CN112491862B - Distributed encryption method and device - Google Patents

Distributed encryption method and device Download PDF

Info

Publication number
CN112491862B
CN112491862B CN202011319982.2A CN202011319982A CN112491862B CN 112491862 B CN112491862 B CN 112491862B CN 202011319982 A CN202011319982 A CN 202011319982A CN 112491862 B CN112491862 B CN 112491862B
Authority
CN
China
Prior art keywords
iteration
distributed encryption
encryption scheme
distributed
evaluation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011319982.2A
Other languages
Chinese (zh)
Other versions
CN112491862A (en
Inventor
王智明
徐雷
陶冶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202011319982.2A priority Critical patent/CN112491862B/en
Publication of CN112491862A publication Critical patent/CN112491862A/en
Application granted granted Critical
Publication of CN112491862B publication Critical patent/CN112491862B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

The invention provides a distributed encryption method and a distributed encryption device, belongs to the technical field of encryption, and can at least partially solve the problems of high delay, high computational power consumption and low encryption efficiency of the existing encryption method. The distributed encryption method of the embodiment of the invention comprises the following steps: acquiring a plurality of distributed encryption requests of edge equipment, wherein each distributed encryption request comprises an evaluation index; carrying out deep analysis and deep analysis evaluation on the evaluation indexes in the distributed encryption requests to generate a distributed encryption scheme; and sending the distributed encryption scheme to edge equipment so that the edge equipment can encrypt according to the distributed encryption scheme.

Description

Distributed encryption method and device
Technical Field
The invention belongs to the technical field of encryption, and particularly relates to a distributed encryption method and device.
Background
With the rapid development of technologies, especially block chain technologies, the conventional encryption adopted at present is gradually unable to adapt to the network attacks which are increasingly upgraded and varied, and the problems of high delay, high computational power consumption, low encryption efficiency and the like in the encryption process are increasingly prominent.
Disclosure of Invention
The invention at least partially solves the problems of high delay, high computational power consumption and low encryption efficiency of the existing encryption method, and provides a distributed encryption method with low delay, low computational power consumption and high encryption efficiency.
One aspect of the present invention provides a distributed encryption method, the method comprising:
acquiring a plurality of distributed encryption requests of edge equipment, wherein each distributed encryption request comprises an evaluation index;
carrying out deep analysis and deep analysis evaluation on the evaluation indexes in the distributed encryption requests to generate a distributed encryption scheme;
and sending the distributed encryption scheme to edge equipment so that the edge equipment can encrypt according to the distributed encryption scheme.
Optionally, the performing deep analysis and deep analysis evaluation on the evaluation index in the multiple distributed encryption requests to generate a distributed encryption scheme includes:
starting a new iteration loop, resetting the iteration times, setting the maximum iteration times and setting the iteration parameters of initial iteration according to evaluation indexes in the distributed encryption requests;
analyzing iterative parameters by using a multilayer convolution neuron, quantum key distribution and a deep unsupervised learning strategy, and generating a distributed encryption scheme and iterative parameters of next iteration;
judging whether the iteration times reach a threshold value, if so, ending the circulation, and outputting a distributed encryption scheme obtained by the iteration as a distributed encryption scheme sent to the edge equipment;
if not, evaluating the distributed encryption scheme obtained by the iteration according to an evaluation function, and under the condition that the distributed encryption scheme obtained by the iteration does not meet the evaluation function, adding 1 to the iteration number, returning to the step of analyzing the iteration parameters by using a multilayer convolution neuron, quantum key distribution and deep unsupervised learning strategy, and generating the distributed encryption scheme and the iteration parameters of the next iteration;
and under the condition that the distributed encryption scheme obtained by the iteration meets the evaluation function, ending the loop, and outputting the distributed encryption scheme obtained by the iteration as the distributed encryption scheme sent to the edge equipment.
Further optionally, in the k-th iteration, the iteration parameter includes encryption efficiency
Figure BDA0002792574560000021
Rate of delay
Figure BDA0002792574560000022
Computing power consumption
Figure BDA0002792574560000023
Where i is 1,2, … m, j is 1,2, … n, t is 1,2, …, p, m is the maximum value of all values of i, n is the maximum value of all values of j, and p is the maximum value of all values of t.
Further optionally, the evaluation function at the kth iteration is:
Figure 100002_1
where P represents a probability.
Further optionally, analyzing iterative parameters by using a multilayer convolution neuron, quantum key distribution and a deep unsupervised learning strategy, and generating a distributed encryption scheme, including generating the distributed encryption scheme by using an optimization function;
the optimization function at the kth iteration is:
Figure BDA0002792574560000025
Skey=H{Random[q Mod w]},q∈[1,2,…,+∞],w≤Ω,
Rkey=H{Random[ρMod w]},ρ∈[1,2,…,+∞],w≤Ω,
Figure BDA0002792574560000026
Figure BDA0002792574560000027
wherein H is a hash function, Random is a function for generating Random numbers, text is data to be encrypted,
Figure BDA0002792574560000031
representing an exclusive or operation.
Further optionally, analyzing iteration parameters by using a multilayer convolution neuron, quantum key distribution and a deep unsupervised learning strategy to generate iteration parameters of next iteration, wherein the generation of the iteration parameters of the next iteration by using a supervision function is included;
the supervision function at the kth iteration is:
Figure BDA0002792574560000032
Figure BDA0002792574560000033
Figure BDA0002792574560000034
wherein the content of the first and second substances,
Figure BDA0002792574560000035
A Gmax for maximum encryption efficiency, E Gmin Is the minimum delay rate, C Gmin For minimum computational power consumption, mod is the remainder operation.
Another aspect of the present invention provides a distributed encryption apparatus, comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a plurality of distributed encryption requests of edge equipment, and each distributed encryption request comprises an evaluation index;
the analysis module is used for carrying out deep analysis and deep analysis evaluation on the evaluation indexes in the distributed encryption requests to generate a distributed encryption scheme;
and the sending module is used for sending the distributed encryption scheme to the edge equipment so that the edge equipment can encrypt the distributed encryption scheme.
Optionally, the analysis module includes:
the initial unit is used for resetting the iteration times when a new iteration cycle starts, setting the maximum iteration times and setting the iteration parameters of initial iteration according to the evaluation indexes in the distributed encryption requests;
the analysis unit is used for analyzing the iteration parameters by using a multilayer convolution neuron, quantum key distribution and deep unsupervised learning strategy and generating a distributed encryption scheme and iteration parameters of next iteration;
the first judgment unit is used for judging whether the iteration times reach a threshold value, if so, the circulation is ended, and the distributed encryption scheme obtained by the iteration is output as the distributed encryption scheme sent to the edge equipment;
the second judging unit is used for evaluating the distributed encryption scheme obtained by the iteration according to the evaluation function when the first judging unit judges that the iteration times do not reach the threshold value, and adding 1 to the iteration times under the condition that the distributed encryption scheme obtained by the iteration does not meet the evaluation function;
and under the condition that the distributed encryption scheme obtained by the iteration meets the evaluation function, ending the loop, and outputting the distributed encryption scheme obtained by the iteration as the distributed encryption scheme sent to the edge equipment.
Further optionally, in the k-th iteration, the iteration parameter includes encryption efficiency
Figure BDA0002792574560000041
Rate of delay
Figure BDA0002792574560000042
Computing power consumption
Figure BDA0002792574560000043
Where i is 1,2, … m, j is 1,2, … n, t is 1,2, …, p, m is the maximum value of all values of i, n is the maximum value of all values of j, and p is the maximum value of all values of t.
Further optionally, the evaluation function at the k-th iteration is:
Figure 2
where P represents a probability.
In the distributed encryption method and device provided by the embodiment of the invention, the optimal distributed encryption scheme is obtained through analyzing the distributed encryption request, and the edge device performs distributed encryption according to the obtained distributed encryption scheme, so that distributed encryption with low delay, low computational power consumption and high encryption efficiency is realized.
Drawings
Fig. 1 is a schematic flow chart of a distributed encryption method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a partial flow of a distributed encryption method according to an embodiment of the present invention;
FIG. 3 is a block diagram of a distributed encryption apparatus according to an embodiment of the present invention;
fig. 4 is a block diagram schematically illustrating an analysis module of a distributed encryption apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
It is to be understood that the specific embodiments and figures described herein are merely illustrative of the invention and are not limiting of the invention.
It is to be understood that the various embodiments and features of the embodiments may be combined with each other without conflict.
It is to be understood that, for the convenience of description, only parts related to the present invention are shown in the drawings of the present invention, and parts not related to the present invention are not shown in the drawings.
It should be understood that each unit and module related in the embodiments of the present invention may correspond to only one physical structure, may also be composed of multiple physical structures, or multiple units and modules may also be integrated into one physical structure.
It will be understood that, without conflict, the functions, steps, etc. noted in the flowchart and block diagrams of the present invention may occur in an order different from that noted in the figures.
It is to be understood that the flowchart and block diagrams of the present invention illustrate the architecture, functionality, and operation of possible implementations of systems, apparatus, devices and methods according to various embodiments of the present invention. Each block in the flowchart or block diagrams may represent a unit, module, segment, code, which comprises executable instructions for implementing the specified function(s). Furthermore, each block or combination of blocks in the block diagrams and flowchart illustrations can be implemented by a hardware-based system that performs the specified functions or by a combination of hardware and computer instructions.
It is to be understood that the units and modules involved in the embodiments of the present invention may be implemented by software, and may also be implemented by hardware, for example, the units and modules may be located in a processor.
The distributed encryption method of the present embodiment is used for a blockchain.
The block chain is a distributed shared account book and a database, and has the characteristics of decentralization, no tampering, trace retaining in the whole process, traceability, collective maintenance, openness and transparency and the like. The characteristics ensure the honesty and transparency of the block chain and lay a foundation for creating trust for the block chain. And the rich application scenes of the block chains basically solve the problem of information asymmetry based on the block chains, and realize the cooperative trust and consistent action among a plurality of main bodies. The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The Blockchain (Blockchain) is an important concept of bitcoin, is essentially a decentralized database, and is used as a bottom-layer technology of bitcoin, and is a series of data blocks which are generated by correlation by using a cryptographic method, wherein each data block contains information of a batch of bitcoin network transactions for verifying the validity of the information and generating a next block, so that the Blockchain-based distributed encryption method has important significance.
The distributed encryption method of the embodiment is mainly used for a distributed encryption scene of a terminal, and specifically, the scene mainly comprises three parts: the edge access layer includes an edge device (e.g., a distributed cellular encryption edge device), which may be specifically a terminal (e.g., a mobile phone, a computer, etc.), and implements distributed encryption, generation and transmission of a distributed encryption request, and reception of a distributed encryption scheme. The access layer, including the gateway, enables access to the operator network and data (specifically, a distributed encryption request, a distributed encryption scheme) transmission. And the core layer comprises a core server and is used for analyzing the distributed encryption request and generating a distributed encryption scheme.
The edge device may generate an evaluation index according to a desired distributed encryption index, encryption efficiency (data amount successfully encrypted in unit time/total data amount to be encrypted in unit time), delay rate (data amount not encrypted in unit time/total data amount to be encrypted in unit time), power consumption (power consumed in unit time), and the like, and may further generate a distributed encryption request.
In the distributed encryption scenario of the edge device, the processing flow of the distributed encryption method may be: the edge device generates a distributed encryption request and sends the distributed encryption request to the core server through the gateway, the core server analyzes the distributed encryption request to generate a distributed encryption scheme, and the distributed encryption scheme is sent to the edge device through the gateway.
In the application scenario, the core server is used for analyzing the distributed encryption request to obtain an optimal distributed encryption scheme, and the edge device performs distributed encryption according to the obtained distributed encryption scheme to realize distributed encryption with low delay, low computational power consumption and high encryption efficiency.
The following describes in detail the functions of distributed encryption (i.e., analyzing a plurality of distributed encryption requests to generate a distributed encryption scheme) implemented by the core server of the present embodiment.
Fig. 1 is a flowchart of a distributed encryption method implemented by a core server according to this embodiment, and as shown in fig. 1, the method includes:
s101, obtaining a plurality of distributed encryption requests of the edge device, wherein each distributed encryption request comprises an evaluation index.
Specifically, the plurality of distributed encryption requests may be obtained by the gateway receiving information from the edge device in real time.
And S102, carrying out deep analysis and deep analysis evaluation on the evaluation indexes in the distributed encryption requests to generate a distributed encryption scheme.
S103, sending the distributed encryption scheme to the edge device for the edge device to encrypt according to the distributed encryption scheme.
Fig. 2 is a flowchart of a method for deep analysis and deep analysis evaluation according to this embodiment, and the deep analysis and deep analysis evaluation idea of the present invention is to determine and analyze a distributed encryption request to generate a distributed encryption scheme that meets an evaluation index in the distributed encryption request. The deep analysis of the embodiment combines a multilayer convolution neuron, quantum key distribution and a deep unsupervised learning strategy method to realize distributed encryption with low delay, low computational power consumption and high encryption efficiency.
As shown in fig. 2, the depth analysis and the depth analysis evaluation specifically include the following steps:
and S1021, starting a new iteration loop, clearing the iteration times, setting the maximum iteration times, and setting the iteration parameters of the initial iteration according to the evaluation indexes in the distributed encryption requests.
The maximum number of iterations may be set as needed, and may be specifically 50. If the value of the maximum number of iterations is set too small, it will be inaccurate, and if it is set too large, it is computationally expensive.
When the evaluation indexes are encryption efficiency, delay rate and computational power consumption, the initial parameters are
Figure BDA0002792574560000081
I.e. the encryption efficiency in the evaluation index,
Figure BDA0002792574560000082
the delay rate in the evaluation index is,
Figure BDA0002792574560000083
the calculation power consumption in the evaluation index is obtained.
Wherein, i is 1,2, … m, j is 1,2, … n, t is 1,2, …, p, m is the maximum value of all values of i, n is the maximum value of all values of j, p is the maximum value of all values of t, and m is n is the number of the acquired distributed encryption requests.
And S1022, analyzing iterative parameters by using a multilayer convolution neuron, quantum key distribution and a deep unsupervised learning strategy, and generating a distributed encryption scheme and iterative parameters of next iteration.
In the process of each iteration, the strategy ideas of multilayer convolution neurons, quantum key distribution and deep unsupervised learning strategies are as follows: in a multidimensional space, a plurality of distributed encryption schemes migrate to the direction determined by the optimization task priority scheme according to strategy modes such as multilayer convolution neurons, quantum key distribution, deep unsupervised learning and the like, and parameters are iterated, namely
Figure BDA0002792574560000084
After input, the iteration parameters corresponding to the next iteration are output after multilayer convolution neurons, quantum key distribution and deep unsupervised learning analysis.
Specifically, the iterative parameters are analyzed by using a multilayer convolution neuron, quantum key distribution and deep unsupervised learning strategy, and a distributed encryption scheme is generated, wherein the distributed encryption scheme is generated by using an optimization function;
the optimization function at the kth iteration is:
Figure BDA0002792574560000085
Skey=H{Random[q Mod w]},q∈[1,2,…,+∞],w≤Ω,
Rkey=H{Random[ρMod w]},ρ∈[1,2,…,+∞],w≤Ω,
Figure BDA0002792574560000086
Figure BDA0002792574560000087
wherein H is a hash functionThe number, Random, is a function that generates a Random number, text is data that needs to be encrypted,
Figure BDA0002792574560000091
representing an exclusive or operation.
Figure BDA0002792574560000092
And
Figure BDA0002792574560000093
the condition of the segment verification (dividing Rkey into a plurality of conditions same as the number of q bits) is
Figure BDA0002792574560000094
Skey is the sender random key (of length q, used to encrypt data) corresponding to the remainder of division by some number w no greater than the hash table length.
Rkey is a receiver random key (with length ρ for encrypting data) corresponding to the remainder of division by a number w not greater than the hash table length.
Analyzing iterative parameters by using a multilayer convolution neuron, quantum key distribution and deep unsupervised learning strategy to generate iterative parameters of next iteration, wherein the iterative parameters of next iteration are generated by using a supervision function;
the supervision function at the kth iteration is:
Figure BDA0002792574560000095
Figure BDA0002792574560000096
Figure BDA0002792574560000097
wherein the content of the first and second substances,
Figure BDA0002792574560000098
A Gmax for maximum encryption efficiency, E Gmin Is the minimum delay rate, C Gmin For minimum computational power consumption, mod is the remainder operation.
And S1023, judging whether the iteration number reaches a threshold value, if so, ending the cycle, and outputting the distributed encryption scheme obtained by the iteration as the distributed encryption scheme sent to the edge equipment.
And S1024, if not, evaluating the distributed encryption scheme obtained by the iteration according to the evaluation function, and adding 1 to the iteration number and returning to the step S1022 under the condition that the distributed encryption scheme obtained by the iteration does not meet the evaluation function.
Wherein, the evaluation function in the k iteration is as follows:
Figure BDA0002792574560000101
,
where P represents a probability.
And S1025, under the condition that the distributed encryption scheme obtained by the iteration meets the evaluation function, ending the loop, and outputting the distributed encryption scheme obtained by the iteration as the distributed encryption scheme sent to the edge equipment.
Based on the evaluation function and the optimization function, when the evaluation function is not satisfied, the iterative parameters are analyzed by using a multi-layer convolution neuron, quantum key distribution and deep unsupervised learning strategy, so that the iterative parameters and the generated distributed encryption scheme are shifted to the optimization direction, and distributed encryption with low delay, low computational power consumption and high encryption efficiency is realized.
It should be noted that while the operations of the method of the present invention are depicted in the drawings in a particular order, this does not require or imply that the operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
Having described the method of the exemplary embodiment of the present invention based on the same inventive concept, the distributed encryption apparatus of the exemplary embodiment of the present invention will be described next with reference to fig. 3. The implementation of the device can be referred to the implementation of the method, and repeated details are not repeated. The terms "module" and "unit", as used below, may be software and/or hardware that implements a predetermined function. While the modules described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
Fig. 3 is a block diagram schematically illustrating a distributed encryption apparatus according to an embodiment of the present invention, and as shown in fig. 3, the apparatus includes: the device comprises an acquisition module, an analysis module and a sending module.
The system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a plurality of distributed encryption requests of edge equipment, and each distributed encryption request comprises an evaluation index; the analysis module is used for carrying out deep analysis and deep analysis evaluation on the evaluation indexes in the distributed encryption requests to generate a distributed encryption scheme; and the sending module is used for sending the distributed encryption scheme to the edge equipment so that the edge equipment can encrypt the distributed encryption scheme.
Optionally, fig. 4 is a schematic block diagram of a composition of an analysis module provided in an embodiment of the present invention, and as shown in fig. 4, the analysis module includes: the device comprises an initial unit, an analysis unit, a first judgment unit and a second judgment unit.
The initial unit is used for resetting the iteration times when a new iteration cycle starts, setting the maximum iteration times and setting the iteration parameters of initial iteration according to the evaluation indexes in the distributed encryption requests;
the analysis unit is used for analyzing the iterative parameters by using a multilayer convolution neuron, quantum key distribution and a deep unsupervised learning strategy and generating a distributed encryption scheme and iterative parameters of next iteration;
the first judgment unit is used for judging whether the iteration times reach a threshold value, if so, the circulation is ended, and the distributed encryption scheme obtained by the iteration is output as the distributed encryption scheme sent to the edge equipment;
the second judgment unit is used for evaluating the distributed encryption scheme obtained by the iteration according to the evaluation function when the first judgment unit judges that the iteration frequency does not reach the threshold value, and adding 1 to the iteration frequency under the condition that the distributed encryption scheme obtained by the iteration does not meet the evaluation function; and under the condition that the distributed encryption scheme obtained by the iteration meets the evaluation function, ending the loop, and outputting the distributed encryption scheme obtained by the iteration as the distributed encryption scheme sent to the edge equipment.
Further optionally, in the k-th iteration, the iteration parameter includes encryption efficiency
Figure BDA0002792574560000111
Rate of delay
Figure BDA0002792574560000112
Computing power consumption
Figure BDA0002792574560000113
Wherein i is 1,2, … m,
j=1,2,…n,
t=1,2,…,p,
m is the maximum value of all values of i, n is the maximum value of all values of j, and p is the maximum value of all values of t.
Further optionally, the evaluation function at the kth iteration is:
Figure 3
where P represents a probability.
Further optionally, analyzing iterative parameters by using a multilayer convolution neuron, quantum key distribution and a deep unsupervised learning strategy, and generating a distributed encryption scheme, including generating the distributed encryption scheme by using an optimization function;
the optimization function at the kth iteration is:
Figure BDA0002792574560000122
Skey=H{Random[q Mod w]},q∈[1,2,…,+∞],w≤Ω,
Rkey=H{Random[ρMod w]},ρ∈[1,2,…,+∞],w≤Ω,
Figure BDA0002792574560000123
Figure BDA0002792574560000124
wherein H is a hash function, Random is a function for generating Random numbers, text is data to be encrypted,
Figure BDA0002792574560000125
representing an exclusive or operation.
Further optionally, analyzing iteration parameters by using a multilayer convolution neuron, quantum key distribution and a deep unsupervised learning strategy to generate iteration parameters of next iteration, wherein the generation of the iteration parameters of the next iteration by using a supervision function is included;
the supervision function at the kth iteration is:
Figure BDA0002792574560000126
Figure BDA0002792574560000127
Figure BDA0002792574560000131
wherein the content of the first and second substances,
Figure BDA0002792574560000132
A Gmax for maximum encryption efficiency, E Gmin Is the minimum delay rate, C Gmin For minimum computational power consumption, mod is the remainder operation.
Furthermore, although several modules of the distributed encryption apparatus are mentioned in the above detailed description, such division is not mandatory only. Indeed, the features and functions of two or more of the units described above may be embodied in one unit, according to embodiments of the invention. Also, the features and functions of one unit described above may be further divided into embodiments by a plurality of units.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.

Claims (8)

1. A distributed encryption method, the method comprising:
acquiring a plurality of distributed encryption requests of edge equipment, wherein each distributed encryption request comprises an evaluation index;
carrying out deep analysis and deep analysis evaluation on the evaluation indexes in the distributed encryption requests to generate a distributed encryption scheme;
sending the distributed encryption scheme to edge equipment so that the edge equipment can encrypt according to the distributed encryption scheme;
the deep analysis and deep analysis evaluation of the evaluation indexes in the distributed encryption requests to generate a distributed encryption scheme includes:
starting a new iteration loop, resetting the iteration times, setting the maximum iteration times and setting the iteration parameters of initial iteration according to evaluation indexes in the distributed encryption requests;
analyzing iterative parameters by using a multilayer convolution neuron, quantum key distribution and deep unsupervised learning strategy, and generating a distributed encryption scheme and iterative parameters of next iteration;
judging whether the iteration times reach a threshold value, if so, ending the circulation, and outputting a distributed encryption scheme obtained by the iteration as a distributed encryption scheme sent to the edge equipment;
if not, evaluating the distributed encryption scheme obtained by the iteration according to an evaluation function, and under the condition that the distributed encryption scheme obtained by the iteration does not meet the evaluation function, adding 1 to the iteration number, returning to the step of analyzing the iteration parameters by using a multilayer convolution neuron, quantum key distribution and deep unsupervised learning strategy, and generating the distributed encryption scheme and the iteration parameters of the next iteration;
and under the condition that the distributed encryption scheme obtained by the iteration meets the evaluation function, ending the loop, and outputting the distributed encryption scheme obtained by the iteration as the distributed encryption scheme sent to the edge equipment.
2. The method of claim 1,
at the k iteration, the iteration parameter comprises encryption efficiency
Figure FDA0003699997930000011
Rate of delay
Figure FDA0003699997930000012
Computing power consumption
Figure FDA0003699997930000021
Wherein the content of the first and second substances,
i=1,2,…m,
j=1,2,…n,
t=1,2,…,p,
m is the maximum value of all values of i, n is the maximum value of all values of j, p is the maximum value of all values of t, and k is a natural number.
3. The method of claim 2,
the evaluation function at the kth iteration is:
Figure FDA0003699997930000022
where P represents a probability.
4. The method of claim 3, wherein analyzing iterative parameters with a multi-layer convolutional neuron, quantum key distribution, deep unsupervised learning strategy, and generating a distributed encryption scheme comprises generating a distributed encryption scheme with an optimization function;
the optimization function at the kth iteration is:
Figure FDA0003699997930000023
the generating the distributed encryption scheme by the optimization function comprises the following steps:
Skey=H{Random[q Mod w]},q∈[1,2,L,+∞],w≤Ω,
Rkey=H{Random[ρMod w]},ρ∈[1,2,L,+∞],w≤Ω,
Figure FDA0003699997930000024
Figure FDA0003699997930000025
wherein H is a hash function, Random is a function for generating Random numbers, text is data to be encrypted,
Figure FDA0003699997930000026
denotes an exclusive OR operation, Ω is a predetermined value, and R (text) is a generated scoreA distributed encryption scheme.
5. The method of claim 3, wherein analyzing the iterative parameters with a multi-layer convolutional neuron, quantum key distribution, and deep unsupervised learning strategy to generate iterative parameters for a next iteration, including generating iterative parameters for a next iteration with a supervision function;
the supervision function at the kth iteration is:
Figure FDA0003699997930000031
Figure FDA0003699997930000032
Figure FDA0003699997930000033
wherein the content of the first and second substances,
Figure 1
A Gmax for maximum encryption efficiency, E Gmin Is the minimum delay rate, C Gmin For minimum computational power consumption, mod is the remainder operation.
6. A distributed encryption apparatus, the apparatus comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a plurality of distributed encryption requests of edge equipment, and each distributed encryption request comprises an evaluation index;
the analysis module is used for carrying out deep analysis and deep analysis evaluation on the evaluation indexes in the distributed encryption requests to generate a distributed encryption scheme;
a sending module, configured to send the distributed encryption scheme to an edge device, so that the edge device encrypts according to the distributed encryption scheme;
the analysis module comprises:
the initial unit is used for resetting the iteration times when a new iteration cycle starts, setting the maximum iteration times and setting the iteration parameters of initial iteration according to the evaluation indexes in the distributed encryption requests;
the analysis unit is used for analyzing the iterative parameters by using a multilayer convolution neuron, quantum key distribution and a deep unsupervised learning strategy and generating a distributed encryption scheme and iterative parameters of next iteration;
the first judgment unit is used for judging whether the iteration times reach a threshold value, if so, the circulation is ended, and the distributed encryption scheme obtained by the iteration is output as the distributed encryption scheme sent to the edge equipment;
the second judgment unit is used for evaluating the distributed encryption scheme obtained by the iteration according to the evaluation function when the first judgment unit judges that the iteration frequency does not reach the threshold value, and adding 1 to the iteration frequency under the condition that the distributed encryption scheme obtained by the iteration does not meet the evaluation function;
and under the condition that the distributed encryption scheme obtained by the iteration meets the evaluation function, ending the loop, and outputting the distributed encryption scheme obtained by the iteration as the distributed encryption scheme sent to the edge equipment.
7. The apparatus of claim 6,
at the k iteration, the iteration parameter comprises encryption efficiency
Figure FDA0003699997930000041
Rate of delay
Figure FDA0003699997930000042
Computing power consumption
Figure FDA0003699997930000043
Wherein the content of the first and second substances,
i=1,2,…m,
j=1,2,…n,
t=1,2,…,p,
m is the maximum value of all values of i, n is the maximum value of all values of j, and p is the maximum value of all values of t.
8. The apparatus of claim 7,
the evaluation function at the kth iteration is:
Figure FDA0003699997930000044
where P represents a probability.
CN202011319982.2A 2020-11-23 2020-11-23 Distributed encryption method and device Active CN112491862B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011319982.2A CN112491862B (en) 2020-11-23 2020-11-23 Distributed encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011319982.2A CN112491862B (en) 2020-11-23 2020-11-23 Distributed encryption method and device

Publications (2)

Publication Number Publication Date
CN112491862A CN112491862A (en) 2021-03-12
CN112491862B true CN112491862B (en) 2022-08-02

Family

ID=74933402

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011319982.2A Active CN112491862B (en) 2020-11-23 2020-11-23 Distributed encryption method and device

Country Status (1)

Country Link
CN (1) CN112491862B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104392393A (en) * 2014-11-20 2015-03-04 三峡大学 DEMATEL-ANP-VIKOR mixed selection method of power system security risk reduction schemes
CN106453546A (en) * 2016-10-08 2017-02-22 电子科技大学 Distributed storage scheduling method
CN108235313A (en) * 2017-12-14 2018-06-29 佛山科学技术学院 A kind of method for building key management system high efficiency evaluation model
CN108924198A (en) * 2018-06-21 2018-11-30 中国联合网络通信集团有限公司 A kind of data dispatching method based on edge calculations, apparatus and system
CN110113203A (en) * 2019-04-30 2019-08-09 阿里巴巴集团控股有限公司 A kind of method and apparatus of the safety evaluation for Encryption Model
CN110533816A (en) * 2019-09-03 2019-12-03 中国联合网络通信集团有限公司 A kind of remote encryption method and apparatus of the authorization fingerprint of electronic fingerprint lock
CN111597274A (en) * 2020-07-23 2020-08-28 南京数科安金信息技术有限公司 Data distributed encryption storage system
CN111600707A (en) * 2020-05-15 2020-08-28 华南师范大学 Decentralized federal machine learning method under privacy protection

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9613190B2 (en) * 2014-04-23 2017-04-04 Intralinks, Inc. Systems and methods of secure data exchange
US11451369B2 (en) * 2019-04-16 2022-09-20 Nec Corporation Method and system for multi-authority controlled functional encryption

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104392393A (en) * 2014-11-20 2015-03-04 三峡大学 DEMATEL-ANP-VIKOR mixed selection method of power system security risk reduction schemes
CN106453546A (en) * 2016-10-08 2017-02-22 电子科技大学 Distributed storage scheduling method
CN108235313A (en) * 2017-12-14 2018-06-29 佛山科学技术学院 A kind of method for building key management system high efficiency evaluation model
CN108924198A (en) * 2018-06-21 2018-11-30 中国联合网络通信集团有限公司 A kind of data dispatching method based on edge calculations, apparatus and system
CN110113203A (en) * 2019-04-30 2019-08-09 阿里巴巴集团控股有限公司 A kind of method and apparatus of the safety evaluation for Encryption Model
CN110533816A (en) * 2019-09-03 2019-12-03 中国联合网络通信集团有限公司 A kind of remote encryption method and apparatus of the authorization fingerprint of electronic fingerprint lock
CN111600707A (en) * 2020-05-15 2020-08-28 华南师范大学 Decentralized federal machine learning method under privacy protection
CN111597274A (en) * 2020-07-23 2020-08-28 南京数科安金信息技术有限公司 Data distributed encryption storage system

Also Published As

Publication number Publication date
CN112491862A (en) 2021-03-12

Similar Documents

Publication Publication Date Title
US20210158216A1 (en) Method and system for federated learning
US11196541B2 (en) Secure machine learning analytics using homomorphic encryption
Li et al. Lightweight blockchain consensus mechanism and storage optimization for resource-constrained IoT devices
Liu et al. Decentralized federated learning: Balancing communication and computing costs
Chen et al. Secure cloud storage meets with secure network coding
CN111639361A (en) Block chain key management method, multi-person common signature method and electronic device
US9641340B2 (en) Certificateless multi-proxy signature method and apparatus
CN112104619A (en) Data access control system and method based on outsourcing ciphertext attribute encryption
Xie et al. Blockchain-based cloud data integrity verification scheme with high efficiency
JP7209431B2 (en) Digital signature method, signature information verification method, related device and electronic device
CN112631550A (en) Block chain random number generation method, device, equipment and computer storage medium
EP4226568A1 (en) Updatable private set intersection
CN114358782A (en) Block chain transaction auditing method, device, equipment and storage medium
CN113626875A (en) Knowledge graph file storage method for block chain fragment enabling
Wu et al. Robust and auditable distributed data storage with scalability in edge computing
CN112491862B (en) Distributed encryption method and device
CN113609533A (en) Integrity auditing method for smart power grid data
CN111641636A (en) Method, system, equipment and storage medium for data security communication of Internet of things
US20230195940A1 (en) Blockchain-based data processing method and apparatus, device, and storage medium
CN116528226A (en) Security monitoring method and system based on remote module wireless communication
CN116582242A (en) Safe federal learning method of ciphertext and plaintext hybrid learning mode
Li et al. Mimic computing for password recovery
CN113469377B (en) Federal learning auditing method and device
Wang et al. Secret sharing scheme with dynamic size of shares for distributed storage system
KR102019558B1 (en) Efficient signature verification method for digital signatures using implicit certificates

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant