CN113343000A - Image encryption method and device based on national cryptographic algorithm, electronic equipment and medium - Google Patents

Image encryption method and device based on national cryptographic algorithm, electronic equipment and medium Download PDF

Info

Publication number
CN113343000A
CN113343000A CN202110536159.5A CN202110536159A CN113343000A CN 113343000 A CN113343000 A CN 113343000A CN 202110536159 A CN202110536159 A CN 202110536159A CN 113343000 A CN113343000 A CN 113343000A
Authority
CN
China
Prior art keywords
image
encrypted
encryption
index
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110536159.5A
Other languages
Chinese (zh)
Inventor
毛紫薇
李克勤
麻志毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced Institute of Information Technology AIIT of Peking University
Hangzhou Weiming Information Technology Co Ltd
Original Assignee
Advanced Institute of Information Technology AIIT of Peking University
Hangzhou Weiming Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced Institute of Information Technology AIIT of Peking University, Hangzhou Weiming Information Technology Co Ltd filed Critical Advanced Institute of Information Technology AIIT of Peking University
Priority to CN202110536159.5A priority Critical patent/CN113343000A/en
Publication of CN113343000A publication Critical patent/CN113343000A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/51Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The application discloses an image encryption method and device based on a cryptographic algorithm, electronic equipment and a medium. In the method, a convolutional neural network model can be utilized to extract the multidimensional characteristic vector of the image to be encrypted, and the multidimensional characteristic vector is used as a retrieval index of the image to be encrypted; encrypting the image to be encrypted to obtain a corresponding encrypted image; carrying out encryption processing on the retrieval index by using a state-secret symmetric block encryption algorithm to obtain a corresponding encryption index; and uploading the encrypted image and the encrypted index to a cloud server. By applying the technical scheme of the application, the SM 9/SM 4 algorithm can be used in the field of encrypted image retrieval. The cloud storage, safe encryption and quick retrieval solution of the image is provided, the limitation of a user storage space is solved, and the data safety, the use efficiency and the sharing capability are improved.

Description

Image encryption method and device based on national cryptographic algorithm, electronic equipment and medium
Technical Field
The present application relates to data processing technologies, and in particular, to an image encryption method and apparatus based on a cryptographic algorithm, an electronic device, and a medium.
Background
With the rapid development of cloud computing and cloud storage technologies, more and more enterprises and personal users store and share image data in the cloud through the internet. In one aspect, this flexible image data storage and access mechanism provides a solution for remote access and data sharing in a multi-user operational scenario. The user uploads the image data of the user to the cloud for storage, and other users can access the cloud to view and download images. On the other hand, cloud storage data leakage accidents frequently occur. The images uploaded to the cloud may contain privacy and sensitive information, such as medical images and satellite remote sensing images, and the leakage of the images will have serious consequences, which may result in leakage of user privacy and economic loss. Security of the cloud-stored image becomes especially important.
Further, in order to prevent leakage of cloud storage data, the most effective solution is to encrypt the data and upload the encrypted data to the cloud. At the same time, however, the encryption methods of the prior art make it difficult to retrieve encrypted data, especially encrypted images. Therefore, how to implement a completely new encryption method becomes a problem to be solved by those skilled in the art.
Disclosure of Invention
The embodiment of the present application provides an image encryption method, an image encryption device, an electronic device and a medium based on a national cryptographic algorithm, wherein according to an aspect of the embodiment of the present application, the provided image encryption method based on the national cryptographic algorithm is applied to a key generation server, and includes:
generating an encrypted master key pair, wherein the encrypted master key pair is obtained by calculation based on a random number and a public parameter;
generating an encrypted private key, wherein the encrypted private key is obtained by calculation based on a random number, a public parameter and a client identifier;
and respectively sending the encrypted master key pair and the encrypted private key to a client, wherein the client comprises an image client and a search client.
According to an aspect of the embodiments of the present application, an image encryption method based on a cryptographic algorithm is provided, which is applied to an image client, and includes:
extracting a multidimensional characteristic vector of an image to be encrypted by using a convolutional neural network model, and taking the multidimensional characteristic vector as a retrieval index of the image to be encrypted;
encrypting the image to be encrypted to obtain a corresponding encrypted image;
encrypting the retrieval index by using a state symmetric block encryption algorithm to obtain a corresponding encryption index;
and uploading the encrypted image and the encrypted index to a cloud server.
Optionally, in another embodiment based on the foregoing method of the present application, the encrypting the image to be encrypted to obtain a corresponding encrypted image includes:
performing RGB three-channel separation on the image to be encrypted respectively to obtain three corresponding sets of channel data;
respectively encrypting the channel data based on a SM4 symmetric packet encryption algorithm to obtain three groups of corresponding encrypted channel data;
and merging the channels of the three groups of first encrypted channel data to obtain the encrypted image.
Optionally, in another embodiment based on the foregoing method of the present application, the uploading the encryption map and the encryption index to a cloud server includes:
generating image attribute information corresponding to the encrypted image;
uploading the encrypted image and the corresponding image attribute information to a database table of the user;
uploading the encryption graph and the encryption index to the cloud server.
Optionally, in another embodiment based on the foregoing method of the present application, before the extracting, by using a convolutional neural network model, a multidimensional feature vector of an image to be encrypted, the method further includes:
after the encrypted private key is obtained, carrying out key agreement with the search client by using an SM9 identification cryptographic algorithm to obtain a secret key, wherein the secret key is used for encryption and decryption of images and encryption and decryption of indexes.
According to an aspect of the embodiments of the present application, an image encryption method based on a cryptographic algorithm is provided, which is applied to a search client, and includes:
sending a search request for inquiring a target encrypted image to a cloud server, wherein the search request comprises encrypted index information of the target encrypted image;
and receiving the target encrypted image sent by the cloud server.
Optionally, in another embodiment based on the foregoing method of the present application, after receiving the target encrypted image sent by the cloud server, the method further includes:
carrying out RGB three-channel separation on the target encrypted image respectively to obtain three corresponding groups of channel data;
decrypting the three groups of channel data based on an SM4 symmetric grouping algorithm by using an encrypted private key and a client identifier corresponding to the search client to obtain decrypted three groups of channel data;
and merging the channels of the three groups of channel data to obtain a decrypted image to be searched.
Optionally, in another embodiment based on the foregoing method of the present application, before the sending a search request for querying a target encrypted image to a cloud server, the method further includes:
after the encryption private key is obtained, a SM9 identification cryptographic algorithm is used for carrying out key agreement with the image client side to obtain a secret key, and the secret key is used for encryption and decryption of the image and encryption and decryption of the index.
Optionally, in another embodiment based on the foregoing method of the present application, before the sending, to the cloud server, a search request for querying a target encrypted image, the method further includes:
if the plaintext image corresponding to the target encrypted image is determined to be received, extracting a feature vector of the plaintext image;
generating index information based on the feature vector corresponding to the plaintext image;
and matching the index information with the encryption index, and taking the image corresponding to the successfully matched encryption index as the target encryption image.
According to an aspect of the embodiments of the present application, an image encryption method based on a cryptographic algorithm is provided, which is applied to a cloud server, and includes:
receiving a search request which is sent by a search client and used for inquiring a target encrypted image, wherein the search request comprises encrypted index information of the target encrypted image;
obtaining the target encrypted image based on the search request;
and returning the target encrypted image to the search client.
Optionally, in another embodiment based on the foregoing method of the present application, the obtaining the target encrypted image based on the search request includes:
if the search request is determined to include the encryption index information of the target encryption image, obtaining a retrieval condition based on the search request;
traversing the index list, respectively calculating Euclidean distances between each retrieval condition and the encrypted index information, and sequencing the Euclidean distances according to the size relationship to obtain an Euclidean distance set;
selecting encryption indexes corresponding to Euclidean distances in a preset range in the Euclidean distance set as target indexes;
and taking the encrypted image corresponding to the target index as the target encrypted image.
According to another aspect of the embodiments of the present application, there is provided an image encryption system based on a cryptographic algorithm, including:
the system comprises a key generation server, a search client and a server, wherein the key generation server is configured to generate an encrypted master key pair and an encrypted private key and respectively send the encrypted master key pair and the encrypted private key to the clients, and the clients comprise an image client and a search client;
the image client is configured to extract a multi-dimensional feature vector of an image to be encrypted, take the multi-dimensional feature vector as a retrieval index of the image to be encrypted, encrypt the image to be encrypted and the retrieval index, and upload the encrypted image and the encryption index to a cloud server;
the search client is configured to send a search request for inquiring a target encrypted image to a cloud server and receive the target encrypted image sent by the cloud server;
the cloud server is configured to return the target encrypted image to the search client after receiving the search request sent by the search client.
According to another aspect of the embodiments of the present application, there is provided an image encryption apparatus based on a cryptographic algorithm, applied to an image client, including:
the extraction module is configured to extract a multi-dimensional feature vector of an image to be encrypted by using a convolutional neural network model, and the multi-dimensional feature vector is used as a retrieval index of the image to be encrypted;
the generating module is configured to encrypt the image to be encrypted to obtain a corresponding encrypted image;
the encryption module is configured to encrypt the retrieval index by using a state symmetric block encryption algorithm to obtain a corresponding encryption index;
a sending module configured to upload the encrypted image and the encryption index to a cloud server.
According to another aspect of the embodiments of the present application, there is provided an image encryption apparatus based on a cryptographic algorithm, applied to a search client, including:
a query module configured to send a search request for querying a target encrypted image to a cloud server, the search request including encryption index information of the target encrypted image;
a receiving module configured to receive the target encrypted image sent by the cloud server.
According to another aspect of the embodiments of the present application, there is provided an electronic device including:
a memory for storing executable instructions; and
a display for displaying with the memory to execute the executable instructions to perform the operations of any one of the cryptographic algorithm based image encryption methods described above.
According to a further aspect of the embodiments of the present application, there is provided a computer-readable storage medium for storing computer-readable instructions, which when executed, perform the operations of any one of the image encryption methods based on the cryptographic algorithm.
In the method, a convolutional neural network model can be utilized to extract the multidimensional characteristic vector of the image to be encrypted, and the multidimensional characteristic vector is used as a retrieval index of the image to be encrypted; encrypting the image to be encrypted to obtain a corresponding encrypted image; carrying out encryption processing on the retrieval index by using a state-secret symmetric block encryption algorithm to obtain a corresponding encryption index; and uploading the encrypted image and the encrypted index to a cloud server. By applying the technical scheme of the application, the SM 9/SM 4 algorithm can be used in the field of encrypted image retrieval. The cloud storage, safe encryption and quick retrieval solution of the image is provided, the limitation of a user storage space is solved, and the data safety, the use efficiency and the sharing capability are improved.
The technical solution of the present application is further described in detail by the accompanying drawings and examples.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description, serve to explain the principles of the application.
The present application may be more clearly understood from the following detailed description with reference to the accompanying drawings, in which:
fig. 1 is a schematic diagram of image encryption based on a cryptographic algorithm according to the present application;
FIG. 2 is a block diagram of an image encryption system architecture for the cryptographic algorithm proposed in the present application;
3-5 are schematic diagrams of still another image encryption based on the cryptographic algorithm proposed in the present application;
6-7 are schematic structural diagrams of the image encryption electronic device based on the cryptographic algorithm proposed in the present application;
fig. 8 is a schematic structural diagram of an electronic device for image encryption based on a cryptographic algorithm according to the present application.
Detailed Description
Various exemplary embodiments of the present application will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present application unless specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the application, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
In addition, technical solutions between the various embodiments of the present application may be combined with each other, but it must be based on the realization of the technical solutions by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination of technical solutions should be considered to be absent and not within the protection scope of the present application.
It should be noted that all the directional indicators (such as upper, lower, left, right, front and rear … …) in the embodiment of the present application are only used to explain the relative position relationship between the components, the motion situation, etc. in a specific posture (as shown in the drawings), and if the specific posture is changed, the directional indicator is changed accordingly.
An image encryption method for performing a cryptographic algorithm according to an exemplary embodiment of the present application is described below with reference to fig. 1 to 5. It should be noted that the following application scenarios are merely illustrated for the convenience of understanding the spirit and principles of the present application, and the embodiments of the present application are not limited in this respect. Rather, embodiments of the present application may be applied to any scenario where applicable.
The application also provides an image encryption method and device based on the national cryptographic algorithm, a target terminal and a medium.
Fig. 1 schematically shows a flowchart of an image encryption method based on a cryptographic algorithm according to an embodiment of the present application. As shown in fig. 1, the method is applied to a key generation server, and includes:
s101, generating an encryption master key pair, wherein the encryption master key pair is obtained by calculation based on a random number and a public parameter.
S102, generating an encryption private key, wherein the encryption private key is obtained by calculation based on a random number, a public parameter and a client identifier.
S103, the encrypted master key pair and the encrypted private key are respectively sent to the client.
As shown in fig. 2, the present technical solution may include a cloud server (CS, cloud server), an image client (DO, data owner), a search client (SU), and a key generation server (KGC).
Wherein, the cloud server is: the cloud storage space comprises an image storage area and an index storage area, and the cloud computing content comprises image uploading, retrieval, downloading and the like.
The image client is as follows: and the image data owner extracts the features of the uploaded image to construct an index, encrypts the image and the index by using the encryption key and uploads the image and the index to the cloud server.
The search client is as follows: and submitting a search request to the cloud server, acquiring the encrypted image, and decrypting the image by using the encryption key.
The key generation server is: and the trusted third-party server is used for generating a public and private key pair required by client encryption.
Further, the present application may generate, by the key generation server, the corresponding pair of encrypted master keys and the corresponding encrypted private key for the client using the key generation algorithm specified in the SM9 identification algorithm. It should be noted that the number of the encryption private keys may be two, one corresponds to the image client, and the other corresponds to the search client.
Specifically, the key generation server may calculate the corresponding encrypted private key by using the random number, the public parameter, and the client identifier. And respectively sending the encrypted master key pair and the encrypted private key to the image client and the search client.
The key generation server is the server where the trusted authority responsible for selecting the system parameters, generating the master key and generating the user private key is located in the SM9 identification password. And for the SM9algorithm (SM9algorithm) is a country cipher algorithm based on identification. The identification password takes the identification of the user as a public key, and omits the process of exchanging a digital certificate and the public key, so that the security system becomes easy to deploy and manage, and is very suitable for various occasions of end-to-end off-line security communication, cloud data encryption, attribute-based encryption and policy-based encryption.
In the method, a convolutional neural network model can be utilized to extract the multidimensional characteristic vector of the image to be encrypted, and the multidimensional characteristic vector is used as a retrieval index of the image to be encrypted; encrypting the image to be encrypted to obtain a corresponding encrypted image; carrying out encryption processing on the retrieval index by using a state-secret symmetric block encryption algorithm to obtain a corresponding encryption index; and uploading the encrypted image and the encrypted index to a cloud server. By applying the technical scheme of the application, the SM 9/SM 4 algorithm can be used in the field of encrypted image retrieval. The cloud storage, safe encryption and quick retrieval solution of the image is provided, the limitation of a user storage space is solved, and the data safety, the use efficiency and the sharing capability are improved.
Fig. 3 schematically shows a flowchart of an image encryption method based on a cryptographic algorithm according to an embodiment of the present application. As shown in fig. 3, the method is applied to an image client, and includes:
s201, extracting the multidimensional characteristic vector of the image to be encrypted by using the convolutional neural network model, and taking the multidimensional characteristic vector as a retrieval index of the image to be encrypted.
S202, encrypting the image to be encrypted to obtain a corresponding encrypted image.
S203, the retrieval index is encrypted by using a state symmetric block encryption algorithm to obtain a corresponding encryption index.
And S204, uploading the encrypted image and the encrypted index to a cloud server.
Further, the method can be used for extracting the m-dimensional feature vectors of the n images to be encrypted to be uploaded by the image client side by using a deep learning Convolutional Neural Network (CNN) method. And storing the characteristic vectors of the n images to be encrypted into a preset storage area of the device, and using the characteristic vectors as a plaintext retrieval index of the images.
Optionally, in a possible implementation manner of the present application, encrypting an image to be encrypted to obtain a corresponding encrypted image includes:
performing RGB three-channel separation on the image to be encrypted respectively to obtain three corresponding sets of channel data;
respectively encrypting the channel data based on a SM4 symmetric packet encryption algorithm to obtain three corresponding groups of first encrypted channel data;
and carrying out three-channel combination on the three groups of first encryption channel data to obtain an encrypted image.
Furthermore, the method can respectively carry out RGB three-channel separation C on the n images to be encryptedi={Ci1,Ci2,Ci31, 2, …, n. So as to split the image into three channels of data. Three-channel data C after splitting imagei1、Ci2、Ci3As input, the image data is encrypted using the KeyGenSm4() function based on the SM4 symmetric block encryption algorithm to obtain encrypted three-channel data ECL=KeyGenSm4(CL,SKλ);ECl2=KeyGenSm4(Cl2,SKλ);
ECl3=KeyGenSm4(Cl3,Skλ). Finally, the three channels can be combined after the image is encrypted, and finally the encrypted image { EC ] is obtained1,EC2,…,ECn}。
Optionally, in a possible implementation manner of the present application, uploading the encryption map and the encryption index to a cloud server includes:
generating image attribute information corresponding to the encrypted image;
uploading the encrypted image and the corresponding image attribute information to a database table of the user;
and uploading the encrypted image and the encrypted index to a cloud server.
Optionally, in a possible implementation manner of the present application, before extracting the multidimensional feature vector of the image to be encrypted by using the convolutional neural network model, the method further includes:
after the encrypted private key is obtained, carrying out key agreement with the search client by using an SM9 identification cryptographic algorithm to obtain a secret key, wherein the secret key is used for encryption and decryption of images and encryption and decryption of indexes.
Further, in the present application, after the image client receives the plaintext index, the image client may use the plaintext index as an input, encrypt the index data using the keygen SM4() function of the symmetric block cipher algorithm of the country cipher SM4, and extend and add the obfuscation parameter to obtain the final encrypted index
EIl=(KeyGerSm4(Il)×Γ+εl)÷Γ,Γ≥2|max(εl) Where Γ is a random number is for each index IiGeneratingThe random error vector of (2). The encryption index is stored in the storage area.
Among them, the symmetric block encryption algorithm of SM4 is a block encryption algorithm defined by GB/T32907.
In addition, the image client can also acquire attribute information of the encrypted image, and upload the attribute information and the database table of the encrypted index image client, and upload the encrypted index after the image is encrypted to the cloud server.
Fig. 4 schematically shows a flowchart of an image encryption method based on a cryptographic algorithm according to an embodiment of the present application. As shown in fig. 4, the method is applied to a search client, and includes:
s301, sending a search request for inquiring the target encrypted image to the cloud server, wherein the search request comprises the encrypted index information of the target encrypted image.
S302, receiving the target encrypted image sent by the cloud server.
Optionally, in a possible implementation manner of the present application, after receiving the target encrypted image sent by the cloud server, the method further includes:
carrying out RGB three-channel separation on the target encrypted image respectively to obtain three corresponding groups of channel data;
decrypting the three groups of channel data based on an SM4 symmetric grouping algorithm by using the encrypted private key and the client identification corresponding to the search client to obtain decrypted three groups of channel data;
and carrying out three-channel combination on the three groups of channel data to obtain the decrypted image to be searched.
Optionally, in a possible implementation manner of the present application, before sending, to the cloud server, a search request for querying a target encrypted image, the method further includes:
after the encryption private key is obtained, a SM9 identification cryptographic algorithm is used for carrying out key agreement with the image client side to obtain a secret key, and the secret key is used for encryption and decryption of the image and encryption and decryption of the index.
Optionally, in a possible implementation manner of the present application, before sending, to the cloud server, a search request for querying a target encrypted image, the method further includes:
if the fact that the plaintext image corresponding to the target encrypted image is received is determined, extracting a feature vector of the plaintext image;
generating index information based on the feature vector corresponding to the plaintext image;
and matching the index information with the encryption index, and taking the image corresponding to the successfully matched encryption index as a target encryption image.
In one way, the way for searching the images by the search client can be to perform image search by using plaintext images (i.e., to search images). Specifically, for searching the image by using the image, the search client may generate an index according to the feature vector of the extracted search image, match the index information with the encryption index stored in the cloud server, and use the image corresponding to the encryption index successfully matched as the target encryption image.
Fig. 5 schematically shows a flowchart of an image encryption method based on a cryptographic algorithm according to an embodiment of the present application. As shown in fig. 5, the method is applied to a cloud server, and includes:
s401, receiving a search request which is sent by a search client and used for inquiring a target encrypted image, wherein the search request comprises encrypted index information of the target encrypted image;
s402, obtaining the target encrypted image based on the search request;
and S403, returning the target encrypted image to the search client.
Optionally, in a possible implementation manner of the present application, the obtaining the target encrypted image based on the search request includes:
and if the search request is determined to include the encryption index information of the target encryption image, obtaining a retrieval condition based on the search request.
And traversing the index list, respectively calculating the Euclidean distances between each retrieval condition and the encrypted index information, and sequencing the Euclidean distances according to the size relationship to obtain an Euclidean distance set.
And selecting the encryption indexes corresponding to the Euclidean distances sequenced in a preset range from the Euclidean distance set as target indexes.
And taking the encrypted image corresponding to the target index as a target encrypted image.
Optionally, in a possible implementation manner of the present application, obtaining the target encrypted image based on the search request includes:
if the search request is determined to include the encryption index information of the target encryption image, obtaining a retrieval condition based on the search request;
traversing the index list, respectively calculating Euclidean distances between each retrieval condition and the encrypted index information, and sequencing the Euclidean distances according to the size relationship to obtain an Euclidean distance set;
selecting encryption indexes corresponding to Euclidean distances in a preset range in the Euclidean distance set as target indexes;
and taking the encrypted image corresponding to the target index as a target encrypted image.
The method for requesting the cloud server to search for the image by the search client may be to search for the image by using an encrypted index. Specifically, for encrypted index search, after the cloud server receives a search request, the cloud server may read the search request to obtain a search condition EQ, execute an image search ImSearch () function, and look up the table sm _ encryption _ image _ index to obtain an encrypted index { EI {1,EI2,…,EIn}. Then, the EI is calculated by traversing the index listi(i ═ 1, 2, …, n) and EQ:
Figure BDA0003069714660000121
where m is the index vector EIiOf (c) is calculated.
Furthermore, in the embodiment of the present application, an encrypted index corresponding to the euclidean distance sorted in the preset range may be selected from the set of euclidean distances as the target index, and an encrypted image corresponding to the target index may be used as the target encrypted image. The preset range can be the first 3 with the minimum sequencing range, or the first five with the minimum sequencing range, and the like.
The application discloses an image encryption method and device based on a cryptographic algorithm, electronic equipment and a medium. In the method, a convolutional neural network model can be utilized to extract the multidimensional characteristic vector of the image to be encrypted, and the multidimensional characteristic vector is used as a retrieval index of the image to be encrypted; encrypting the image to be encrypted to obtain a corresponding encrypted image; carrying out encryption processing on the retrieval index by using a state-secret symmetric block encryption algorithm to obtain a corresponding encryption index; and uploading the encrypted image and the encrypted index to a cloud server. By applying the technical scheme of the application, the SM 9/SM 4 algorithm can be used in the field of encrypted image retrieval. The cloud storage, safe encryption and quick retrieval solution of the image is provided, the limitation of a user storage space is solved, and the data safety, the use efficiency and the sharing capability are improved.
Optionally, the present application further includes an image encryption system based on a cryptographic algorithm, which may include the following components:
the system comprises a key generation server, a search client and a server, wherein the key generation server is configured to generate an encrypted master key pair and an encrypted private key and respectively send the encrypted master key pair and the encrypted private key to the clients, and the clients comprise an image client and a search client;
the image client is configured to extract a multi-dimensional feature vector of an image to be encrypted, take the multi-dimensional feature vector as a retrieval index of the image to be encrypted, encrypt the image to be encrypted and the retrieval index, and upload the encrypted image and the encryption index to a cloud server;
the search client is configured to send a search request for inquiring a target encrypted image to a cloud server and receive the target encrypted image sent by the cloud server;
the cloud server is configured to return the target encrypted image to the search client after receiving the search request sent by the search client.
Further, in the image encryption system of the present application, the key generation server, the image client, the search client, and the cloud server may be comprised of the following steps:
step 1: and the key generation server generates a required public and private key pair of the image client and the search client respectively. Step 2: the image client and the search client negotiate a secret key according to a preset encryption algorithm (e.g., SM9 key exchange protocol). And step 3: and the image client extracts the image characteristic vector and establishes a retrieval index. And 4, step 4: the image client encrypts the image and index using an encryption algorithm, such as the cryptographic SM4 encryption algorithm. And 5: and the image client uploads the encrypted image and the encrypted index to the cloud server. Step 6: and the search client searches in the cloud server to obtain a search result. And 7: and the searching client decrypts the encrypted image obtained by searching.
Specifically, the key generation server generates a corresponding pair of encryption master keys and an encryption private key corresponding to the client by using a key generation algorithm specified in the SM9 identification algorithm. It should be noted that the number of the encryption private keys may be two, one corresponds to the image client, and the other corresponds to the search client.
In addition, for the image client, an m-dimensional feature vector of n images to be encrypted to be uploaded may be extracted by the image client using a deep learning Convolutional Neural Network (CNN) method. And storing the characteristic vectors of the n images to be encrypted into a preset storage area of the device, and using the characteristic vectors as a plaintext retrieval index of the images. Furthermore, RGB three-channel separation can be performed on the image to be encrypted respectively to obtain three corresponding sets of channel data, encryption processing is performed on each channel data respectively based on a SM4 symmetric grouping encryption algorithm to obtain three corresponding sets of first encrypted channel data, and finally three channels of the three sets of first encrypted channel data are combined to obtain the encrypted image.
Furthermore, for the search client, the RGB three-channel separation may be performed on the target encrypted image, so as to obtain three corresponding sets of channel data, and then the SM 4-based symmetric grouping algorithm is performed on the three sets of channel data to decrypt the three sets of channel data by using the encryption private key and the client identifier corresponding to the search client, so as to obtain three decrypted sets of channel data, so that the three sets of channel data are subjected to three-channel combination, so as to obtain a decrypted image to be searched.
Finally, for the cloud server, if it is determined that the search request includes the encrypted index information of the target encrypted image, based on the search request, after the search condition is obtained, traversing the index list, respectively calculating the euclidean distances between each search condition and the encrypted index information, and sequentially sorting the euclidean distances according to the size relationship to obtain a set of euclidean distances, so that the encrypted indexes corresponding to the euclidean distances sorted in the preset range can be selected in the set of euclidean distances in the following process as the target indexes, and the encrypted images corresponding to the target indexes are taken as the target encrypted images.
Optionally, in another embodiment of the present application, as shown in fig. 6, the present application further provides an image encryption apparatus based on a cryptographic algorithm. The method is applied to an image client, and comprises an extraction module 501, a generation module 502, an encryption module 503, and a sending module 504, wherein:
an extracting module 501, configured to extract a multidimensional feature vector of an image to be encrypted by using a convolutional neural network model, and use the multidimensional feature vector as a retrieval index of the image to be encrypted;
a generating module 502 configured to encrypt the image to be encrypted to obtain a corresponding encrypted image;
the encryption module 503 is configured to encrypt the search index by using a cryptographic symmetric block encryption algorithm to obtain a corresponding encryption index;
a sending module 504 configured to upload the encrypted image and the encrypted index to a cloud server.
Optionally, in another embodiment of the present application, as shown in fig. 7, the present application further provides an image encryption apparatus based on a cryptographic algorithm. The method is applied to a search client, and comprises a query module 505 and a receiving module 506, wherein:
a query module 505 configured to send a search request for querying a target encrypted image to a cloud server, the search request including encryption index information of the target encrypted image;
a receiving module 506 configured to receive the target encrypted image sent by the cloud server.
In the method, a convolutional neural network model can be utilized to extract the multidimensional characteristic vector of the image to be encrypted, and the multidimensional characteristic vector is used as a retrieval index of the image to be encrypted; encrypting the image to be encrypted to obtain a corresponding encrypted image; carrying out encryption processing on the retrieval index by using a state-secret symmetric block encryption algorithm to obtain a corresponding encryption index; and uploading the encrypted image and the encrypted index to a cloud server. By applying the technical scheme of the application, the SM 9/SM 4 algorithm can be used in the field of encrypted image retrieval. The cloud storage, safe encryption and quick retrieval solution of the image is provided, the limitation of a user storage space is solved, and the data safety, the use efficiency and the sharing capability are improved.
In another embodiment of the present application, the query module 505 further includes:
the query module 505 is configured to perform RGB three-channel separation on the target encrypted image, so as to obtain three corresponding sets of channel data;
the query module 505 is configured to decrypt the three sets of channel data based on an SM4 symmetric grouping algorithm by using an encrypted private key and a client identifier corresponding to the search client, so as to obtain decrypted three sets of channel data;
and the query module 505 is configured to perform three-channel combination on the three sets of channel data to obtain a decrypted image to be searched.
In another embodiment of the present application, the query module 505 further includes:
and the query module 505 is configured to perform key agreement with the image client by using the SM9 identifier cryptographic algorithm after obtaining the encrypted private key, so as to obtain a secret key, where the secret key is used for encryption and decryption of the image and encryption and decryption of the index.
In another embodiment of the present application, the query module 505 further includes:
the query module 505 is configured to extract a feature vector of the plaintext image if it is determined that the plaintext image corresponding to the target encrypted image is received;
a query module 505 configured to generate index information based on the feature vector corresponding to the plaintext image;
and the query module 505 is configured to match the index information with the encryption index, and take an image corresponding to the successfully matched encryption index as the target encryption image.
FIG. 8 is a block diagram illustrating a logical structure of an electronic device in accordance with an exemplary embodiment. For example, the electronic device 600 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
In an exemplary embodiment, there is also provided a non-transitory computer readable storage medium, such as a memory, including instructions executable by an electronic device processor to perform the above-described cryptographic algorithm-based image encryption method, the method comprising: sending a search request for inquiring a target encrypted image to a cloud server, wherein the search request comprises encrypted index information of the target encrypted image; and receiving the target encrypted image sent by the cloud server. Optionally, the instructions may also be executable by a processor of the electronic device to perform other steps involved in the exemplary embodiments described above. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
In an exemplary embodiment, there is also provided an application/computer program product including one or more instructions executable by a processor of an electronic device to perform the above-described cryptographic algorithm-based image encryption method, the method including: sending a search request for inquiring a target encrypted image to a cloud server, wherein the search request comprises encrypted index information of the target encrypted image; and receiving the target encrypted image sent by the cloud server. Optionally, the instructions may also be executable by a processor of the electronic device to perform other steps involved in the exemplary embodiments described above.
Fig. 8 is an exemplary diagram of the computer device 60. Those skilled in the art will appreciate that the schematic diagram 8 is merely an example of a computer device 60 and is not intended to limit the computer device 60 and may include more or fewer components than shown, or some components may be combined, or different components, e.g., the computer device 60 may also include input output devices, network access devices, buses, etc.
The Processor 602 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. The general purpose processor may be a microprocessor or the processor 602 may be any conventional processor or the like, the processor 602 being the control center for the computer device 60 and connected to the various parts of the overall computer device 60 by various interfaces and lines.
Memory 601 may be used to store computer readable instructions 603 and processor 602 implements various functions of computer device 60 by executing or executing computer readable instructions or modules stored in memory 601 and invoking data stored in memory 601. The memory 601 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data created according to the use of the computer device 60, and the like. In addition, the Memory 601 may include a hard disk, a Memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Memory Card (Flash Card), at least one disk storage device, a Flash Memory device, a Read-Only Memory (ROM), a random Access Memory (Ran image client m Access Memory, RAM), or other non-volatile/volatile storage devices.
The modules integrated by the computer device 60 may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as separate products. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by hardware related to computer readable instructions, which may be stored in a computer readable storage medium, and when the computer readable instructions are executed by a processor, the steps of the method embodiments may be implemented.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (16)

1. An image encryption method based on a cryptographic algorithm is applied to a key generation server, and comprises the following steps:
generating an encrypted master key pair, wherein the encrypted master key pair is obtained by calculation based on a random number and a public parameter;
generating an encrypted private key, wherein the encrypted private key is obtained by calculation based on a random number, a public parameter and a client identifier;
and respectively sending the encrypted master key pair and the encrypted private key to a client, wherein the client comprises an image client and a search client.
2. An image encryption method based on a cryptographic algorithm is applied to an image client, and comprises the following steps:
extracting a multidimensional characteristic vector of an image to be encrypted by using a convolutional neural network model, and taking the multidimensional characteristic vector as a retrieval index of the image to be encrypted;
encrypting the image to be encrypted to obtain a corresponding encrypted image;
encrypting the retrieval index by using a state symmetric block encryption algorithm to obtain a corresponding encryption index;
and uploading the encrypted image and the encrypted index to a cloud server.
3. The method according to claim 2, wherein the encrypting the image to be encrypted to obtain a corresponding encrypted image comprises:
performing RGB three-channel separation on the image to be encrypted respectively to obtain three corresponding sets of channel data;
respectively encrypting the channel data based on a SM4 symmetric packet encryption algorithm to obtain three groups of corresponding encrypted channel data;
and carrying out three-channel combination on the three groups of encrypted channel data to obtain the encrypted image.
4. The method of claim 2, wherein uploading the encryption map and the encryption index to a cloud server comprises:
generating image attribute information corresponding to the encrypted image;
uploading the encrypted image and the corresponding image attribute information to a database table of the user;
uploading the encrypted image and the encrypted index to the cloud server.
5. The method according to claim 2, wherein before extracting the multi-dimensional feature vector of the image to be encrypted by using the convolutional neural network model, the method further comprises:
after the encrypted private key is obtained, carrying out key agreement with the search client by using an SM9 identification cryptographic algorithm to obtain a secret key, wherein the secret key is used for encryption and decryption of images and encryption and decryption of indexes.
6. An image encryption method based on a cryptographic algorithm is applied to a search client, and comprises the following steps:
sending a search request for inquiring a target encrypted image to a cloud server, wherein the search request comprises encrypted index information of the target encrypted image;
and receiving the target encrypted image sent by the cloud server.
7. The method according to claim 6, wherein after receiving the target encrypted image sent by the cloud server, the method further comprises:
carrying out RGB three-channel separation on the target encrypted image respectively to obtain three corresponding groups of channel data;
decrypting the three groups of channel data based on an SM4 symmetric grouping algorithm by using an encrypted private key and a client identifier corresponding to the search client to obtain decrypted three groups of channel data;
and carrying out three-channel combination on the three groups of channel data to obtain the decrypted image to be searched.
8. The method of claim 6, wherein before sending the search request for querying the target encrypted image to the cloud server, further comprising:
after the encryption private key is obtained, a SM9 identification cryptographic algorithm is used for carrying out key agreement with the image client side to obtain a secret key, and the secret key is used for encryption and decryption of the image and encryption and decryption of the index.
9. The method according to claim 6, wherein before the sending of the search request for querying the target encrypted image to the cloud server, further comprising:
if the plaintext image corresponding to the target encrypted image is determined to be received, extracting a feature vector of the plaintext image;
generating index information based on the feature vector corresponding to the plaintext image;
and matching the index information with the encryption index, and taking the image corresponding to the successfully matched encryption index as the target encryption image.
10. An image encryption method based on a national cryptographic algorithm is applied to a cloud server, and comprises the following steps:
receiving a search request which is sent by a search client and used for inquiring a target encrypted image, wherein the search request comprises encrypted index information of the target encrypted image;
obtaining the target encrypted image based on the search request;
and returning the target encrypted image to the search client.
11. The method of claim 10, wherein obtaining the target encrypted image based on the search request comprises:
if the search request is determined to include the encryption index information of the target encryption image, obtaining a retrieval condition based on the search request;
traversing the index list, respectively calculating Euclidean distances between each retrieval condition and the encrypted index information, and sequencing the Euclidean distances according to the size relationship to obtain an Euclidean distance set;
selecting encryption indexes corresponding to Euclidean distances in a preset range in the Euclidean distance set as target indexes;
and taking the encrypted image corresponding to the target index as the target encrypted image.
12. An image encryption system based on a cryptographic algorithm, comprising:
the system comprises a key generation server, a search client and a server, wherein the key generation server is configured to generate an encrypted master key pair and an encrypted private key and respectively send the encrypted master key pair and the encrypted private key to the clients, and the clients comprise an image client and a search client;
the image client is configured to extract a multi-dimensional feature vector of an image to be encrypted, take the multi-dimensional feature vector as a retrieval index of the image to be encrypted, encrypt the image to be encrypted and the retrieval index, and upload the encrypted image and the encryption index to a cloud server;
the search client is configured to send a search request for inquiring a target encrypted image to a cloud server and receive the target encrypted image sent by the cloud server;
the cloud server is configured to return the target encrypted image to the search client after receiving the search request sent by the search client.
13. An image encryption device based on a cryptographic algorithm is applied to an image client, and comprises:
the extraction module is configured to extract a multi-dimensional feature vector of an image to be encrypted by using a convolutional neural network model, and the multi-dimensional feature vector is used as a retrieval index of the image to be encrypted;
the generating module is configured to encrypt the image to be encrypted to obtain a corresponding encrypted image;
the encryption module is configured to encrypt the retrieval index by using a state symmetric block encryption algorithm to obtain a corresponding encryption index;
a sending module configured to upload the encrypted image and the encryption index to a cloud server.
14. An image encryption device based on a cryptographic algorithm is applied to a search client, and comprises:
a query module configured to send a search request for querying a target encrypted image to a cloud server, the search request including encryption index information of the target encrypted image;
a receiving module configured to receive the target encrypted image sent by the cloud server.
15. An electronic device, comprising:
a memory for storing executable instructions; and the number of the first and second groups,
a processor for display with the memory to execute the executable instructions to perform the operations of the cryptographic algorithm based image encryption method of any one of claims 1-11.
16. A computer-readable storage medium storing computer-readable instructions that, when executed, perform the operations of the cryptographic algorithm-based image encryption method of any one of claims 1-11.
CN202110536159.5A 2021-05-17 2021-05-17 Image encryption method and device based on national cryptographic algorithm, electronic equipment and medium Withdrawn CN113343000A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110536159.5A CN113343000A (en) 2021-05-17 2021-05-17 Image encryption method and device based on national cryptographic algorithm, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110536159.5A CN113343000A (en) 2021-05-17 2021-05-17 Image encryption method and device based on national cryptographic algorithm, electronic equipment and medium

Publications (1)

Publication Number Publication Date
CN113343000A true CN113343000A (en) 2021-09-03

Family

ID=77470361

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110536159.5A Withdrawn CN113343000A (en) 2021-05-17 2021-05-17 Image encryption method and device based on national cryptographic algorithm, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN113343000A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113923315A (en) * 2021-12-13 2022-01-11 湖南菠萝互娱网络信息有限公司 Image cloud storage leakage-prevention encryption system and method
CN114048341A (en) * 2021-11-03 2022-02-15 北京中知智慧科技有限公司 Safety retrieval method, system, client and server for appearance design product
CN114338117A (en) * 2021-12-21 2022-04-12 中国电信股份有限公司 Data processing method, device, equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108182220A (en) * 2017-12-25 2018-06-19 重庆邮电大学 Image search method based on privacy of user protection in Cloud Server
CN108600196A (en) * 2018-04-04 2018-09-28 广东中星电子有限公司 The encryption method and device and decryption method and device of image
US20190028608A1 (en) * 2017-07-24 2019-01-24 Samsung Electronics Co., Ltd. Electronic device and method for controlling the electronic device
CN111106931A (en) * 2018-10-26 2020-05-05 中国电信股份有限公司 Authentication method, authentication device, terminal and computer-readable storage medium
CN111339539A (en) * 2020-02-14 2020-06-26 西安电子科技大学 Efficient encrypted image retrieval method under multi-user environment
CN111476577A (en) * 2020-04-03 2020-07-31 深圳合纵富科技有限公司 Face image encryption recognition payment method based on wavelet transformation and SM4
CN111930881A (en) * 2020-10-10 2020-11-13 南京理工大学 Connection keyword authentication searchable encryption method based on state cryptographic algorithm
CN112291059A (en) * 2020-07-28 2021-01-29 北京金山云网络技术有限公司 Key generation method and device, storage medium and electronic equipment
CN112632598A (en) * 2020-12-09 2021-04-09 西安电子科技大学 Encrypted data retrieval and sharing method, system, medium, equipment and application
CN112784823A (en) * 2021-03-17 2021-05-11 中国工商银行股份有限公司 Face image recognition method, face image recognition device, computing equipment and medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190028608A1 (en) * 2017-07-24 2019-01-24 Samsung Electronics Co., Ltd. Electronic device and method for controlling the electronic device
CN108182220A (en) * 2017-12-25 2018-06-19 重庆邮电大学 Image search method based on privacy of user protection in Cloud Server
CN108600196A (en) * 2018-04-04 2018-09-28 广东中星电子有限公司 The encryption method and device and decryption method and device of image
CN111106931A (en) * 2018-10-26 2020-05-05 中国电信股份有限公司 Authentication method, authentication device, terminal and computer-readable storage medium
CN111339539A (en) * 2020-02-14 2020-06-26 西安电子科技大学 Efficient encrypted image retrieval method under multi-user environment
CN111476577A (en) * 2020-04-03 2020-07-31 深圳合纵富科技有限公司 Face image encryption recognition payment method based on wavelet transformation and SM4
CN112291059A (en) * 2020-07-28 2021-01-29 北京金山云网络技术有限公司 Key generation method and device, storage medium and electronic equipment
CN111930881A (en) * 2020-10-10 2020-11-13 南京理工大学 Connection keyword authentication searchable encryption method based on state cryptographic algorithm
CN112632598A (en) * 2020-12-09 2021-04-09 西安电子科技大学 Encrypted data retrieval and sharing method, system, medium, equipment and application
CN112784823A (en) * 2021-03-17 2021-05-11 中国工商银行股份有限公司 Face image recognition method, face image recognition device, computing equipment and medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王华: "基于分块特征的加密图像检索方法研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114048341A (en) * 2021-11-03 2022-02-15 北京中知智慧科技有限公司 Safety retrieval method, system, client and server for appearance design product
CN113923315A (en) * 2021-12-13 2022-01-11 湖南菠萝互娱网络信息有限公司 Image cloud storage leakage-prevention encryption system and method
CN113923315B (en) * 2021-12-13 2022-03-29 湖南菠萝互娱网络信息有限公司 Image cloud storage leakage-prevention encryption system
CN114338117A (en) * 2021-12-21 2022-04-12 中国电信股份有限公司 Data processing method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US11477006B2 (en) Secure analytics using an encrypted analytics matrix
US11706026B2 (en) Location aware cryptography
CN112235289B (en) Data encryption and decryption method and device, computing equipment and storage medium
CN113343000A (en) Image encryption method and device based on national cryptographic algorithm, electronic equipment and medium
JP6180177B2 (en) Encrypted data inquiry method and system capable of protecting privacy
CN106972927A (en) A kind of encryption method and system for different safety class
US11500968B2 (en) Method of and system for providing access to access restricted content to a user
US9641328B1 (en) Generation of public-private key pairs
EP2999159A1 (en) Safety control method for cloud storage
CN115269938B (en) Homomorphic encryption-based keyword track hiding query method, system and related device
EP2942899B1 (en) Information processing method, trust server and cloud server
CN116032667B (en) Online trace query method, system and related equipment supporting efficient update
CN106911712A (en) A kind of encryption method and system for being applied to distributed system
US11968300B2 (en) Data extraction system, data extraction method, registration apparatus, and program
EP3561797B1 (en) Message transmission system, communication terminal, server device, message transmission method, and program
WO2014030706A1 (en) Encrypted database system, client device and server, method and program for adding encrypted data
US20220209945A1 (en) Method and device for storing encrypted data
CN112860933B (en) Ciphertext image retrieval method, device, terminal equipment and storage medium
WO2023185360A1 (en) Data processing method, apparatus, system and device, and storage medium
CN108920968B (en) File searchable encryption method based on connection keywords
JP5799635B2 (en) ENCRYPTED DATA SEARCH SYSTEM, DEVICE, METHOD, AND PROGRAM
US20220309178A1 (en) Private searchable database
Shan et al. Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control
CN111382286B (en) Data processing method and related product
AU2019271954B2 (en) A method of and system for providing access to access restricted content to a user

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210903

WW01 Invention patent application withdrawn after publication