to store relation on attributes in access structure tree T and whether may have access to standard, set of properties A can then pass through access
Any one set of properties, the partitioning standards of user property group A are relations on attributes in access structure tree T.
S4: attribute authority (aa) center encrypts user property group A all obtained in step S3 using master key MK respectively
The corresponding private key SK of each user property group A is obtained, and is saved user property group A and corresponding private key SK using Hash table;
S5: user issues access application to access control authentication points and resource management center respectively;
S6: access control authentication points extract user's symbolic animal of the birth year collection from the application that user issues, and generate encryption and decryption
The user property collection and parameter P are sent to attribute authority (aa) center by the parameter P of private key jointly;
S7: attribute authority (aa) central authentication user identity;
The property set of user itself can be matched with what traversal in S3 obtained by the set of properties of access, if
Pass through with unanimously i.e. authentication, matches inconsistent authentication failure.
When subscriber authentication passes through, attribute authority (aa) center issues the verifying knot being verified to access control authentication points
Fruit, attribute authority (aa) center obtain the private key SK that the user corresponds to set of properties, and attribute authority (aa) center is based on private key SK and generates pseudo- key
SK ' is simultaneously sent to user;
When subscriber authentication is obstructed out-of-date, to the unacceptable verification result of access control authentication points sending verifying;
S8: access control authentication points are based on whether subscriber authentication result notice resource management center sends ciphertext;
When subscriber authentication result is that verifying is obstructed out-of-date, access control authentication points notify user to access failure, access
Control authentication points notice resource management center does not send data ciphertext CT to user
When subscriber authentication result is to be verified, parameter P is sent to user, access control by access control authentication points
Authentication points notify resource management center to send data ciphertext CT to user;
S9: user carries out respective handling according to access result is received:
When subscriber authentication failure, user can not access data ciphertext CT, and user accesses failure;
When subscriber authentication success, decrypts the data ciphertext CT received and obtain data clear text M.
Further, the step S7, in when subscriber authentication passes through, attribute authority (aa) center using obtain parameter P
Encryption key SK obtains pseudo- key SK '.
Further, in the step S9, when subscriber authentication success, user obtains pseudo- key SK ', parameter P, number
According to ciphertext CT, pseudo- key SK is decrypted using parameter P ' private key SK is obtained, user executes M=Decrypt (CT, SK), with private key SK
Ciphertext data ciphertext CT obtains data clear text M.
The invention adopts the above technical scheme, traverses to the access structure tree T in CP-ABE ciphering process, obtains institute
It is possible that the user property group A occurred, the set of properties all to these add respectively in the third step encryption of CP-ABE algorithm
It is close, generate the corresponding decrypted private key of each set of properties.When user property changes, only need to set of properties where before oneself into
Row re-encryption, without carrying out re-encryption to all properties.It is private after re-encryption because key is stored in attribute authority (aa) center always
Key does not need to be retransmitted and (issues request when user needs), thus avoid because user it is not online caused by can not
Receive newest code key.By these user property group A and corresponding decrypted private key, it is stored in attribute authority (aa) center using Hash table,
When subscriber authentication, directly user property collection can be matched with set of properties.And the key that user receives is pseudo- key, it can be with
Further decrease the risk of information leakage in transmission process.
Specific embodiment elaborates to the present invention below
A kind of cloud storage block encryption access control method based on improvement CP-ABE comprising following steps:
S1: attribute authority (aa) center executes the open parameter PK and master key MK of Setup () generation, and will open parameter PK distribution
To user, master key MK is stored in attribute authority (aa) center;
S2: data subject executes CT=Encrypt (PK, M, T), bright using open parameter PK and access structure T encryption data
Literary M obtains data ciphertext CT, and data ciphertext CT is uploaded to resource management center;
S3: attribute authority (aa) center obtain access structure T, and carry out traversal obtain it is all can be by the user property of access
Group A;
S4: attribute authority (aa) center executes SK=KeyGen (MK, A) and distinguishes all user properties group A obtained in step S3
Encryption obtains corresponding private key SK, and using Hash table, user property group A and corresponding private key SK is saved;
S5: user issues application to access control authentication points and resource management center;
S6: access control authentication points extract user's symbolic animal of the birth year collection from the application that user issues, and generate encryption and decryption
User property collection and parameter P are sent to attribute authority (aa) center by the parameter P of private key jointly;
S7: attribute authority (aa) central authentication user identity;
When subscriber authentication passes through, attribute authority (aa) center issues the verifying knot being verified to access control authentication points
Fruit, attribute authority (aa) center obtain the private key SK that the user corresponds to set of properties, and attribute authority (aa) center is based on private key SK and generates pseudo- key
SK ' is simultaneously sent to user;Specifically attribute authority (aa) center obtains pseudo- key SK using encryption parameter P encryption key SK is obtained ';
When subscriber authentication is obstructed out-of-date, attribute authority (aa) center issues to access control authentication points and verifies unacceptable test
Demonstrate,prove result;
S8: access control authentication points are based on whether subscriber authentication result notice resource management center sends ciphertext;
When subscriber authentication result is that verifying is obstructed out-of-date, access control authentication points notify user to access failure, access
Control authentication points notice resource management center does not send data ciphertext CT to user;
When subscriber authentication result is to be verified, parameter P is sent to user, access control by access control authentication points
Authentication points notify resource management center to send data ciphertext CT to user;
S9: user carries out respective handling according to access result is received:
When subscriber authentication failure, user can not access data ciphertext CT, and user accesses failure;
When subscriber authentication success, user obtains SK ', P, CT, obtains private key SK using P decryption SK ', user executes
M=Decrypt (CT, SK) decrypts ciphertext CT with private key SK, obtains data clear text M.
In conclusion the invention adopts the above technical scheme, traverse access structure T, obtain it is all can be by access
User property group A, and all properties group is encrypted to obtain private key, by these set of properties and corresponding private key, with Kazakhstan
Uncommon table is stored in attribute authority (aa) center, reduces since the variation of user identity attribute causes the computing cost of re-encryption;User
When attribute changes, need to only re-encryption be carried out to place set of properties before the user, not need to carry out whole set of properties weight
It is retransmitted after new encryption to whole users, private key does not need to distribute again after re-encryption, and it is online without user, and then avoid
The case where user does not miss reception online when code key is distributed improves the efficiency of subscriber authentication, solves in private key transmission process
Safety issue.
Claims (1)
1. based on improve CP-ABE cloud storage block encryption access control method, it is characterised in that: itself the following steps are included:
S1: open parameter PK and master key MK is centrally generated by attribute authority (aa), and open parameter PK is distributed to user, and master is close
Key MK is stored in attribute authority (aa) center;
S2: data subject is counted using open parameter PK and access structure T by asymmet-ric encryption method encryption data plaintext M
Resource management center is uploaded to according to ciphertext CT, and by data ciphertext CT;
S3: attribute authority (aa) center obtain access structure T, and carry out traversal obtain it is all can be by the user property group A of access;
S4: attribute authority (aa) center encrypts user property group A all obtained in step S3 respectively using master key MK and obtains
The corresponding private key SK of each user property group A, and saved user property group A and corresponding private key SK using Hash table;
S5: user issues access application to access control authentication points and resource management center respectively;
S6: access control authentication points extract user property collection from the application that user issues, and generate encryption and decrypted private key
The user property collection and parameter P are sent to attribute authority (aa) center by parameter P jointly;
S7: attribute authority (aa) central authentication user identity;
User property collection can be matched with what traversal in S3 obtained by the set of properties A of access;When matching consistent, use
Family authentication passes through;When matching inconsistent, subscriber authentication does not pass through;
When subscriber authentication passes through, attribute authority (aa) center issues the verification result being verified to access control authentication points,
Attribute authority (aa) center obtains the corresponding private key SK of user property group A, and attribute authority (aa) center is passed through symmetrical using the parameter P obtained
Encryption key SK obtains pseudo- key SK ' and it is sent to user;
When subscriber authentication is obstructed out-of-date, to the unacceptable verification result of access control authentication points sending verifying;
S8: access control authentication points are based on whether subscriber authentication result notice resource management center sends ciphertext;
When subscriber authentication result is that verifying is obstructed out-of-date, access control authentication points notify user to access failure, access control
Authentication points notice resource management center does not send data ciphertext CT to user;
When subscriber authentication result is to be verified, parameter P is sent to user, access control certification by access control authentication points
Point notice resource management center sends data ciphertext CT to user;
S9: user carries out respective handling according to access result is received:
When subscriber authentication failure, user can not access data ciphertext CT, and user accesses failure;
When subscriber authentication success, decrypts the data ciphertext CT received and obtain data clear text M;
Specifically, when subscriber authentication success, user obtains pseudo- key SK ', parameter P, data ciphertext CT, due to symmetrically plus
Close characteristic decrypts pseudo- key SK using parameter P ' private key SK can be obtained;And due to the asymmetric encryption characteristic of plaintext M, user is held
Data clear text M can be obtained with private key SK ciphertext data ciphertext CT in row M=Decrypt (CT, SK), wherein Decrypt (CT,
It SK is) the corresponding decryption function of asymmet-ric encryption method in S2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710133566.5A CN106911702B (en) | 2017-03-08 | 2017-03-08 | Based on the cloud storage block encryption access control method for improving CP-ABE |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710133566.5A CN106911702B (en) | 2017-03-08 | 2017-03-08 | Based on the cloud storage block encryption access control method for improving CP-ABE |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106911702A CN106911702A (en) | 2017-06-30 |
CN106911702B true CN106911702B (en) | 2019-08-02 |
Family
ID=59187104
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710133566.5A Active CN106911702B (en) | 2017-03-08 | 2017-03-08 | Based on the cloud storage block encryption access control method for improving CP-ABE |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106911702B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107947923B (en) * | 2017-11-29 | 2020-08-04 | 重庆邮电大学 | Attribute key distribution method without trusted center |
CN109254872A (en) * | 2018-08-14 | 2019-01-22 | 贵州仰望星空科技有限公司 | A kind of security access system for education big data |
CN109246096B (en) * | 2018-08-30 | 2021-05-18 | 西安电子科技大学 | Multifunctional fine-grained access control method suitable for cloud storage |
CN109614779A (en) * | 2018-12-28 | 2019-04-12 | 北京航天数据股份有限公司 | A kind of secure data operation method, device, equipment and medium |
CN111404665A (en) * | 2020-03-10 | 2020-07-10 | 南京工业大学 | Ciphertext access control method based on CP-ABE |
CN114301651B (en) * | 2021-12-22 | 2023-07-21 | 河南大学 | Yellow river dam bank monitoring data sharing method based on CP-ABE |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102916954A (en) * | 2012-10-15 | 2013-02-06 | 南京邮电大学 | Attribute-based encryption cloud computing safety access control method |
CN104113408A (en) * | 2014-07-11 | 2014-10-22 | 西安电子科技大学 | Method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption |
CN104539610A (en) * | 2014-12-25 | 2015-04-22 | 华中科技大学 | Agent re-encryption method for improving outsourced encrypted data sharing function |
CN104580205A (en) * | 2015-01-05 | 2015-04-29 | 南京邮电大学 | CP-ABE-based fixed ciphertext length proxy re-encryption system and method in cloud computing |
CN104901942A (en) * | 2015-03-10 | 2015-09-09 | 重庆邮电大学 | Distributed access control method for attribute-based encryption |
-
2017
- 2017-03-08 CN CN201710133566.5A patent/CN106911702B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102916954A (en) * | 2012-10-15 | 2013-02-06 | 南京邮电大学 | Attribute-based encryption cloud computing safety access control method |
CN104113408A (en) * | 2014-07-11 | 2014-10-22 | 西安电子科技大学 | Method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption |
CN104539610A (en) * | 2014-12-25 | 2015-04-22 | 华中科技大学 | Agent re-encryption method for improving outsourced encrypted data sharing function |
CN104580205A (en) * | 2015-01-05 | 2015-04-29 | 南京邮电大学 | CP-ABE-based fixed ciphertext length proxy re-encryption system and method in cloud computing |
CN104901942A (en) * | 2015-03-10 | 2015-09-09 | 重庆邮电大学 | Distributed access control method for attribute-based encryption |
Non-Patent Citations (4)
Title |
---|
"云中基于常数级密文属性基加密的访问控制机制";李琦 等;《吉林大学学报(工学版)》;20140515;第44卷(第3期);全文 |
"云计算环境下基于密文策略的权重属性加密方案";刘西蒙 等;《四川大学学报(工程科学版)》;20131120;第45卷(第6期);全文 |
"云计算环境中文档安全访问与自毁研究";熊金波;《中国博士学位论文全文库信息科技辑》;20150115;全文 |
"云计算环境中的组合文档模型及其访问控制方案";熊金波 等;《西安交通大学学报》;20131210;第48卷(第2期);全文 |
Also Published As
Publication number | Publication date |
---|---|
CN106911702A (en) | 2017-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106911702B (en) | Based on the cloud storage block encryption access control method for improving CP-ABE | |
US11470054B2 (en) | Key rotation techniques | |
CN109614818B (en) | Authorized identity-based keyword search encryption method | |
CN104980477B (en) | Data access control method and system under cloud storage environment | |
CN105656859B (en) | Tax control equipment software safety online upgrading method and system | |
CN109559124A (en) | A kind of cloud data safety sharing method based on block chain | |
CN103533539B (en) | Virtual SIM card parameter management method and device | |
CN111030996B (en) | Method and device for accessing resources | |
EP2830282A1 (en) | Storage method, system and device | |
CN108737374A (en) | The method for secret protection that data store in a kind of block chain | |
CN104158827B (en) | Ciphertext data sharing method, device, inquiry server and upload data client | |
US11316671B2 (en) | Accelerated encryption and decryption of files with shared secret and method therefor | |
CN103391192B (en) | A kind of based on secret protection across security domain access control system and control method thereof | |
CA2949847A1 (en) | System and method for secure deposit and recovery of secret data | |
CN104539420B (en) | A kind of safety key managing method of general Intelligent hardware | |
CN104967693A (en) | Document similarity calculation method facing cloud storage based on fully homomorphic password technology | |
CN105049877A (en) | Encryption method and device for live and recorded broadcast interaction system | |
CN110267270A (en) | A kind of substation's inner sensor terminal access Border Gateway authentication intelligence contract | |
CN103026657A (en) | Method and apparatus for providing a key certificate in a tamperproof manner | |
CN109858255A (en) | Data encryption storage method, device and realization device | |
CN106878322B (en) | A kind of encryption and decryption method of fixed length ciphertext and key based on attribute | |
WO2011022950A1 (en) | Service access method, system and device based on wlan access authentication | |
CN107465681A (en) | Cloud computing big data method for secret protection | |
CN105933345A (en) | Verifiable outsourcing attribute-based encryption method based on linear secret sharing | |
CN113204757A (en) | Information interaction method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |