CN113569259A - Data sharing method, system, equipment and computer readable storage medium - Google Patents

Data sharing method, system, equipment and computer readable storage medium Download PDF

Info

Publication number
CN113569259A
CN113569259A CN202110866272.XA CN202110866272A CN113569259A CN 113569259 A CN113569259 A CN 113569259A CN 202110866272 A CN202110866272 A CN 202110866272A CN 113569259 A CN113569259 A CN 113569259A
Authority
CN
China
Prior art keywords
data
target
private key
encrypted
contributor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110866272.XA
Other languages
Chinese (zh)
Inventor
叶茂城
杨建明
许丹昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN SECURITIES INFORMATION CO Ltd
Original Assignee
SHENZHEN SECURITIES INFORMATION CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN SECURITIES INFORMATION CO Ltd filed Critical SHENZHEN SECURITIES INFORMATION CO Ltd
Priority to CN202110866272.XA priority Critical patent/CN113569259A/en
Publication of CN113569259A publication Critical patent/CN113569259A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a data sharing method, a system, equipment and a computer readable storage medium, which are applied to a data inquiry party to obtain target inquiry requests for each target data; generating first random numbers corresponding to the target query requests; encrypting the corresponding target query requests based on the first random number and a predetermined target elliptic curve generating element to obtain each encrypted query request; transmitting all encrypted query requests to data contributors; acquiring an encrypted data set sent by a data contributor; acquiring private key encryption information sent by a data contributor; decrypting the private key encryption information based on the first random number to obtain a target private key of the target data; and decrypting the encrypted data set based on the target private key to obtain target data. The method and the device protect the query privacy of a data query party by encrypting the query request; the data privacy of the data contributor is guaranteed through the encrypted data set and the private key encryption information, and the utilization rate of data can be improved.

Description

Data sharing method, system, equipment and computer readable storage medium
Technical Field
The present application relates to the field of information transmission technologies, and in particular, to a data sharing method, system, device, and computer-readable storage medium.
Background
With the advent of the digital economy age, the value of data is higher and higher. However, in the application process of data, data is scattered, and data owners may be reluctant to perform data interaction, so that the problem of data cut and data island is serious, and data is difficult to be effectively utilized.
In summary, how to improve the utilization rate of data is a problem to be solved urgently by those skilled in the art.
Disclosure of Invention
The application aims to provide a data sharing method which can solve the technical problem of how to improve the utilization rate of data to a certain extent. The application also provides a data sharing system, a device and a computer readable storage medium.
In order to achieve the above purpose, the present application provides the following technical solutions:
a data sharing method is applied to a data inquiry party and comprises the following steps:
acquiring a target query request for each target data;
generating a first random number corresponding to each of the target query requests;
encrypting the corresponding target query requests based on the first random number and a predetermined target elliptic curve generating element to obtain each encrypted query request;
transmitting all of the encrypted query requests to data contributors;
acquiring an encrypted data set sent by the data contributor, wherein the encrypted data set comprises encrypted data information of self data in the data contributor, the encrypted data information is obtained by encrypting the self data by the data contributor based on a public and private key of the self data and the target elliptic curve generating element, and the self data comprises the target data;
acquiring private key encryption information sent by the data contributors, wherein the private key encryption information is obtained by encrypting the private key corresponding to the data of the data contributors based on each encryption query request and the target elliptic curve generating element;
decrypting the private key encryption information based on the first random number to obtain a target private key corresponding to the target data;
and decrypting the encrypted data set based on the target private key to obtain the target data.
Preferably, the encrypting the corresponding target query request based on the first random number and a predetermined target elliptic curve generator to obtain each encrypted query request includes:
acquiring a first numerical value corresponding to the predetermined identification information of the target data;
encrypting the corresponding target query requests based on the first random number, the first numerical value and the target elliptic curve generator to obtain each encrypted query request;
the acquiring of the encrypted data set sent by the data contributor, where the encrypted data set includes encrypted data information of data of the data contributor itself, and the encrypted data information is obtained by the data contributor encrypting the data itself based on a public and private key of the data itself and the target elliptic curve generator, includes:
acquiring the encrypted data set sent by the data contributor, wherein the encrypted data set comprises encrypted data information of self data in the data contributor, and the encrypted data information is obtained by encrypting the self data by the data contributor based on a public and private key of the self data, a second random number corresponding to the self data and the target elliptic curve generating element;
the obtaining of the private key encryption information sent by the data contributor, where the private key encryption information is obtained by the data contributor encrypting a private key corresponding to the data of the data contributor based on each encryption query request and the target elliptic curve generator, includes:
and acquiring private key encryption information sent by the data contributor, wherein the private key encryption information is obtained by encrypting the private key corresponding to the data of the data contributor based on each encryption query request, a second numerical value corresponding to the identification information of the data contributor, the data of the contributor and the target elliptic curve generating element.
Preferably, the target elliptic curve generating element comprises a first elliptic curve generating element and a second elliptic curve generating element;
encrypting the corresponding target query request based on the first random number, the first numerical value and the target elliptic curve generator to obtain each encrypted query request, including:
encrypting the corresponding target query request based on the first random number, the first numerical value and the target elliptic curve generating element by a query request encryption formula to obtain each encrypted query request;
the query request encryption formula includes:
Yi=riG+aiH,i=1,2,…,k;
wherein i represents a label of the target query request, and k represents a total number of the target query requests; y isiThe encrypted query request corresponding to the target query request with the reference number i is represented; r isiRepresenting the first random number corresponding to the target query request with the reference number i; a isiSaid first value denoted by the reference i; g represents the first elliptic curve generator; h represents the second elliptic curve generator.
Preferably, the obtaining the encrypted data set sent by the data contributor, where the encrypted data set includes encrypted data information of own data in the data contributor, and the encrypted data information is obtained by the data contributor encrypting the own data based on a public and private key of the own data, a second random number corresponding to the own data, and the target elliptic curve generator, includes:
acquiring the encrypted data set sent by the data contributor, wherein the encrypted data set comprises encrypted data information of self data in the data contributor, and the encrypted data information is obtained by encrypting the self data by the data contributor through a data encryption formula, a public and private key based on the self data, a second random number corresponding to the self data and the target elliptic curve generating element;
the data encryption formula comprises:
emj=<Uj,Vj>,Uj=rjG,
Figure BDA0003187433540000031
Pkj=sjG,j=1,2,…,n;
wherein j represents a reference number of the self data, and n represents the total number of the self data; emjThe encrypted data information indicating the self data denoted by reference numeral j; r isjThe second random number corresponding to the self data denoted by reference numeral j; m isjThe self data denoted by reference numeral j; pkjA public key representing the self data denoted by j; sjA private key representing the self data denoted by reference numeral j;
Figure BDA0003187433540000032
representing an exclusive or operation.
Preferably, the obtaining of the private key encryption information sent by the data contributor, where the private key encryption information is obtained by the data contributor encrypting the private key corresponding to the data of the data contributor based on each encryption query request, the second numerical value corresponding to the identification information of the data contributor, the data of the data contributor, and the target elliptic curve generator, includes:
acquiring private key encryption information sent by the data contributor, wherein the private key encryption information is obtained by encrypting a private key corresponding to the data contributor through a private key encryption formula based on each encryption query request, a second numerical value corresponding to identification information of the data, the data and the target elliptic curve generating element;
the private key encryption formula includes:
Dj=hash(mj)G;
Figure BDA0003187433540000041
i=1,2,…,k;j=1,2,…,n;
wherein (D)j,Tj) The private key encryption information representing the self data denoted by reference numeral j; hash represents hash operation; a isjSaid second value denoted by j.
Preferably, the decrypting the private key encryption information based on the first random number to obtain a target private key corresponding to the target data includes:
decrypting the private key encryption information based on the first random number through a private key decryption formula to obtain a target private key corresponding to the target data;
the private key decryption formula includes:
Figure BDA0003187433540000042
wherein s isiRepresenting a target private key corresponding to the target data with the reference number i;
the decrypting the encrypted data set based on the target private key to obtain the target data includes:
decrypting the encrypted data set based on the target private key through a data decryption formula to obtain the target data;
the data decryption formula includes:
Figure BDA0003187433540000043
wherein m isiThe target data denoted by reference numeral i.
Preferably, the obtaining of the target query request for each target data includes:
acquiring an initial query request for each target data;
carrying out hash desensitization processing on each initial query request to obtain the target query request;
after transmitting all the encrypted query requests to the data contributors and before acquiring the encrypted data sets sent by the data contributors, the method further includes:
and sending the preset part information of the target query request to the data contributor, so that the data contributor selects the self data containing the preset part information to transmit.
Preferably, the data inquirer and the data contributor are blockchain nodes on a blockchain.
A data sharing method is applied to data contributors and comprises the following steps:
acquiring encrypted query requests sent by a data query party, wherein the encrypted query requests are obtained by encrypting each target query request by the data query party based on a first random number corresponding to the target query request and a predetermined target elliptic curve generating element;
encrypting the data of the user on the basis of a public and private key of the data of the user and the target elliptic curve generating element to obtain encrypted data information, wherein the data of the user comprises target data corresponding to the target query request;
sending all the encrypted data information as an encrypted data set to the data inquiring party;
encrypting a private key corresponding to the self data based on each encrypted query request and the target elliptic curve generating element to obtain private key encryption information;
and transmitting the private key encryption information to the data inquiring party so that the data inquiring party decrypts the private key encryption information based on the first random number to obtain a target private key corresponding to the target data, and further decrypts the encrypted data set based on the target private key to obtain the target data.
A data sharing system is applied to a data inquiring party and comprises:
the first acquisition module is used for acquiring a target query request for each target data;
a first generation module, configured to generate first random numbers corresponding to the target query requests;
the first encryption module is used for encrypting the corresponding target query requests based on the first random number and a predetermined target elliptic curve generating element to obtain each encrypted query request;
a first transmission module, configured to transmit all the encrypted query requests to data contributors;
a second obtaining module, configured to obtain an encrypted data set sent by the data contributor, where the encrypted data set includes encrypted data information of data of the data contributor, and the encrypted data information is obtained by the data contributor encrypting the data of the data contributor based on a public and private key of the data and the target elliptic curve generator, where the data of the data contributor includes the target data;
a third obtaining module, configured to obtain private key encryption information sent by the data contributor, where the private key encryption information is obtained by the data contributor encrypting a private key corresponding to the data of the data contributor based on each encryption query request and the target elliptic curve generating element;
the first decryption module is used for decrypting the private key encryption information based on the first random number to obtain a target private key corresponding to the target data;
and the second decryption module is used for decrypting the encrypted data set based on the target private key to obtain the target data.
A data sharing device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the data sharing method as described above when executing the computer program.
A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the data sharing method as set forth in any one of the above.
The data sharing method is applied to a data inquiry party and used for acquiring target inquiry requests of all target data; generating first random numbers corresponding to the target query requests; encrypting the corresponding target query requests based on the first random number and a predetermined target elliptic curve generating element to obtain each encrypted query request; transmitting all encrypted query requests to data contributors; acquiring an encrypted data set sent by a data contributor, wherein the encrypted data set comprises encrypted data information of data of the data contributor, and the encrypted data information is obtained by encrypting the data of the data contributor based on public and private keys of the data and a target elliptic curve generating element; acquiring private key encryption information sent by a data contributor, wherein the private key encryption information is obtained by the data contributor encrypting a private key corresponding to own data based on each encryption query request and a target elliptic curve generating element; decrypting the private key encryption information based on the first random number to obtain a target private key of the target data; and decrypting the encrypted data set based on the target private key to obtain target data. In the application, the data inquiring party sends the encrypted inquiring request to the data contributor, so that the data contributor cannot acquire the data information to be inquired by the data inquiring party, and the inquiring privacy of the data inquiring party is protected; the data inquiring party acquires the encrypted data set and the private key encryption information, so that the data inquiring party cannot encrypt all the encrypted data sets by using the private key to obtain all data sent by the data contributor, can decrypt only through the first random number of the data inquiring party to obtain a target private key corresponding to target data, can decrypt only through the target private key to obtain the target data, and cannot acquire other data, the data privacy of the data contributor is ensured, the privacy of data sharing is also improved, and the utilization rate of the data can be further improved. The data sharing system, the data sharing equipment and the computer readable storage medium solve the corresponding technical problems.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a first flowchart of a data sharing method according to an embodiment of the present application;
fig. 2 is a second flowchart of a data sharing method according to an embodiment of the present application;
fig. 3 is a third flowchart of a data sharing method according to an embodiment of the present application;
fig. 4 is a schematic diagram of a first structure of a data sharing system according to an embodiment of the present application;
fig. 5 is a second schematic structural diagram of a data sharing system according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a data sharing device according to an embodiment of the present application;
fig. 7 is another schematic structural diagram of a data sharing device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a first flowchart of a data sharing method according to an embodiment of the present application.
The data sharing method provided by the embodiment of the application is applied to a data inquiry party and comprises the following steps:
step S101: and acquiring a target query request for each target data.
In practical application, a data querying party may first obtain a target query request for each target data, where the target data refers to data to be obtained by the data querying party, the target query request refers to a request for querying the target data, a type and content of the target query request may be determined according to actual needs, and a type of the target data may also be determined according to actual needs, for example, the type of the target data may be an object type, a file type, a code type, or the like.
It should be noted that, in a specific application scenario, the target data cannot be directly obtained by the data querying party, but identification information of the target data may be set, so that the data querying party and the data contributor may locate corresponding target data through the identification information, where the identification information may be a number of the target data, a keyword, identity information of a data owner, a mobile phone number, and the like, and correspondingly, the target query request may be a corresponding query request generated based on the identification information, for example, directly taking the keyword as the target query request, and the application is not specifically limited herein.
Step S102: first random numbers corresponding to the respective target query requests are generated.
Step S103: and encrypting the corresponding target query requests based on the first random number and a predetermined target elliptic curve generating element to obtain each encrypted query request.
In practical application, the data inquiring party can encrypt the target inquiring request to protect the privacy of the target inquiring request, so that the data contributor can not determine the target data to be inquired by the data inquiring party through the target inquiring request, and the inquiry privacy protection of the data inquiring party is realized.
In a specific application scenario, in the process of encrypting the target query requests, the data querying party may first generate a first random number corresponding to each target query request, and then encrypt the corresponding target query request based on the first random number and a predetermined target elliptic curve generating element to obtain each encrypted query request. The corresponding information of the elliptic curve generating element can refer to the prior art, and is not described herein again. The generation mode of the random number may be selected according to actual needs, and the application is not specifically limited herein.
Step S104: all encrypted query requests are transmitted to the data contributors.
In practical applications, after the data querying party generates the encrypted query request, the encrypted query request may be sent to the data contributor, so that the data contributor privately transmits the target data to the data querying party based on the encrypted query request.
Step S105: and acquiring an encrypted data set sent by the data contributor, wherein the encrypted data set comprises encrypted data information of self data in the data contributor, the encrypted data information is obtained by encrypting the self data by the data contributor based on a public and private key of the self data and a target elliptic curve generating element, and the self data comprises target data.
In practical application, after obtaining the encrypted query request, the data contributor may first select its own data including the target data in its own database, for example, all the data are used as its own data, and encrypt its own data with the public and private keys corresponding to its own data and the target elliptic curve generating element to obtain encrypted data information, so as to ensure the security of its own data, and then transmit all the encrypted data information as an encrypted data set to the data querying party, where correspondingly, the data querying party needs to obtain the encrypted data set sent by the data contributor.
It should be noted that, the public key and the private key of the public-private key refer to, and the generation manner of the public-private key may be determined according to actual needs, and the application is not specifically limited herein.
Step S106: and acquiring private key encryption information sent by the data contributor, wherein the private key encryption information is obtained by encrypting the private key corresponding to the data of the data contributor on the basis of each encryption query request and the target elliptic curve generating element.
In practical application, since the data contributor encrypts its own data, the data querying party needs to obtain the required private key from the data querying party to decrypt the target data from the encrypted data set. In the process, the data contributor can encrypt the private key corresponding to the data of the data contributor based on the encrypted query request and the target elliptic curve generating element to obtain private key encryption information and transmit the private key encryption information to the data query party.
Step S107: and decrypting the private key encryption information based on the first random number to obtain a target private key corresponding to the target data.
Step S108: and decrypting the encrypted data set based on the target private key to obtain target data.
In practical application, because the first random number corresponds to a target query request of target data, the first random number corresponds to the encrypted query request one by one, and the encrypted query request is used for generating private key encrypted information, a data query party can decrypt the private key encrypted information based on the first random number after obtaining the private key encrypted information to obtain a target private key corresponding to the target data; and then the encrypted data set can be decrypted based on the target private key to obtain the target data.
It should be noted that, because the data querying party cannot use the first random number to decrypt the private key of the data other than the target data from the private key encryption information, the data querying party cannot obtain the data other than the target data, so that privacy of data sharing is protected, and further utilization of the data can be promoted.
The data sharing method is applied to a data inquiry party and used for acquiring target inquiry requests of all target data; generating first random numbers corresponding to the target query requests; encrypting the corresponding target query requests based on the first random number and a predetermined target elliptic curve generating element to obtain each encrypted query request; transmitting all encrypted query requests to data contributors; acquiring an encrypted data set sent by a data contributor, wherein the encrypted data set comprises encrypted data information of data of the data contributor, and the encrypted data information is obtained by encrypting the data of the data contributor based on public and private keys of the data and a target elliptic curve generating element; acquiring private key encryption information sent by a data contributor, wherein the private key encryption information is obtained by the data contributor encrypting a private key corresponding to own data based on each encryption query request and a target elliptic curve generating element; decrypting the private key encryption information based on the first random number to obtain a target private key of the target data; and decrypting the encrypted data set based on the target private key to obtain target data. In the application, the data inquiring party sends the encrypted inquiring request to the data contributor, so that the data contributor cannot acquire the data information to be inquired by the data inquiring party, and the inquiring privacy of the data inquiring party is protected; the data inquiring party acquires the encrypted data set and the private key encryption information, so that the data inquiring party cannot encrypt all the encrypted data sets by using the private key to obtain all data sent by the data contributor, can decrypt only through the first random number of the data inquiring party to obtain a target private key corresponding to target data, can decrypt only through the target private key to obtain the target data, and cannot acquire other data, the data privacy of the data contributor is ensured, the privacy of data sharing is also improved, and the utilization rate of the data can be further improved.
Referring to fig. 2, fig. 2 is a second flowchart of a data sharing method according to an embodiment of the present application.
The data sharing method provided by the embodiment of the application is applied to a data inquiry party and comprises the following steps:
step S201: and acquiring a target query request for each target data.
Step S202: first random numbers corresponding to the respective target query requests are generated.
Step S203: acquiring a first numerical value corresponding to the identification information of predetermined target data; and encrypting the corresponding target query requests based on the first random number, the first numerical value and the target elliptic curve generating element to obtain each encrypted query request.
In practical application, in the process that the data inquiring party encrypts the corresponding target inquiry request based on the first random number and the predetermined target elliptic curve generating element to obtain each encrypted inquiry request, in order to improve the security of the encrypted inquiry request, the data inquiring party can apply two numerical values to perform corresponding encryption operation, namely the data inquiring party can obtain a first numerical value corresponding to the predetermined identification information of the target data; and encrypting the corresponding target query requests based on the first random number, the first numerical value and the target elliptic curve generating element to obtain each encrypted query request. The type of the first value corresponding to the identification information of the target data may be determined according to actual needs, for example, the type may be a first hash value corresponding to the identification information of the target data, and the like
Step S204: all encrypted query requests are transmitted to the data contributors.
Step S205: and acquiring an encrypted data set sent by the data contributor, wherein the encrypted data set comprises encrypted data information of self data in the data contributor, the encrypted data information is obtained by encrypting the self data by the data contributor based on a public and private key of the self data, a second random number corresponding to the self data and a target elliptic curve generating element, and the self data comprises target data.
In practical application, in the process that the data contributor encrypts the data based on the public and private keys of the data and the target elliptic curve generating element to obtain the encrypted data information, in order to improve the security of the encrypted data information, the data contributor may also encrypt the data by using the random number, that is, the data contributor may encrypt the data based on the public and private keys of the data, the second random number corresponding to the data, and the target elliptic curve generating element to obtain the corresponding encrypted data information.
Step S206: and acquiring private key encryption information sent by the data contributor, wherein the private key encryption information is obtained by encrypting the private key corresponding to the data by the data contributor based on each encryption query request, a second numerical value corresponding to the identification information of the data, the data and a target elliptic curve generating element.
In practical application, in the process that the data contributor encrypts the private key corresponding to the data based on each encrypted query request and the target elliptic curve generating element to obtain the private key encryption information, in order to improve the security of the private key encryption information, the data contributor may also encrypt the private key using other numerical values, that is, the data contributor may encrypt the private key corresponding to the data based on each encrypted query request, the second numerical value corresponding to the identification information of the data, the data and the target elliptic curve generating element to obtain the private key encryption information. It should be noted that the type of the second value corresponding to the identifier of the self data described herein should be the same as the type of the first value, for example, when the type of the first value is a hash value, the type of the second value is also a hash value accordingly.
Step S207: and decrypting the private key encryption information based on the first random number to obtain a target private key corresponding to the target data.
Step S208: and decrypting the encrypted data set based on the target private key to obtain target data.
In the data sharing method provided in the embodiment of the present application, the target elliptic curve generating element may include a first elliptic curve generating element and a second elliptic curve generating element;
correspondingly, for convenience of calculation, in the process that the data inquiry party encrypts the corresponding target inquiry request based on the first random number, the first numerical value and the target elliptic curve generating element to obtain each encrypted inquiry request, the corresponding target inquiry request can be encrypted based on the first random number, the first numerical value and the target elliptic curve generating element through an inquiry request encryption formula to obtain each encrypted inquiry request;
the query request encryption formula comprises:
Yi=riG+aiH,i=1,2,…,k;
wherein i represents the label of the target query request, and k represents the total number of the target query requests; y isiRepresenting an encrypted query request corresponding to a target query request with the reference number i; r isiA first random number corresponding to a target query request with the reference number i is represented; a isiTo representA first numerical value corresponding to the identification information of the target data with the label i; g represents a first elliptic curve generator; h represents a second elliptic curve generator;
correspondingly, in the process that the data contributor encrypts the data based on the public and private keys of the data, the second random number corresponding to the data and the target elliptic curve generating element to obtain encrypted data information, the data contributor encrypts the data to obtain encrypted data information through a data encryption formula, the public and private keys based on the data, the second random number corresponding to the data and the target elliptic curve generating element;
the data encryption formula comprises:
emj=<Uj,Vj>,Uj=rjG,
Figure BDA0003187433540000121
Pkj=sjG,j=1,2,…,n;
wherein j represents the label of the self data, and n represents the total amount of the self data; emjEncrypted data information indicating own data denoted by j; r isjA second random number corresponding to self data denoted by j; m isjSelf data denoted by reference numeral j; pkjA public key representing self data denoted by j; sjA private key representing self data denoted by reference numeral j;
Figure BDA0003187433540000122
representing an exclusive or operation;
correspondingly, in the process that the data contributor encrypts the private key corresponding to the data based on each encrypted query request, the second numerical value corresponding to the identification information of the data, the data and the target elliptic curve generating element to obtain the private key encrypted information, the private key corresponding to the data can be encrypted by the private key encryption formula based on each encrypted query request, the second numerical value corresponding to the identification information of the data, the data and the target elliptic curve generating element to obtain the private key encrypted information;
the private key encryption formula includes:
Dj=hash(mj)G;
Figure BDA0003187433540000123
i=1,2,…,k;j=1,2,…,n;
wherein (D)j,Tj) Private key encryption information representing own data denoted by reference numeral j; hash represents hash operation; (ii) a a isjA second numerical value corresponding to the identification information of the own data with the reference number j;
correspondingly, in the process that the data inquiring party decrypts the private key encryption information based on the first random number to obtain the target private key corresponding to the target data, the private key encryption information can be decrypted based on the first random number through a private key decryption formula to obtain the target private key corresponding to the target data;
the private key decryption formula includes:
Figure BDA0003187433540000124
wherein s isiRepresenting a target private key corresponding to target data with the reference number i;
it should be noted that, the value corresponding to the identification information of the target data and the first random number are both served for the target data, so that the value corresponding to the identification information of the target data is associated with the first random number, that is, the corresponding target private key of the target data can be identified by the first random number, and it can be known through research on the private key encryption formula, the private key decryption formula and the query request encryption formula that the value corresponding to the identification information of the data is applied, and the values corresponding to the identification information of the same data are the same, so that when the identification information of the target data is consistent with the identification information of the data, other parameters in the private key decryption formula are eliminated, and only the corresponding s is outputjAnd s isjFor the data inquiring party, it will become riCorresponding target private key siAnd when the identification information of the target data is inconsistent with the identification information of the data of the target data, the private key decrypts other data in the formulaThe parameters can not be eliminated, and at the moment, the private key decryption formula can not be decrypted successfully, and the secret key decryption formula can not be obtainediCorresponding target private key si(ii) a In addition, in the process, because the data inquiring party does not know the encryption result of the target private key corresponding to the target data in the private key encryption information, the data inquiring party can only apply the first random number for multiple times to decrypt the private key encryption information, for example, the value of i is fixed, the value of j is changed, and the private key decryption formula is applied for multiple times to decrypt to obtain the value of riCorresponding target private key siFor example, if the value of i is 1, it is possible to decrypt the data by using the private key decryption formula, and if the value of j is 3, the decryption is successful, and at this time, the private key of the own data labeled 3 or the target private key of the target data labeled 1 is obtained.
Finally, the data inquiring party can decrypt the encrypted data set based on the target private key through a data decryption formula to obtain the target data in the process of decrypting the encrypted data set based on the target private key to obtain the target data;
the data decryption formula includes:
Figure BDA0003187433540000131
wherein m isiThe target data denoted by reference numeral i.
It should be noted that, after the data querying party obtains the target private key of the target data, because the data contributor can sequentially encrypt the corresponding data private keys according to the sequence of the data information encrypted in the encrypted data set when encrypting the data private key, that is, the arrangement sequence of the private key encrypted information and the encrypted data information is in one-to-one correspondence, the data querying party can determine the positions of the target private key in all the private key encrypted information during the process of obtaining the target data by decrypting the encrypted data set based on the target private key through the data decryption formula, and then decrypt the encrypted data information at the same position in the encrypted data set by using the target private key, so as to obtain the corresponding target data.
In the data sharing method provided by the embodiment of the application, in the process of acquiring the target query request for each target data, if partial information of the target query request is not leaked, the data contributor can only use all data in the database as the data to be transmitted to the data contributor, so that the data sharing efficiency is poor, and in order to improve the data sharing efficiency, the data contributor can send partial information of the target query request to the data contributor, so that the data contributor only needs to use the data carrying the partial information as the data to be transmitted to the data contributor, and the data sharing efficiency is improved by reducing the data volume; in the process, in order to protect the information in the target query request, hash desensitization processing can be performed on the data in the query request, that is, a data querying party can first obtain initial query requests for each target data and perform hash desensitization processing on each initial query request to obtain a target query request;
after all the encrypted query requests are transmitted to the data contributors and before the encrypted data sets sent by the data contributors are obtained, the data contributors can also send preset part information of the target query requests to the data contributors, so that the data contributors can select self data containing the preset part information to transmit.
It should be noted that the type of the hash desensitization process and the preset part of information may be determined according to actual needs, for example, the type of the hash desensitization process may be a hash value of 64 bytes, at this time, all the target query requests are hash values of 64 bytes, and if the preset part of information is a tail 3-byte plaintext hash value, the data querying party may send the tail 3-byte plaintext hash value of each target query request to the data contributor, so that the data contributor may only use the data corresponding to the tail 3-byte plaintext hash value of each target query request as the own data to be transmitted to the data querying party, and compared with a scheme in which all the data are used as the own data to be transmitted to the data querying party, the data clipping effect may be reduced by 4096 times, and the data sharing efficiency is improved. In addition, because the target query request sent by the data query party is a corresponding hash value obtained by performing hash desensitization processing on the initial query request, and mainly performs hash desensitization processing on the identification information of the data, the data contributor also performs hash desensitization processing on the identification information of the data contributor and reserves the corresponding hash value, at this time, the data contributor only needs to store the hash value, but does not need to store the identification information of the data, and sensitive information in the identification information can be prevented from being leaked.
In the data sharing method provided by the embodiment of the present application, in order to further improve the efficiency of data sharing and facilitate the follow-up tracing of the data sharing process, the data querying party and the data contributor may be a block chain node on a block chain, that is, the data sharing method provided by the present application may operate in cooperation with the block chain.
For facilitating understanding of the operation of the data sharing method in the present application on the block chain, taking the sharing process of the user blacklist data as an example, the corresponding process is described:
the data contributor saves the user blacklist data in a local sharing system;
a data inquiry party selects user information and service types to be inquired through a browser to generate a target inquiry request;
the data inquiring party encrypts each target inquiring request based on a first random number corresponding to the target inquiring request and a predetermined target elliptic curve generating element to obtain an encrypted inquiring request;
the data inquiry party broadcasts an encryption inquiry request in the block chain through an AMAP (Advanced Messaging information Protocol);
after receiving the encryption query request, the data contributor determines self user blacklist data to be transmitted according to the encryption query request, encrypts the self user blacklist data based on a public and private key of the self user blacklist data and a target elliptic curve generating element to obtain encrypted data information, and sends all the encrypted data information serving as an encrypted data set to the data query party through a block chain peer-to-peer network;
the data contributor encrypts a private key corresponding to the blacklist data of the user based on each encrypted query request and the target elliptic curve generating element to obtain private key encrypted information, and transmits the private key encrypted information to the data query party through a block chain peer-to-peer network;
and the data inquiring party decrypts the private key encryption information based on the first random number to obtain a target private key corresponding to the target data, and decrypts the encrypted data set based on the target private key to obtain the required user blacklist data.
Referring to fig. 3, fig. 3 is a third flowchart of a data sharing method according to an embodiment of the present application.
The data sharing method provided by the embodiment of the application is applied to a data contributor and can comprise the following steps:
step S301: and acquiring an encrypted query request sent by a data query party, wherein the encrypted query request is obtained by encrypting each target query request by the data query party based on a first random number corresponding to the target query request and a predetermined target elliptic curve generating element.
Step S302: and encrypting the data of the user based on the public and private keys of the data of the user and the target elliptic curve generating element to obtain encrypted data information, wherein the data of the user comprises target data corresponding to the target query request.
Step S303: and sending all the encrypted data information as an encrypted data set to a data inquiring party.
Step S304: and encrypting the private key corresponding to the data of the user on the basis of each encrypted query request and the target elliptic curve generating element to obtain private key encryption information.
Step S305: and transmitting the private key encryption information to a data inquiring party so that the data inquiring party decrypts the private key encryption information based on the first random number to obtain a target private key corresponding to the target data, and further decrypts the encrypted data set based on the target private key to obtain the target data.
In the data sharing method provided in the embodiment of the present application, detailed descriptions of each step performed by the data contributor may refer to the foregoing embodiment, and are not described herein again.
Referring to fig. 4, fig. 4 is a first structural schematic diagram of a data sharing system according to an embodiment of the present disclosure.
The data sharing system provided by the embodiment of the application is applied to a data inquiring party and can comprise:
a first obtaining module 11, configured to obtain a target query request for each target data;
a first generating module 12, configured to generate first random numbers corresponding to the respective target query requests;
the first encryption module 13 is configured to encrypt the corresponding target query request based on the first random number and a predetermined target elliptic curve generating element to obtain each encrypted query request;
a first transmission module 14 for transmitting all encrypted query requests to data contributors;
the second obtaining module 15 is configured to obtain an encrypted data set sent by a data contributor, where the encrypted data set includes encrypted data information of data of the data contributor, and the encrypted data information is obtained by the data contributor encrypting the data of the data contributor based on a public and private key of the data and a target elliptic curve generating element, where the data of the data contributor includes target data corresponding to a target query request;
the third obtaining module 16 is configured to obtain private key encryption information sent by the data contributor, where the private key encryption information is obtained by the data contributor encrypting a private key corresponding to its own data based on each encryption query request and the target elliptic curve generating element;
the first decryption module 17 is configured to decrypt the private key encryption information based on the first random number to obtain a target private key corresponding to the target data;
and the second decryption module 18 is configured to decrypt the encrypted data set based on the target private key to obtain the target data.
For detailed description of each module in the data sharing system provided in the embodiment of the present application, reference may be made to the above embodiments, which are not described herein again.
Referring to fig. 5, fig. 5 is a schematic diagram illustrating a second structure of a data sharing system according to an embodiment of the present disclosure.
The data sharing system provided by the embodiment of the application is applied to a data contributor and can include:
a fourth obtaining module 21, configured to obtain an encrypted query request sent by a data querying party, where the encrypted query request is obtained by encrypting each target query request by the data sending party based on a first random number corresponding to the target query request and a predetermined target elliptic curve generating element;
the second encryption module 22 is configured to encrypt the self data based on the public and private keys of the self data and the target elliptic curve generating element to obtain encrypted data information, where the self data includes target data corresponding to the target query request;
the second transmission module 23 is configured to send all encrypted data information as an encrypted data set to the data querying party;
the third encryption module 24 is configured to encrypt a private key corresponding to the data of the third encryption module based on each encrypted query request and the target elliptic curve generating element to obtain private key encryption information;
and the third transmission module 25 is configured to transmit the private key encryption information to the data querying party, so that the data querying party decrypts the private key encryption information based on the first random number to obtain a target private key corresponding to the target data, and further decrypts the encrypted data set based on the target private key to obtain the target data.
For detailed description of each module in the data sharing system provided in the embodiment of the present application, reference may be made to the above embodiments, which are not described herein again.
The application also provides a data sharing device and a computer readable storage medium, which have corresponding effects of the data sharing method provided by the embodiment of the application. Referring to fig. 6, fig. 6 is a schematic structural diagram of a data sharing device according to an embodiment of the present disclosure.
The data sharing device provided by the embodiment of the application includes a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the steps of the data sharing method described in any one of the above embodiments when executing the computer program.
Referring to fig. 6, another data sharing device provided in the embodiment of the present application may further include: an input port 203 connected to the processor 202, for transmitting externally input commands to the processor 202; a display unit 204 connected to the processor 202, for displaying the processing result of the processor 202 to the outside; and the communication module 205 is connected with the processor 202 and is used for realizing the communication between the data sharing device and the outside world. The display unit 204 may be a display panel, a laser scanning display, or the like; the communication method adopted by the communication module 205 includes, but is not limited to, mobile high definition link technology (HML), Universal Serial Bus (USB), High Definition Multimedia Interface (HDMI), and wireless connection: wireless fidelity technology (WiFi), bluetooth communication technology, bluetooth low energy communication technology, ieee802.11s based communication technology.
The computer-readable storage medium provided in the embodiments of the present application stores a computer program, and when the computer program is executed by a processor, the computer program implements the steps of the data sharing method described in any of the following embodiments.
The computer-readable storage media to which this application relates include Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage media known in the art.
For a description of a relevant part in a data sharing system, a device and a computer readable storage medium provided in the embodiments of the present application, refer to a detailed description of a corresponding part in a data sharing method provided in the embodiments of the present application, which is not repeated herein. In addition, parts of the above technical solutions provided in the embodiments of the present application, which are consistent with the implementation principles of corresponding technical solutions in the prior art, are not described in detail so as to avoid redundant description.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (12)

1. A data sharing method is applied to a data inquiry party and comprises the following steps:
acquiring a target query request for each target data;
generating a first random number corresponding to each of the target query requests;
encrypting the corresponding target query requests based on the first random number and a predetermined target elliptic curve generating element to obtain each encrypted query request;
transmitting all of the encrypted query requests to data contributors;
acquiring an encrypted data set sent by the data contributor, wherein the encrypted data set comprises encrypted data information of self data in the data contributor, the encrypted data information is obtained by encrypting the self data by the data contributor based on a public and private key of the self data and the target elliptic curve generating element, and the self data comprises the target data;
acquiring private key encryption information sent by the data contributors, wherein the private key encryption information is obtained by encrypting the private key corresponding to the data of the data contributors based on each encryption query request and the target elliptic curve generating element;
decrypting the private key encryption information based on the first random number to obtain a target private key corresponding to the target data;
and decrypting the encrypted data set based on the target private key to obtain the target data.
2. The method of claim 1, wherein encrypting the corresponding target query requests based on the first random number and a predetermined target elliptic curve generator to obtain each encrypted query request comprises:
acquiring a first numerical value corresponding to the predetermined identification information of the target data;
encrypting the corresponding target query requests based on the first random number, the first numerical value and the target elliptic curve generator to obtain each encrypted query request;
the acquiring of the encrypted data set sent by the data contributor, where the encrypted data set includes encrypted data information of data of the data contributor itself, and the encrypted data information is obtained by the data contributor encrypting the data itself based on a public and private key of the data itself and the target elliptic curve generator, includes:
acquiring the encrypted data set sent by the data contributor, wherein the encrypted data set comprises encrypted data information of self data in the data contributor, and the encrypted data information is obtained by encrypting the self data by the data contributor based on a public and private key of the self data, a second random number corresponding to the self data and the target elliptic curve generating element;
the obtaining of the private key encryption information sent by the data contributor, where the private key encryption information is obtained by the data contributor encrypting a private key corresponding to the data of the data contributor based on each encryption query request and the target elliptic curve generator, includes:
and acquiring private key encryption information sent by the data contributor, wherein the private key encryption information is obtained by encrypting the private key corresponding to the data of the data contributor based on each encryption query request, a second numerical value corresponding to the identification information of the data contributor, the data of the contributor and the target elliptic curve generating element.
3. The method of claim 2, wherein the target elliptic curve generator comprises a first elliptic curve generator and a second elliptic curve generator;
encrypting the corresponding target query request based on the first random number, the first numerical value and the target elliptic curve generator to obtain each encrypted query request, including:
encrypting the corresponding target query request based on the first random number, the first numerical value and the target elliptic curve generating element by a query request encryption formula to obtain each encrypted query request;
the query request encryption formula includes:
Yi=riG+aiH,i=1,2,…,k;
wherein i represents a label of the target query request, and k represents a total number of the target query requests; y isiThe encrypted query request corresponding to the target query request with the reference number i is represented; r isiRepresenting the first random number corresponding to the target query request with the reference number i; a isiSaid first value denoted by the reference i; g represents the first elliptic curve generator; h represents the second elliptic curve generator.
4. The method according to claim 3, wherein the obtaining the encrypted data set sent by the data contributor, the encrypted data set including encrypted data information of own data in the data contributor, and the encrypted data information being obtained by the data contributor encrypting the own data based on a public and private key of the own data, a second random number corresponding to the own data, and the target elliptic curve generator includes:
acquiring the encrypted data set sent by the data contributor, wherein the encrypted data set comprises encrypted data information of self data in the data contributor, and the encrypted data information is obtained by encrypting the self data by the data contributor through a data encryption formula, a public and private key based on the self data, a second random number corresponding to the self data and the target elliptic curve generating element;
the data encryption formula comprises:
emj=<Uj,Vj>,Uj=rjG,
Figure FDA0003187433530000031
Pkj=sjG,j=1,2,…,n;
wherein j represents a reference number of the self data, and n represents the total number of the self data; emjThe encrypted data information indicating the self data denoted by reference numeral j; r isjThe second random number corresponding to the self data denoted by reference numeral j; m isjThe self data denoted by reference numeral j; pkjA public key representing the self data denoted by j; sjA private key representing the self data denoted by reference numeral j;
Figure FDA0003187433530000032
representing an exclusive or operation.
5. The method according to claim 4, wherein the obtaining of the private key encryption information sent by the data contributor, where the private key encryption information is obtained by the data contributor encrypting a private key corresponding to the data on the basis of each encrypted query request, a second numerical value corresponding to the identification information of the data, and the target elliptic curve generator, includes:
acquiring private key encryption information sent by the data contributor, wherein the private key encryption information is obtained by encrypting a private key corresponding to the data contributor through a private key encryption formula based on each encryption query request, a second numerical value corresponding to identification information of the data, the data and the target elliptic curve generating element;
the private key encryption formula includes:
Dj=hash(mj)G;
Figure FDA0003187433530000033
i=1,2,…,k;j=1,2,…,n;
wherein (D)j,Tj) The private key encryption information representing the self data denoted by reference numeral j; hash represents hash operation; a isjSaid second value denoted by j.
6. The method according to claim 5, wherein the decrypting the private key encryption information based on the first random number to obtain a target private key corresponding to the target data comprises:
decrypting the private key encryption information based on the first random number through a private key decryption formula to obtain a target private key corresponding to the target data;
the private key decryption formula includes:
Figure FDA0003187433530000034
i=1,2,…,k,j=1,2,…,n;
wherein s isiRepresenting a target private key corresponding to the target data with the reference number i;
the decrypting the encrypted data set based on the target private key to obtain the target data includes:
decrypting the encrypted data set based on the target private key through a data decryption formula to obtain the target data;
the data decryption formula includes:
Figure FDA0003187433530000041
wherein m isiThe target data denoted by reference numeral i.
7. The method according to any one of claims 1 to 6, wherein the obtaining of the target query request for each target data comprises:
acquiring an initial query request for each target data;
carrying out hash desensitization processing on each initial query request to obtain the target query request;
after transmitting all the encrypted query requests to the data contributors and before acquiring the encrypted data sets sent by the data contributors, the method further includes:
and sending the preset part information of the target query request to the data contributor, so that the data contributor selects the self data containing the preset part information to transmit.
8. The method of claim 7, wherein the data querier and the data contributor are blockchain nodes on a blockchain.
9. A data sharing method, applied to a data contributor, comprising:
acquiring encrypted query requests sent by a data query party, wherein the encrypted query requests are obtained by encrypting each target query request by the data query party based on a first random number corresponding to the target query request and a predetermined target elliptic curve generating element;
encrypting the data of the user on the basis of a public and private key of the data of the user and the target elliptic curve generating element to obtain encrypted data information, wherein the data of the user comprises target data corresponding to the target query request;
sending all the encrypted data information as an encrypted data set to the data inquiring party;
encrypting a private key corresponding to the self data based on each encrypted query request and the target elliptic curve generating element to obtain private key encryption information;
and transmitting the private key encryption information to the data inquiring party so that the data inquiring party decrypts the private key encryption information based on the first random number to obtain a target private key corresponding to the target data, and further decrypts the encrypted data set based on the target private key to obtain the target data.
10. A data sharing system, applied to a data querying party, comprising:
the first acquisition module is used for acquiring a target query request for each target data;
a first generation module, configured to generate first random numbers corresponding to the target query requests;
the first encryption module is used for encrypting the corresponding target query requests based on the first random number and a predetermined target elliptic curve generating element to obtain each encrypted query request;
a first transmission module, configured to transmit all the encrypted query requests to data contributors;
a second obtaining module, configured to obtain an encrypted data set sent by the data contributor, where the encrypted data set includes encrypted data information of data of the data contributor, and the encrypted data information is obtained by the data contributor encrypting the data of the data contributor based on a public and private key of the data and the target elliptic curve generator, where the data of the data contributor includes the target data;
a third obtaining module, configured to obtain private key encryption information sent by the data contributor, where the private key encryption information is obtained by the data contributor encrypting a private key corresponding to the data of the data contributor based on each encryption query request and the target elliptic curve generating element;
the first decryption module is used for decrypting the private key encryption information based on the first random number to obtain a target private key corresponding to the target data;
and the second decryption module is used for decrypting the encrypted data set based on the target private key to obtain the target data.
11. A data sharing device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the data sharing method according to any one of claims 1 to 9 when executing said computer program.
12. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the data sharing method according to any one of claims 1 to 9.
CN202110866272.XA 2021-07-29 2021-07-29 Data sharing method, system, equipment and computer readable storage medium Pending CN113569259A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110866272.XA CN113569259A (en) 2021-07-29 2021-07-29 Data sharing method, system, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110866272.XA CN113569259A (en) 2021-07-29 2021-07-29 Data sharing method, system, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN113569259A true CN113569259A (en) 2021-10-29

Family

ID=78169145

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110866272.XA Pending CN113569259A (en) 2021-07-29 2021-07-29 Data sharing method, system, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113569259A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115589293A (en) * 2022-11-24 2023-01-10 北京信安世纪科技股份有限公司 Privacy query method, device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109921896A (en) * 2019-03-11 2019-06-21 郑州师范学院 A kind of label decryption method, system, equipment and computer readable storage medium
CN112822014A (en) * 2021-04-22 2021-05-18 北京信安世纪科技股份有限公司 Data processing method and device, electronic equipment and storage medium
CN112966022A (en) * 2021-03-10 2021-06-15 安徽航天信息科技有限公司 Information query method, device and system for data transaction platform
CN112995224A (en) * 2021-05-12 2021-06-18 南京金宁汇科技有限公司 Data sharing method and system based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109921896A (en) * 2019-03-11 2019-06-21 郑州师范学院 A kind of label decryption method, system, equipment and computer readable storage medium
CN112966022A (en) * 2021-03-10 2021-06-15 安徽航天信息科技有限公司 Information query method, device and system for data transaction platform
CN112822014A (en) * 2021-04-22 2021-05-18 北京信安世纪科技股份有限公司 Data processing method and device, electronic equipment and storage medium
CN112995224A (en) * 2021-05-12 2021-06-18 南京金宁汇科技有限公司 Data sharing method and system based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115589293A (en) * 2022-11-24 2023-01-10 北京信安世纪科技股份有限公司 Privacy query method, device and storage medium
CN115589293B (en) * 2022-11-24 2023-03-10 北京信安世纪科技股份有限公司 Privacy query method, device and storage medium

Similar Documents

Publication Publication Date Title
CN112235289B (en) Data encryption and decryption method and device, computing equipment and storage medium
CN107801165B (en) Business short message pushing method and device, computer equipment and storage medium
US9538372B2 (en) Establishing communication between devices
CN113346998B (en) Key updating and file sharing method, device, equipment and computer storage medium
CN104507080A (en) File processing method and terminal
CN107454590A (en) A kind of data ciphering method, decryption method and wireless router
CN110166489B (en) Data transmission method, system, equipment and computer medium in Internet of things
US20180083935A1 (en) Method and system for secure sms communications
CN105208028A (en) Data transmission method and related device and equipment
CN107872315B (en) Data processing method and intelligent terminal
CN112866981B (en) Method and device for managing subscription data
CN113569259A (en) Data sharing method, system, equipment and computer readable storage medium
CN104243153A (en) Method for spotting equipment user, and user equipment
CN114024711A (en) Data transmission method and device and computer readable storage medium
CN113541943A (en) Network security defense system, method, equipment and storage medium for smart home
CN111277605B (en) Data sharing method and device, computer equipment and storage medium
CN114629717B (en) Data processing method, device, system, equipment and storage medium
CN114173294A (en) Non-peer-to-peer short message transmission method, system, equipment and computer storage medium
EP4020875A1 (en) Method, first server, second server, and system for transmitting securely a key
CN105450597A (en) Information transmission method and device
CN106067875B (en) Intelligent terminal encryption method and system
CN115955306B (en) Data encryption transmission method and device, electronic equipment and storage medium
CN111131158A (en) Single byte symmetric encryption and decryption method, device and readable medium
CN104363584A (en) Method, device and terminal for encrypting and decrypting short message
CN114222260B (en) Peer-to-peer short message transmission method, system, equipment and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination