CN110912879A - Electronic creditor certificate secure sharing method and system - Google Patents

Electronic creditor certificate secure sharing method and system Download PDF

Info

Publication number
CN110912879A
CN110912879A CN201911122171.0A CN201911122171A CN110912879A CN 110912879 A CN110912879 A CN 110912879A CN 201911122171 A CN201911122171 A CN 201911122171A CN 110912879 A CN110912879 A CN 110912879A
Authority
CN
China
Prior art keywords
ciphertext
key
content
electronic
creditor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911122171.0A
Other languages
Chinese (zh)
Inventor
黄林
梁樑
曾水保
胡勇
朱香友
黄晓漫
黄超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ANHUI HAIHUI FINANCE INVESTMENT GROUP Co Ltd
Original Assignee
ANHUI HAIHUI FINANCE INVESTMENT GROUP Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ANHUI HAIHUI FINANCE INVESTMENT GROUP Co Ltd filed Critical ANHUI HAIHUI FINANCE INVESTMENT GROUP Co Ltd
Priority to CN201911122171.0A priority Critical patent/CN110912879A/en
Publication of CN110912879A publication Critical patent/CN110912879A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for safely sharing an electronic creditor certificate, which comprise the following steps: acquiring an encryption key uploaded by first equipment and electronic creditor certificate content to be encrypted; expanding the encryption key to obtain an expanded key K; symmetrically encrypting the content of the electronic creditor certificate through the expanded key K to obtain a first ciphertext; carrying out asymmetric encryption on the extended key K of the first ciphertext to obtain a second ciphertext of an encrypted key CK; sending the second ciphertext to second equipment to obtain a decryption application uploaded by the second equipment; acquiring decrypted electronic creditor certificate content uploaded by the second device, wherein the decrypted electronic creditor certificate content responds to a ciphertext obtained by decrypting the second ciphertext according to the decryption application; and encrypting and decrypting the content of the electronic creditor voucher so as to complete the secure sharing of the content of the electronic creditor voucher.

Description

Electronic creditor certificate secure sharing method and system
Technical Field
The invention relates to the technical field of creditor sharing, in particular to a method and a system for safely sharing electronic creditor certificates.
Background
With the continuous development of the information age, the information exchange of different departments and different regions is gradually increased, and the development of the computer network technology provides guarantee for information transmission. Data sharing is one way to achieve data transmission using computer networking technology. Data sharing is to enable users who use different computers and different software in different places to read data of others. The data sharing is realized, more people can fully use the existing data resources, and the repeated labor and corresponding cost of data collection, data acquisition and the like are reduced.
With the development of electronization and digitization of accounts receivable and debt rights, electronic debt rights vouchers gradually replace paper vouchers to become a main form of circulation of the accounts receivable and debt rights, popularization of the electronic debt rights vouchers also provides possibility for realizing interconnection and sharing of accounts receivable and debt rights information in a wider range, values and functions of large data resources can be fully played through sharing of the debt rights information, the cost of each link of data collection, data processing, data storage and transmission and the like is reduced, and how to guarantee data security of the debt rights sharing in the process of the debt rights sharing becomes a big problem.
Disclosure of Invention
Based on the technical problems existing in the background technology, the invention provides a method and a system for safely sharing an electronic creditor certificate, which are used for encrypting and decrypting the content of the electronic creditor certificate so as to complete the safe sharing of the content of the electronic creditor certificate.
The invention provides a safe sharing method of an electronic creditor certificate, which comprises the following steps:
acquiring an encryption key uploaded by first equipment and electronic creditor certificate content to be encrypted;
expanding the encryption key to obtain an expanded key K;
symmetrically encrypting the content of the electronic creditor certificate through the expanded key K to obtain a first ciphertext; carrying out asymmetric encryption on the extended key K of the first ciphertext to obtain a second ciphertext of a second ciphertext CK;
sending the second ciphertext to second equipment to obtain a decryption application uploaded by the second equipment;
and acquiring the decrypted electronic creditor certificate content uploaded by the second equipment, wherein the decrypted electronic creditor certificate content responds to the ciphertext obtained by decrypting the second ciphertext according to the decryption application.
Further, the expanding the encryption key to obtain an expanded key K includes:
arranging bytes of an encryption key according to a 4x n matrix, wherein bytes in each column of the matrix are used as a group to obtain n groups of 4-byte matrix values which are respectively W (0), W (1), W (2) and W (n-1);
carrying out r-round expansion on the n W values to obtain n groups of 4-byte matrix values after each expansion;
and sequentially combining the n groups of expanded 4-byte matrix values to obtain an expanded key K.
Further, in the r-round expansion of the n W values to obtain n groups of 4-byte matrix values after each expansion, the following formula is adopted for expansion:
Figure BDA0002275742670000021
Figure BDA0002275742670000022
Figure BDA0002275742670000023
Figure BDA0002275742670000024
wherein, i is 1,2, 3., r, r represents the number of rounds of rotation, n represents the key length in units of 4 bytes, ⊕ represents the xor sign, and function g represents that W is rotated left by 8 bits, and after S-box permutation is performed on each byte, the byte is xored with a constant RC;
further, before transmitting the second ciphertext to the second device, comprising:
generating a creditor two-dimensional code according to the second ciphertext, wherein the creditor two-dimensional code comprises electronic creditor certificate content, a key CK and expiration time;
and sending the creditor two-dimension code to the second equipment.
Further, before obtaining the decryption application uploaded by the second device, the method includes:
analyzing the creditor two-dimensional code to obtain the content of the electronic creditor certificate, a key CK and expiration time;
judging whether the expiration time of the creditor two-dimensional code is valid or not;
and acquiring a decryption application uploaded by the unexpired creditor two-dimensional code, wherein the decryption application corresponds to the secret key CK.
Further, the symmetric encryption of the electronic creditor voucher content through the expanded key K to obtain a first ciphertext includes:
cutting off the content of the electronic creditor certificate in equal length to obtain a cut-off ciphertext;
symmetrically encrypting each cut ciphertext to obtain an encrypted ciphertext;
presetting the same initial vector for each cut ciphertext in the encrypted ciphertext;
and splicing the encrypted ciphertexts with the same initial vector in sequence to obtain an encrypted total ciphertext.
Further, in the asymmetric encryption of the extended key K of the first ciphertext, the asymmetric encryption of the extended key K is performed by using an asymmetric encryption RSA encryption algorithm.
An electronic creditor credential secure sharing system comprising: the system comprises a first acquisition module, an expansion encryption module, a first encryption module, a second acquisition module and a third acquisition module;
the first acquisition module is used for acquiring an encryption key uploaded by the first device and electronic creditor certificate content to be encrypted;
the expansion encryption module is used for expanding the encryption key to obtain an expansion key K;
the first encryption module is used for symmetrically encrypting the content of the electronic creditor certificate through the expanded key K to obtain a first ciphertext;
the second encryption module is used for asymmetrically encrypting the extended key K of the first ciphertext to obtain a second ciphertext of the encrypted key CK;
the second obtaining module is used for sending the second ciphertext to the second device and obtaining a decryption application uploaded by the second device;
the third acquisition module is used for acquiring the decrypted electronic creditor certificate content uploaded by the second device, wherein the decrypted electronic creditor certificate content responds to the ciphertext obtained by decrypting the second ciphertext according to the decryption application
A computer readable storage medium having stored thereon a number of get classification programs for being invoked by a processor and performing the steps of:
acquiring an encryption key uploaded by first equipment and electronic creditor certificate content to be encrypted;
expanding the encryption key to obtain an expanded key K;
symmetrically encrypting the content of the electronic creditor certificate through the expanded key K to obtain a first ciphertext; carrying out asymmetric encryption on the extended key K of the first ciphertext to obtain a second ciphertext of a second ciphertext CK;
sending the second ciphertext to second equipment to obtain a decryption application uploaded by the second equipment;
and acquiring the decrypted electronic creditor certificate content uploaded by the second equipment, wherein the decrypted electronic creditor certificate content responds to the ciphertext obtained by decrypting the second ciphertext according to the decryption application.
The electronic creditor certificate safety sharing method and the system provided by the invention have the advantages that: according to the electronic creditor certificate secure sharing method and system provided by the structure of the invention, the corresponding plaintext is output through the encryption and decryption functions, so that the second equipment can safely and accurately acquire the electronic creditor certificate content in the first equipment, or a plurality of equipment simultaneously acquire the electronic creditor certificate content in the first equipment, the electronic creditor certificate content sharing is realized, and meanwhile, the security and pertinence of the electronic creditor certificate content sharing are improved through the form of the secret key.
Drawings
FIG. 1 is a schematic diagram illustrating steps of a method for secure sharing of electronic creditor credentials according to the present invention;
FIG. 2 is a schematic flow chart of secure sharing of electronic creditor credentials;
FIG. 3 is a schematic diagram of an encryption key K expansion;
FIG. 4 is a flow chart of an electronic creditor certificate secure sharing system of the present invention;
the encryption method comprises the following steps of 100-a first obtaining module, 200-an expanded encryption module, 300-the first encryption module, 400-a second encryption module, 500-the second obtaining module and 600-a third obtaining module.
Detailed Description
The present invention is described in detail below with reference to specific embodiments, and in the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein, but rather should be construed as broadly as the present invention is capable of modification in various respects, all without departing from the spirit and scope of the present invention.
Referring to fig. 1 and 2, the electronic creditor certificate security sharing method provided by the invention comprises the following steps:
s1: acquiring an encryption key uploaded by first equipment and electronic creditor certificate content to be encrypted;
s2: expanding the encryption key to obtain an expanded key K;
the encryption key is expanded, so that the difficulty of the key to be cracked is improved, and the encryption safety and stability of the content of the electronic creditor certificate to be encrypted are further improved.
S3: symmetrically encrypting the content of the electronic creditor certificate through the expanded key K to obtain a first ciphertext;
to improve the security of the data, each key K is randomly generated and used only once.
Symmetrically encrypting the content of the electronic creditor voucher by adopting a symmetric encryption AES (advanced encryption Standard), wherein the steps S31 to S34 are as follows:
s31: AES adopts block cipher system, namely cuts off the content of the electronic creditor certificate with equal length to obtain the cut-off cipher text;
s32: symmetrically encrypting each cut ciphertext to obtain an encrypted ciphertext;
s33: presetting the same initial vector for each cut ciphertext in the encrypted ciphertext;
the initial vector has the function of ensuring that the encryption is safer and more reliable, the initial vector needs to be actively provided when the AES encryption is used, only one initial vector needs to be provided, and the encrypted vector of each section of data later is the ciphertext of the previous section. The length of the initial vector is equal to the length of the encryption key, and the source of the initial vector is generated randomly.
S34: and splicing the encrypted ciphertexts with the same initial vector in sequence to obtain an encrypted total ciphertext.
The AES is adopted to symmetrically encrypt the content of the electronic creditor certificate, only one key is required to be provided, each section of data is encrypted by the key, and the key is randomly generated from a source, so that the encryption is fast and convenient.
S4: carrying out asymmetric encryption on the extended key K of the first ciphertext to obtain a second ciphertext of an encrypted key CK;
and carrying out asymmetric encryption on the expansion key K by adopting an asymmetric encryption RSA encryption algorithm.
S5: sending the second ciphertext to second equipment to obtain a decryption application uploaded by the second equipment;
before transmitting the second ciphertext to the second device, comprising S51-S52:
s51: generating a creditor two-dimensional code according to the second ciphertext, wherein the creditor two-dimensional code comprises electronic creditor certificate content, a key CK and expiration time;
s52: and sending the creditor two-dimension code to the second equipment.
Through forming the creditor two-dimensional code with the second ciphertext, different users of the second equipment can acquire the shared electronic creditor certificate through directly scanning the two-dimensional code and the secret key CK in the two-dimensional code, so that the use convenience of different users in the second equipment is improved.
Before acquiring the decryption application uploaded by the second device, steps S53 to S55 are included:
s53: analyzing the creditor two-dimensional code to obtain the content of the electronic creditor certificate, a key CK and expiration time;
s53: judging whether the expiration time of the creditor two-dimensional code is valid or not; if yes, the process proceeds to step S54, and if no, the process proceeds to step S55;
s54: and acquiring a decryption application uploaded by the unexpired creditor two-dimensional code, wherein the decryption application corresponds to the secret key CK.
S55: directly neglecting the decryption application uploaded by the creditor two-dimensional code.
S6: and acquiring the decrypted electronic creditor certificate content uploaded by the second equipment, wherein the decrypted electronic creditor certificate content responds to the ciphertext obtained by decrypting the second ciphertext according to the decryption application.
For the steps S1 to S6 to encrypt and decrypt the content of the electronic creditor voucher to complete the secure sharing of the content of the electronic creditor voucher, assuming that the AES encryption function is E, C is E (K, P), where P is plaintext, K is a key, and C is ciphertext. That is, the encryption function E outputs the ciphertext C by inputting the plaintext P and the key K as parameters of the encryption function. Assuming that the AES decryption function is D, P ═ D (K, C), where C is ciphertext, K is key, and P is plaintext. That is, the ciphertext C and the key K are input as parameters of the decryption function, and the decryption function outputs the plaintext P. Therefore, corresponding plaintext is output through the encryption and decryption functions, so that the second device can safely and accurately acquire the content of the electronic creditor voucher in the first device, or a plurality of devices simultaneously acquire the content of the electronic creditor voucher in the first device, the sharing of the content of the electronic creditor voucher is realized, and meanwhile, the security and pertinence of the sharing of the content of the electronic creditor voucher are improved through the form of a secret key.
As shown in fig. 3, in step S3: the expanding the encryption key to obtain an expanded key K includes:
s31: arranging bytes of an encryption key according to a 4x n matrix, wherein bytes in each column of the matrix are used as a group to obtain n groups of 4-byte matrix values which are respectively W (0), W (1), W (2) and W (n-1); n takes the values of 4, 6 and 8.
The length of the encryption key is 128 bits, 192 bits, 256 bits, and in this application, assuming that the length of the key is 128 bits, that is, 16 bytes, the key K is arranged in a 4 × 4 matrix. Wherein K0、K1、…、K15One byte of the key K is represented in turn; the 4 bytes are divided into a group, namely 4 groups, which are respectively marked as W (0), W (1), W (2) and W (3).
S32: carrying out r-round expansion on n W to obtain n groups of 4-byte matrix values after each expansion;
Figure BDA0002275742670000081
Figure BDA0002275742670000082
Figure BDA0002275742670000083
Figure BDA0002275742670000084
where i is 1,2, 3.. times.r, r denotes the number of rounds of rotation, n denotes the key length in 4 bytes, ⊕ denotes the xor sign, and the function g denotes that the W value is cyclically shifted left by 8 bits and then S-box permutation is performed on each byte separately, i.e. if W is a7a6a5a4a3a2a1a0Then after the substitution is S [ a ]7a6a5a4][a3a2a1a0](ii) a And then exclusive-or' ed with a constant RC, wherein RC is a one-dimensional array with the values of RC {0x00,0x01,0x02,0x04,0x08,0x10,0x20,0x40,0x80,0x1B,0x36 }.
When i is 1, W (4), W (5), W (6), W (7) are obtained; when i is 2, W (8), W (9), W (10), W (11) and so on are obtained, and finally W (40), W (41), W (42), W (43) are obtained, and the combination is the final expanded key K.
In this embodiment, the 128-bit key needs to perform 10 rounds of extended calculations (i.e., n ═ 4, r ═ 10, i ═ 1 · 10); 192-bit keys require 12 rounds of expansion (i.e., n-6, r-12, i-1 · 12) and 256-bit keys require 14 rounds of expansion (i.e., n-8, r-14, i-1 · 14).
S33: and sequentially combining the n groups of expanded 4-byte matrix values to obtain an expanded key K.
The encryption key is expanded through steps S31 to S33, so that the security of the encryption key is improved, and the security of creditor certificate sharing is further improved.
As shown in fig. 4, an electronic creditor credential secure sharing system includes: a first obtaining module 100, a first encryption module 200, an extended encryption module 300, a second encryption module 400, a second obtaining module 500, and a third obtaining module 600;
the first obtaining module 100 is configured to obtain an encryption key uploaded by the first device and electronic creditor credential content to be encrypted;
the expansion encryption module 200 is configured to expand the encryption key to obtain an expansion key K;
the first encryption module 300 is configured to symmetrically encrypt the content of the electronic creditor certificate by using the extended key K, i.e., a first ciphertext; the second encryption module 400 is configured to perform asymmetric encryption on the extended key K of the first ciphertext to obtain a second ciphertext of the encrypted key CK;
the second obtaining module 500 is configured to send the second ciphertext to the second device, and obtain a decryption application uploaded by the second device;
the third obtaining module 600 is configured to obtain the decrypted electronic creditor credential content uploaded by the second device, where the decrypted electronic creditor credential content is in response to the ciphertext obtained by decrypting the second ciphertext according to the decryption application
A computer readable storage medium having stored thereon a number of get classification programs for being invoked by a processor and performing the steps of:
acquiring an encryption key uploaded by first equipment and electronic creditor certificate content to be encrypted;
expanding the encryption key to obtain an expanded key K;
symmetrically encrypting the content of the electronic creditor certificate through the expanded key K to obtain a first ciphertext; carrying out asymmetric encryption on the extended key K of the first ciphertext to obtain a second ciphertext of an encrypted key CK;
sending the second ciphertext to second equipment to obtain a decryption application uploaded by the second equipment;
and acquiring the decrypted electronic creditor certificate content uploaded by the second equipment, wherein the decrypted electronic creditor certificate content responds to the ciphertext obtained by decrypting the second ciphertext according to the decryption application.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (9)

1. An electronic creditor certificate secure sharing method, comprising:
acquiring an encryption key uploaded by first equipment and electronic creditor certificate content to be encrypted;
expanding the encryption key to obtain an expanded key K;
symmetrically encrypting the content of the electronic creditor certificate through the expanded key K to obtain a first ciphertext;
carrying out asymmetric encryption on the extended key K of the first ciphertext to obtain a second ciphertext of an encrypted key CK;
sending the second ciphertext to second equipment to obtain a decryption application uploaded by the second equipment;
and acquiring the decrypted electronic creditor certificate content uploaded by the second equipment, wherein the decrypted electronic creditor certificate content responds to the ciphertext obtained by decrypting the second ciphertext according to the decryption application.
2. The method for securely sharing an electronic creditor certificate according to claim 1, wherein the step of expanding the encryption key to obtain an expanded key K comprises:
arranging the bytes of the encryption key according to a 4x n matrix, wherein the bytes in each column of the matrix are used as a group to obtain n groups of 4-byte matrix values, which are respectively W (0), W (1) and W (2) · · W (n-1);
carrying out r-round expansion on the n W values to obtain n groups of 4-byte matrix values after each expansion;
and sequentially combining the n groups of expanded 4-byte matrix values to obtain an expanded key K.
3. The method for secure sharing of electronic claim certificate as claimed in claim 2, wherein the r-round expansion of n W values to obtain n groups of 4-byte matrix values after each expansion is performed by using the following formula:
Figure FDA0002275742660000011
Figure FDA0002275742660000012
Figure FDA0002275742660000013
Figure FDA0002275742660000014
where i 1,2, 3., r, r denotes the number of rounds of rotation, n denotes the key length in units of 4 bytes,
Figure FDA0002275742660000021
the xor sign is represented, and the function g represents that W is circularly shifted to the left by 8 bits, and after S-box permutation is performed on each byte, exclusive or is performed with a constant RC.
4. The method for secure sharing of electronic creditor credentials according to claim 1, prior to sending the second ciphertext to the second device, comprising:
generating a creditor two-dimensional code according to the second ciphertext, wherein the creditor two-dimensional code comprises electronic creditor certificate content, a key CK and expiration time;
and sending the creditor two-dimension code to the second equipment.
5. The method for securely sharing electronic creditor credentials according to claim 4, comprising, before obtaining the decryption application uploaded by the second device:
analyzing the creditor two-dimensional code to obtain the content of the electronic creditor certificate, a key CK and expiration time;
judging whether the expiration time of the creditor two-dimensional code is valid or not;
and acquiring a decryption application uploaded by the unexpired creditor two-dimensional code, wherein the decryption application corresponds to the secret key CK.
6. The method for securely sharing an electronic creditor certificate according to claim 1, wherein the symmetrically encrypting the electronic creditor certificate content by the expanded key K to obtain the first ciphertext comprises:
cutting off the content of the electronic creditor certificate in equal length to obtain a cut-off ciphertext;
symmetrically encrypting each cut ciphertext to obtain an encrypted ciphertext;
presetting the same initial vector for each cut ciphertext in the encrypted ciphertext;
and splicing the encrypted ciphertexts with the same initial vector in sequence to obtain an encrypted total ciphertext.
7. The method for securely sharing an electronic creditor certificate according to any one of claims 1-6, wherein in the asymmetric encryption of the extended key K of the first ciphertext, the extended key K is asymmetrically encrypted by using an asymmetric encryption RSA encryption algorithm.
8. An electronic creditor credential secure sharing system, comprising: the system comprises a first acquisition module (100), a first encryption module (200), an extended encryption module (300), a second encryption module (400), a second acquisition module (500) and a third acquisition module (600);
the first acquisition module (100) is used for acquiring the electronic creditor voucher content to be encrypted, which is uploaded by the first equipment;
the expanded key module (200) is used for expanding the encryption key to obtain an expanded key K;
the first encryption module (300) is used for symmetrically encrypting the content of the electronic creditor certificate through the expansion key K to obtain a first ciphertext; the second encryption module (400) is used for asymmetrically encrypting the expansion key K of the first ciphertext to obtain a second ciphertext of the encryption key CK;
the second obtaining module (500) is configured to send the second ciphertext to the second device, and obtain a decryption application uploaded by the second device;
the third obtaining module (500) is configured to obtain decrypted electronic creditor credential content uploaded by the second device, where the decrypted electronic creditor credential content is in response to a ciphertext obtained by decrypting the second ciphertext according to the decryption application.
9. A computer readable storage medium having stored thereon a number of get classification programs for being invoked by a processor and performing the steps of:
acquiring electronic creditor certificate content to be encrypted uploaded by first equipment;
expanding the encryption key to obtain an expanded key K;
symmetrically encrypting the content of the electronic creditor certificate through the expanded key K to obtain a first ciphertext; carrying out asymmetric encryption on the extended key K of the first ciphertext to obtain a second ciphertext of an encrypted key CK;
sending the second ciphertext to second equipment to obtain a decryption application uploaded by the second equipment;
and acquiring the decrypted electronic creditor certificate content uploaded by the second equipment, wherein the decrypted electronic creditor certificate content responds to the ciphertext obtained by decrypting the second ciphertext according to the decryption application.
CN201911122171.0A 2019-11-15 2019-11-15 Electronic creditor certificate secure sharing method and system Pending CN110912879A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911122171.0A CN110912879A (en) 2019-11-15 2019-11-15 Electronic creditor certificate secure sharing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911122171.0A CN110912879A (en) 2019-11-15 2019-11-15 Electronic creditor certificate secure sharing method and system

Publications (1)

Publication Number Publication Date
CN110912879A true CN110912879A (en) 2020-03-24

Family

ID=69817780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911122171.0A Pending CN110912879A (en) 2019-11-15 2019-11-15 Electronic creditor certificate secure sharing method and system

Country Status (1)

Country Link
CN (1) CN110912879A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111127254A (en) * 2020-03-27 2020-05-08 国网山东省电力公司青州市供电公司 Marketing and distribution through data management system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100269008A1 (en) * 2009-04-20 2010-10-21 Cleversafe, Inc. Dispersed data storage system data decoding and decryption
CN103327485A (en) * 2012-03-23 2013-09-25 辉达公司 Method and system for wirelessly transmitting content
US20160352690A1 (en) * 2013-03-07 2016-12-01 Facebook, Inc. Techniques for handshake-free encrypted communication using symmetric key caching during request-and-response
CN106301777A (en) * 2016-08-03 2017-01-04 国家计算机网络应急技术处理协调中心 Quick Response Code encrypted transmission method and system
CN110191136A (en) * 2019-06-12 2019-08-30 南京东科优信网络安全技术研究院有限公司 A kind of convenient and fast file secure transmission method and equipment
CN110190962A (en) * 2019-04-12 2019-08-30 杭州电子科技大学 A kind of leakage-preventing file security sharing method
CN110266683A (en) * 2019-06-18 2019-09-20 北京阿尔山区块链联盟科技有限公司 Digital asset sharing method, device and electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100269008A1 (en) * 2009-04-20 2010-10-21 Cleversafe, Inc. Dispersed data storage system data decoding and decryption
CN103327485A (en) * 2012-03-23 2013-09-25 辉达公司 Method and system for wirelessly transmitting content
US20160352690A1 (en) * 2013-03-07 2016-12-01 Facebook, Inc. Techniques for handshake-free encrypted communication using symmetric key caching during request-and-response
CN106301777A (en) * 2016-08-03 2017-01-04 国家计算机网络应急技术处理协调中心 Quick Response Code encrypted transmission method and system
CN110190962A (en) * 2019-04-12 2019-08-30 杭州电子科技大学 A kind of leakage-preventing file security sharing method
CN110191136A (en) * 2019-06-12 2019-08-30 南京东科优信网络安全技术研究院有限公司 A kind of convenient and fast file secure transmission method and equipment
CN110266683A (en) * 2019-06-18 2019-09-20 北京阿尔山区块链联盟科技有限公司 Digital asset sharing method, device and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111127254A (en) * 2020-03-27 2020-05-08 国网山东省电力公司青州市供电公司 Marketing and distribution through data management system

Similar Documents

Publication Publication Date Title
US7809134B2 (en) Method for encrypting information and device for realization of the method
Saraf et al. Text and image encryption decryption using advanced encryption standard
CN104468090B (en) Character cipher coding method based on image pixel coordinates
CN105743645A (en) PUF (Physical Unclonable Function)-based stream key generation device and method and data encryption and decryption method
Marzan et al. An enhanced key security of Playfair cipher algorithm
Joshy et al. Text to image encryption technique using RGB substitution and AES
Alemami et al. Advanced approach for encryption using advanced encryption standard with chaotic map
Nkandeu et al. Image encryption using the logistic map coupled to a self-synchronizing streaming
CN110912879A (en) Electronic creditor certificate secure sharing method and system
Erondu et al. An encryption and decryption model for data security using vigenere with advanced encryption standard
Kumari et al. Data encryption and decryption using graph plotting
CN115632765A (en) Encryption method, decryption device, electronic equipment and storage medium
KR20040083794A (en) encryption/decryption method of application data
CN114430549A (en) White box encryption and decryption method and device suitable for wireless communication
Ahuja et al. Dual layer secured password manager using Blowfish and LSB
Jain et al. Variation of playfair cipher
Jeyabalu et al. Hybridization of ICBC and genetic algorithm for optimizing encryption process in cloud computing application service
Geetha et al. Survey on security mechanisms for public cloud data
Bahjat et al. Speed image encryption scheme using dynamic Galois field GF (P) matrices
Kevadia et al. A literature survey on image encryption
Sermeno et al. Modified vigenere cryptosystem using matrix manipulation and base94 encoding scheme
Jumaa et al. Methods of Cryptography
Rao et al. A Novel Image Encryption Algorithm with Image Integrity Check
Dhavalagi et al. Cipher Design to Secure Images for Cryptographic Applications.
krishna Chaitanya et al. Simple And Efficient Data Encryption Algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200324