CN113569262A - Ciphertext storage method and system based on block chain - Google Patents

Ciphertext storage method and system based on block chain Download PDF

Info

Publication number
CN113569262A
CN113569262A CN202110871053.0A CN202110871053A CN113569262A CN 113569262 A CN113569262 A CN 113569262A CN 202110871053 A CN202110871053 A CN 202110871053A CN 113569262 A CN113569262 A CN 113569262A
Authority
CN
China
Prior art keywords
data
research
encryption
ciphertext
importance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110871053.0A
Other languages
Chinese (zh)
Other versions
CN113569262B (en
Inventor
杨艳
代沁芯
王晶
王敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lixin Chongqing Data Technology Co Ltd
Original Assignee
Lixin Chongqing Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lixin Chongqing Data Technology Co Ltd filed Critical Lixin Chongqing Data Technology Co Ltd
Priority to CN202110871053.0A priority Critical patent/CN113569262B/en
Publication of CN113569262A publication Critical patent/CN113569262A/en
Application granted granted Critical
Publication of CN113569262B publication Critical patent/CN113569262B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of data encryption, in particular to a ciphertext storage method and system based on a block chain, wherein the system comprises: the first encryption module is used for encrypting the data content of the research data to obtain data encryption information, generating and storing data ciphertext, evaluating the relevance between the research data and a research project, evaluating the importance of the research data to the research project, and determining the encryption series according to the relevance and the importance; the second encryption module is used for merging the data encryption information and the data ciphertext for encryption; the third encryption module is used for combining the index data ciphertext and the encrypted ciphertext to generate a block encrypted ciphertext; and the fourth encryption module is used for acquiring the source information of the data content, recoding the source information by adopting coding element combination to form an information source, and carrying out random combination operation on the code value of each bit element of the information source. The invention solves the technical problem that the prior art can not give full play to the performance of the block chain.

Description

Ciphertext storage method and system based on block chain
Technical Field
The invention relates to the technical field of data encryption, in particular to a ciphertext storage method and system based on a block chain.
Background
For the block chain technology, digital encryption is the key, the encryption method is also challenged by cracking data security, and the non-tampering property of the block chain is not existed. At present, data is encrypted and stored, when the data is used, the data is re-encrypted and compared with original encrypted content, and the consistency comparison ensures that the data is not modified, so that the data cannot be modified. However, under the original mechanism for ensuring that the data is not modifiable, if the encryption method is leaked or broken, the encrypted content can still be ensured to be unchanged after the data modification, so that the measures for preventing the data modification are similar to the nominal measures.
To this end, the chinese prior art discloses a data encryption system and method, wherein the method includes the steps of: performing first-layer encryption in the data mart server, encrypting data contents through an encryption algorithm, generating and storing data ciphertexts; performing second-layer encryption in the data routing server, storing corresponding data encryption information when the data generate the index, combining the data encryption information with the first-layer encryption ciphertext for encryption, generating and storing index data ciphertext; performing third-layer encryption in the block chain server, and when the index data are stored in the block, combining and encrypting the plurality of index data pairwise, and combining and encrypting the encryption result step by step to generate and store a block transaction encryption ciphertext; and performing fourth-layer encryption in the block chain server, combining the previous block cipher text with the transaction encryption cipher text of the block, generating and maintaining the block encryption cipher text of the block, and completing the four-layer HASH encryption.
By adopting a four-layer HASH encryption mode, the encryption content of the previous layer is used as the encryption item of the layer by each layer, and if data is modified, the encryption content of each layer needs to be modified, so that the difficulty of data modification is improved, and the probability of data modification is reduced. However, when the third layer of encryption is performed in the block chain server, the plurality of index data are combined and encrypted two by two, the encryption results are combined and encrypted step by step, and the block transaction encrypted ciphertext is generated and stored.
Disclosure of Invention
The invention provides a cipher text storage method and system based on a block chain, which solve the technical problem that the performance of the block chain cannot be fully exerted in the prior art.
The basic scheme provided by the invention is as follows: ciphertext storage system based on a block chain, comprising:
the first encryption module is used for encrypting the data content of the research data to obtain data encryption information, and generating and storing a data ciphertext;
the second encryption module is used for merging the data encryption information and the data ciphertext for encryption, generating and storing an index data ciphertext;
the third encryption module is used for encrypting the index data in a pairwise combination mode to generate encrypted ciphertext and storing the encrypted ciphertext, combining the index data ciphertext and the encrypted ciphertext to generate block encrypted ciphertext and storing the block encrypted ciphertext;
the fourth encryption module is used for acquiring source information of data content, recoding the source information by adopting coding element combination to form an information source, and performing random combination operation on code values of each bit element of the information source;
the first encryption module is also used for evaluating the relevance of the research data and the research project, evaluating the importance of the research data to the research project and determining the encryption level according to the relevance and the importance.
The working principle and the advantages of the invention are as follows: evaluating the relevance of the research data and the research project, and evaluating the importance of the research data to the research project; determining an encryption series according to the relevance and the importance, and encrypting according to the encryption series; the research data with high relevance and high importance is encrypted four times, the research data with high importance and low relevance is encrypted three times, the research data with low importance and high relevance is encrypted twice, and the research data with low importance and low relevance is encrypted once. In this way, the encryption level of the research data is determined according to the relevance size and the importance level, so that the encryption efficiency can be improved while the safety of the important data is ensured.
The invention determines the encryption grade of the research data according to the relevance size and the importance level, can ensure the safety of the important data, can improve the encryption efficiency, and solves the technical problem that the prior art can not fully exert the performance of the block chain.
Further, the rule for determining the encryption level number by the first encryption module is as follows:
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is high, the encryption stage number is four stages;
if the relevance of the research data and the research project is small, the importance of the research data to the research project is high, and the encryption series is three stages;
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is low, the encryption stage number is two stages;
if the relevance of the research data and the research project is small, and the importance of the research data to the research project is low, the encryption stage number is one stage.
Has the advantages that: the specific encryption stage number of the research data is determined according to the relevance between the research data and the research project and the importance of the research data to the research project, so that the storage space can be reasonably utilized, and the storage efficiency is improved.
Further, the standard value of the parameter for evaluating the relevance of the research data and the research project and the standard value of the parameter for evaluating the importance of the research data to the research project are dynamically variable.
Has the advantages that: the standard value of the parameter for evaluating the correlation and the standard value of the parameter for evaluating the importance are dynamically variable, and different encryption levels can be adopted at different moments according to the rule of dynamic change and the corresponding standard values at different moments.
Further, the first encryption module is used for evaluating that the standard value of the parameter of the relevance of the research data and the research project is an increasing function or a decreasing function of time, and the standard value of the parameter of the importance of the research data to the research project is an increasing function or a decreasing function of time.
Has the advantages that: the standard value is an increasing function or a decreasing function of time, so that the standard value can continuously change along with the time, the time is as thin as possible, and the corresponding dynamic precision is improved.
Further, the research data includes value data, identity data and execution data; wherein the encryption level of the value data is four, the encryption level of the identity data is three, and the encryption level of the execution data is two.
Has the advantages that: the encryption series is adopted for common value data, identity data and execution data, the pertinence is strong, the space is saved, and the efficiency is high.
Based on the above ciphertext storage system based on the block chain, the present invention further provides a ciphertext storage method based on the block chain, which includes:
s1, evaluating the relevance of the research data and the research project, evaluating the importance of the research data to the research project, and determining the encryption level according to the relevance and the importance:
if the encryption level is one, S2 is performed,
if the number of encryption stages is two, S2-S3 are performed,
if the number of encryption stages is three, S2-S4 are performed,
if the encryption stage number is four, carrying out S2-S5;
s2, encrypting the data content of the research data to obtain data encryption information, and generating and storing a data ciphertext;
s3, merging the data encryption information and the data ciphertext for encryption, generating and storing an index data ciphertext;
s4, combining and encrypting the index data pairwise to generate encrypted ciphertexts and storing the ciphertexts, and combining the index data ciphertexts and the encrypted ciphertexts to generate block encrypted ciphertexts and storing the block encrypted ciphertexts;
s5, acquiring source information of data content, re-encoding the source information by adopting encoding element combination to form an information source, and performing any combination operation on code values of each bit element of the information source.
The working principle and the advantages of the invention are as follows: the research data with high relevance and high importance is encrypted four times, the research data with high importance and low relevance is encrypted three times, the research data with low importance and high relevance is encrypted twice, and the research data with low importance and low relevance is encrypted once. In this way, the encryption level of the research data is determined according to the relevance size and the importance level, so that the encryption efficiency can be improved while the safety of the important data is ensured.
Further, in S1, the rule for determining the encryption stage number is as follows:
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is high, the encryption stage number is four stages;
if the relevance of the research data and the research project is small, the importance of the research data to the research project is high, and the encryption series is three stages;
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is low, the encryption stage number is two stages;
if the relevance of the research data and the research project is small, and the importance of the research data to the research project is low, the encryption stage number is one stage.
Has the advantages that: by means of the mode, the specific encryption stage number of the research data is determined, the storage space can be reasonably utilized, and the storage efficiency is improved.
Further, in S1, the standard value of the parameter for evaluating the relevance of the research data to the research project and the standard value of the parameter for evaluating the importance of the research data to the research project are dynamically variable.
Has the advantages that: by the mode, different encryption levels can be adopted at different moments according to the rule of dynamic change and the corresponding standard values at different moments.
Further, in S1, the standard value of the parameter for evaluating the association of the research data with the research project is an increasing function or a decreasing function of time, and the standard value of the parameter for evaluating the importance of the research data to the research project is an increasing function or a decreasing function of time.
Has the advantages that: by the mode, the standard value can continuously change along with time, and the corresponding dynamic precision is improved.
Further, in S1, the research data includes value data, identity data and execution data; wherein the encryption level of the value data is four, the encryption level of the identity data is three, and the encryption level of the execution data is two.
Has the advantages that: by adopting the encryption stage number, the method has strong pertinence, space saving, high efficiency and easy realization.
Drawings
Fig. 1 is a system structure block diagram of an embodiment of a cipher text storage system based on a block chain according to the present invention.
Detailed Description
The following is further detailed by the specific embodiments:
example 1
An embodiment is substantially as shown in figure 1, comprising:
the first encryption module is used for encrypting the data content through an encryption algorithm to generate and store a data ciphertext;
the second encryption module is used for storing corresponding data encryption information when the data generate the index, combining the data encryption information with the data ciphertext for encryption, generating and storing the index data ciphertext;
the third encryption module is used for encrypting the plurality of index data in a pairwise combination manner when the index data are stored in the block, and combining and encrypting the encryption result step by step to generate and store a block encryption ciphertext; combining the previous block cipher text with the block cipher text to generate and store the block cipher text of the block;
and the fourth encryption module is used for acquiring the source information of the data content, recoding the source information by adopting coding element combination to form an information source, and carrying out random combination operation on the code value of each bit element of the information source.
In this embodiment, the first encryption module, the second encryption module, the third encryption module and the fourth encryption module are all integrated on the server, and the functions thereof are realized by software/program/code/computer instructions.
The specific implementation process is as follows:
and S1, the first encryption module encrypts the data content through an encryption algorithm to obtain data encryption information, generates a data ciphertext and stores the data ciphertext. For example, setting a key data item to be encrypted, acquiring the data content of the key data item to be encrypted in each piece of data according to the set key data item to be encrypted, encrypting the data content by using a preset encryption algorithm, generating a data ciphertext and storing the data ciphertext, thereby completing the first-layer encryption.
And S2, merging the data encryption information and the data ciphertext for encryption, generating and storing the index data ciphertext. For example, when the index is generated from the acquired research data, the corresponding data encryption information is stored as a data item, the stored data item and the key data item in the first-layer encryption are encrypted and calculated at the same time, an index data ciphertext is generated and stored, and the second-layer encryption is completed.
And S3, combining and encrypting the index data pairwise to generate encrypted ciphertext and storing the encrypted ciphertext, combining the index data ciphertext and the encrypted ciphertext to generate block encrypted ciphertext and storing the block encrypted ciphertext. When the index data of the third encryption module is stored in the block, the plurality of index data are encrypted in a pairwise combination manner, the encryption result is encrypted in a step-by-step combination manner to generate a block encryption ciphertext and stored, for example, when the index data is stored in the block, the plurality of index data are encrypted in a pairwise combination manner to perform HASH encryption on the index data to form hexadecimal data; and combining the previous block cipher text with the block cipher text to generate and store the block cipher text of the cost block, thereby completing the third layer of encryption.
S4, the fourth encryption module obtains the source information of the data content, re-encodes the source information by adopting the coding element combination to form the information source, and performs any combination operation on the code value of each bit element of the information source. The specific process is as follows: firstly, recoding source information in a coding element combination mode to form an information source; then, generating a numerical ID which is cumulatively increased or decreased for the information source as a unique ID, and attaching the unique ID to the head of the information source; then, carrying out any combination operation of modulus, addition, subtraction, multiplication, division, exclusive or, and non-operation on the code value of each bit element of the information source to realize encryption on the information source, for example, calculating the code value and the length of each bit character according to a characteristic character string formed by a key, forming a long integer string C _ ID after any combination operation, and carrying out any combination operation on the code value of each bit element of the information source for many times by taking the C _ ID as one of operands; then, accumulating and increasing the unique ID of the information source participating in the operation each time, and setting a receiving ID at a receiving end to receive the ciphertext of the increased unique ID; and finally, carrying out length statistics on the encrypted ciphertext received by the receiving ID, and recoding the encrypted ciphertext by adopting a coding element combination mode to realize the encryption of the source information.
Based on the above embodiment, the present invention also discloses a cipher text storage method based on a block chain, which comprises the following steps:
s1, encrypting the data content through an encryption algorithm to generate and store a data ciphertext;
s2, storing corresponding data encryption information when the data generate the index, merging the data encryption information with the data ciphertext for encryption, generating an index data ciphertext and storing the index data ciphertext;
s3, when the index data are stored in the block, combining and encrypting the index data pairwise, combining and encrypting the encryption result step by step, generating a block transaction encryption ciphertext and storing the block transaction encryption ciphertext; combining the block cipher text of the previous block with the block cipher text to generate and store the block cipher text of the cost block;
s4, acquiring source information of data content, re-encoding the source information by adopting encoding element combination to form an information source, and performing any combination operation on code values of each bit element of the information source.
Example 2
The difference from the embodiment 1 is that the fourth encryption module adopts more than two coding element groups, or groups the coding element groups according to the length and the bit characteristics of the source information, and the same group adopts more than two coding element groups, wherein the coding element groups comprise a digital coding element group, an alphabetic coding element group, a Chinese character coding element group, a character coding element group and a language coding element group. Therefore, the coding element groups are combined in a static mode, or the coding element groups are combined in a dynamic mode, so that the cracking difficulty can be improved, and the safety can be ensured.
Example 3
The difference from the embodiment 2 is that the investigation data of the investigation item is encrypted and stored, and the encryption level, that is, the encryption frequency of the investigation data is determined according to two dimensions, namely, the relevance between the investigation data and the investigation item and the importance of the investigation data to the investigation item.
For research data, if the encryption series is 1, only the first encryption module is required to participate in encryption, and the encryption frequency is 1; if the encryption series is 2, the first encryption module and the second encryption module are required to participate in encryption in sequence, and the encryption frequency is 2; if the encryption series is 3, the first encryption module, the second encryption module and the third encryption module are required to participate in encryption in sequence, and the encryption frequency is 3; if the encryption series is 4, the first encryption module, the second encryption module, the third encryption module and the third encryption module are required to participate in encryption in sequence, and the encryption frequency is 4.
In this embodiment, the correlation between the research data and the research project and the importance of the research data to the research project may be quantitatively evaluated by the first encryption module through the prior art, which is not described herein again. In the present embodiment, the relevance refers to the relevance of the research data to the research project, and the importance refers to the importance of the research data to the research project. Research data can be divided into four categories including identity data, performance data, value data, and other data; the identity data is basic information of the surveyor, such as age, gender and income, the characteristics of a certain crowd can be analyzed by combining with value data, and the relevance is high and the importance is high; the execution data is basic information of a research project, such as research time and research place, and has high relevance and low importance; the value data is core data of a research project and data really required to be acquired by research work, and is high in relevance and importance; other data, which are less important than those in research, such as form fillers and tabulators, have less relevance and less importance.
In the storage process, the value data with the maximum relevance and the highest importance is stored in the first encryption module, and the data is encrypted for four times, so that the data security is fully ensured; storing the small identity data with high importance and relevance in a second encryption module, and encrypting for three times; storing the execution data in a third encryption module, encrypting twice; the other data is stored in the fourth encryption module and encrypted only once. In this way, the encryption level of the research data is determined according to the relevance size and the importance level, so that the encryption efficiency can be improved while the safety of the important data is ensured.
Example 4
The difference from embodiment 3 is that the evaluation criteria of the relevance size and the importance level of the research data are dynamically changed with time and are not fixed, that is, the evaluation criteria of the relevance size and the importance level of the research data are functions of time. For example, the parameter for measuring the relevance between the research data and the research project is J, the standard value of J is J0, the relevance is large when J is larger than or equal to J0, and the relevance is small when J is smaller than J0; the parameter for measuring the importance of the research data to the research project is K, the standard value of K is K0, K is more than or equal to K0 to indicate high importance, and K is less than K0 to indicate low importance.
In the embodiment, J is determined by an evaluation algorithm and does not change along with time, and a standard value J0 of J is a function of time t and is recorded as J0-J0 (t); likewise, K is determined by the evaluation algorithm to be invariant over time, the criterion K0 for K is a function of time t and is denoted as K0 ≠ K0(t), when t1 ≠ t2, J0(t1) ≠ J0(t2), and K0(t1) ≠ K0(t 2). For research data (including four categories of identity data, performance data, value data, and other data), there are four cases (t1 < t 2):
(1) if J0(t) is an increasing function of time t and J0(t1) is less than or equal to J0(t2), then the correlation is large at time t1 and small at time t 2;
(2) if J0(t) is a decreasing function of time t and J0(t2) ≦ J0(t1), then the association is small at time t1 and large at time t 2;
(3) if K0(t) is an increasing function of time t and K0(t1) is equal to or more than K equal to or less than K0(t2), then the importance is high at time t1 and the importance is low at time t 2;
(4) if K0(t) is a decreasing function of time t and K0(t2) ≦ K0(t1), then the importance is low at time t1 and high at time t 2.
Therefore, in the present embodiment, after the research and investigation data is completely stored at time t1, the size relationship between the relevance J and the J0(t) and the size relationship between the importance K and the K0(t) are evaluated in real time in the period of time [ t1, t2 ], so as to adjust the encryption level, wherein t1 < t 2. Taking the value data as an example, for the value data, it is assumed that J0(t) is an increasing function of time t, and K0(t) is a decreasing function of time t; j is more than or equal to J0(t1) and K is more than or equal to K0(t1) at the moment of t1, so that the relevance is high, the importance is high, and four-level encryption is required; j is less than J0(t1) and K is more than or equal to K0(t1) at the moment of t3(t1 is less than t3 and is less than or equal to t2), so that the relevance is small, the importance is high, and only three-level encryption is needed; that is, the number of encryptions is reduced by one at time t3 compared to time t 1; similar steps are carried out until t3 is t 2. By the mode, the encryption times of the research data can be dynamically adjusted, the encryption times can be updated along with the change of time, the corresponding and proper encryption times can be adopted at all times according to the relevance and the importance, the storage space can be reasonably utilized, and the storage efficiency can be improved.
The foregoing is merely an example of the present invention, and common general knowledge in the field of known specific structures and characteristics is not described herein in any greater extent than that known in the art at the filing date or prior to the priority date of the application, so that those skilled in the art can now appreciate that all of the above-described techniques in this field and have the ability to apply routine experimentation before this date can be combined with one or more of the present teachings to complete and implement the present invention, and that certain typical known structures or known methods do not pose any impediments to the implementation of the present invention by those skilled in the art. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (10)

1. Ciphertext storage system based on a block chain, comprising:
the first encryption module is used for encrypting the data content of the research data to obtain data encryption information, and generating and storing a data ciphertext;
the second encryption module is used for merging the data encryption information and the data ciphertext for encryption, generating and storing an index data ciphertext;
the third encryption module is used for encrypting the index data in a pairwise combination mode to generate encrypted ciphertext and storing the encrypted ciphertext, combining the index data ciphertext and the encrypted ciphertext to generate block encrypted ciphertext and storing the block encrypted ciphertext;
the fourth encryption module is used for acquiring source information of data content, recoding the source information by adopting coding element combination to form an information source, and performing random combination operation on code values of each bit element of the information source; it is characterized in that the preparation method is characterized in that,
the first encryption module is also used for evaluating the relevance of the research data and the research project, evaluating the importance of the research data to the research project and determining the encryption level according to the relevance and the importance.
2. The blockchain-based ciphertext storage system of claim 1, wherein the rule for the first encryption module to determine the number of encryption stages is as follows:
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is high, the encryption stage number is four stages;
if the relevance of the research data and the research project is small, the importance of the research data to the research project is high, and the encryption series is three stages;
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is low, the encryption stage number is two stages;
if the relevance of the research data and the research project is small, and the importance of the research data to the research project is low, the encryption stage number is one stage.
3. The blockchain-based ciphertext storage system of claim 2, wherein the first encryption module is configured to dynamically vary the criterion value of the parameter for evaluating the association of the research data with the research project and the criterion value of the parameter for evaluating the importance of the research data to the research project.
4. The blockchain-based ciphertext storage system of claim 3, wherein the first encryption module is configured to evaluate the standard value of the parameter for the association of the research data with the research project as an increasing function or a decreasing function of time, and the standard value of the parameter for the importance of the research data to the research project as an increasing function or a decreasing function of time.
5. The blockchain-based ciphertext storage system of claim 4, wherein the research data includes value data, identity data and execution data; wherein the encryption level of the value data is four, the encryption level of the identity data is three, and the encryption level of the execution data is two.
6. The ciphertext storage method based on the block chain is characterized by comprising the following steps:
s1, evaluating the relevance of the research data and the research project, evaluating the importance of the research data to the research project, and determining the encryption level according to the relevance and the importance:
if the encryption level is one, S2 is performed,
if the number of encryption stages is two, S2-S3 are performed,
if the number of encryption stages is three, S2-S4 are performed,
if the encryption stage number is four, carrying out S2-S5;
s2, encrypting the data content of the research data to obtain data encryption information, and generating and storing a data ciphertext;
s3, merging the data encryption information and the data ciphertext for encryption, generating and storing an index data ciphertext;
s4, combining and encrypting the index data pairwise to generate encrypted ciphertexts and storing the ciphertexts, and combining the index data ciphertexts and the encrypted ciphertexts to generate block encrypted ciphertexts and storing the block encrypted ciphertexts;
s5, acquiring source information of data content, re-encoding the source information by adopting encoding element combination to form an information source, and performing any combination operation on code values of each bit element of the information source.
7. The block chain-based ciphertext storage method of claim 6, wherein in S1, the rule for determining the encryption level is as follows:
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is high, the encryption stage number is four stages;
if the relevance of the research data and the research project is small, the importance of the research data to the research project is high, and the encryption series is three stages;
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is low, the encryption stage number is two stages;
if the relevance of the research data and the research project is small, and the importance of the research data to the research project is low, the encryption stage number is one stage.
8. The block chain-based ciphertext storage method of claim 7, wherein, in S1, the standard value of the parameter for evaluating the association of the research data with the research project and the standard value of the parameter for evaluating the importance of the research data to the research project are dynamically variable.
9. The block chain-based ciphertext storage method of claim 8, wherein, in S1, the standard value of the parameter for evaluating the association of the research data with the research project is an increasing function or a decreasing function of time, and the standard value of the parameter for evaluating the importance of the research data to the research project is an increasing function or a decreasing function of time.
10. The blockchain-based ciphertext storage method of claim 9, wherein in S1, the research data includes value data, identity data and execution data; wherein the encryption level of the value data is four, the encryption level of the identity data is three, and the encryption level of the execution data is two.
CN202110871053.0A 2021-07-30 2021-07-30 Ciphertext storage method and system based on block chain Active CN113569262B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110871053.0A CN113569262B (en) 2021-07-30 2021-07-30 Ciphertext storage method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110871053.0A CN113569262B (en) 2021-07-30 2021-07-30 Ciphertext storage method and system based on block chain

Publications (2)

Publication Number Publication Date
CN113569262A true CN113569262A (en) 2021-10-29
CN113569262B CN113569262B (en) 2022-05-10

Family

ID=78169467

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110871053.0A Active CN113569262B (en) 2021-07-30 2021-07-30 Ciphertext storage method and system based on block chain

Country Status (1)

Country Link
CN (1) CN113569262B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051638A (en) * 2013-01-09 2013-04-17 中国科学院深圳先进技术研究院 Multimedia data encryption method and multimedia data encryption distributing system
US20130291080A1 (en) * 2012-04-26 2013-10-31 Appsense Limited Systems and methods for data access protection
CN104724103A (en) * 2013-12-20 2015-06-24 株式会社电装 Inter-vehicle control apparatus and inter-vehicle control method
CN109327325A (en) * 2017-07-31 2019-02-12 深圳中软华泰信息技术有限公司 Multi-stage data acquisition and the evidences collection method of facing cloud platform Credibility Assessment
CN109359477A (en) * 2018-11-01 2019-02-19 山东众阳健康科技集团有限公司 A kind of data encryption, data verification method and its system
CN109643285A (en) * 2016-09-15 2019-04-16 美商纳兹控股有限责任公司 The user data transmission and storage of encryption
CN109802962A (en) * 2019-01-16 2019-05-24 广东辰宜信息科技有限公司 Encryption and decryption method in a kind of block chain technology
US10554394B1 (en) * 2016-09-30 2020-02-04 William Krut Toggle mute
CN111680316A (en) * 2020-08-12 2020-09-18 国网浙江省电力有限公司营销服务中心 Information security sharing method for multiple business bodies in power industry
CN112367169A (en) * 2020-11-11 2021-02-12 平安科技(深圳)有限公司 Data encryption and decryption method, device, equipment and storage medium
CN112667888A (en) * 2020-12-23 2021-04-16 唐金胜 Big data processing system based on block chain
CN112784300A (en) * 2021-01-22 2021-05-11 重庆秦嵩科技有限公司 Multi-stage log encryption processing system and method
CN113169874A (en) * 2018-11-27 2021-07-23 区块链控股有限公司 Computer-implemented system and method for enabling access to data stored on blockchains

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130291080A1 (en) * 2012-04-26 2013-10-31 Appsense Limited Systems and methods for data access protection
CN103051638A (en) * 2013-01-09 2013-04-17 中国科学院深圳先进技术研究院 Multimedia data encryption method and multimedia data encryption distributing system
CN104724103A (en) * 2013-12-20 2015-06-24 株式会社电装 Inter-vehicle control apparatus and inter-vehicle control method
CN109643285A (en) * 2016-09-15 2019-04-16 美商纳兹控股有限责任公司 The user data transmission and storage of encryption
US10554394B1 (en) * 2016-09-30 2020-02-04 William Krut Toggle mute
CN109327325A (en) * 2017-07-31 2019-02-12 深圳中软华泰信息技术有限公司 Multi-stage data acquisition and the evidences collection method of facing cloud platform Credibility Assessment
CN109359477A (en) * 2018-11-01 2019-02-19 山东众阳健康科技集团有限公司 A kind of data encryption, data verification method and its system
CN113169874A (en) * 2018-11-27 2021-07-23 区块链控股有限公司 Computer-implemented system and method for enabling access to data stored on blockchains
CN109802962A (en) * 2019-01-16 2019-05-24 广东辰宜信息科技有限公司 Encryption and decryption method in a kind of block chain technology
CN111680316A (en) * 2020-08-12 2020-09-18 国网浙江省电力有限公司营销服务中心 Information security sharing method for multiple business bodies in power industry
CN112367169A (en) * 2020-11-11 2021-02-12 平安科技(深圳)有限公司 Data encryption and decryption method, device, equipment and storage medium
CN112667888A (en) * 2020-12-23 2021-04-16 唐金胜 Big data processing system based on block chain
CN112784300A (en) * 2021-01-22 2021-05-11 重庆秦嵩科技有限公司 Multi-stage log encryption processing system and method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
MAHMOUD ALFADEL等: "Evaluating Time and Throughput at Different Modes of Operation in AES Algorithm", 《网页在线公开:HTTPS://IEEEXPLORE.IEEE.ORG/STAMP/STAMP.JSP?TP=&ARNUMBER=8079948》 *
姜楠等: "基于智能合约的个人隐私数据保护方法研究", 《信息网络安全》 *
胡志达: "大数据平台数据的安全管理体系架构设计", 《江苏科技信息》 *

Also Published As

Publication number Publication date
CN113569262B (en) 2022-05-10

Similar Documents

Publication Publication Date Title
US11843687B2 (en) Systems, devices, and processes for homomorphic encryption
Wan et al. VPSearch: Achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data
Chen et al. {SANNS}: Scaling up secure approximate {k-Nearest} neighbors search
US9489521B2 (en) Format preserving encryption methods for data strings with constraints
US8898478B2 (en) Method for querying data in privacy preserving manner using attributes
WO2021068726A1 (en) Method and device for storing and searching for transaction hash value in blockchain
US10341086B2 (en) Method and system for providing encrypted data for searching of information therein and a method and system for searching of information on encrypted data
Cong et al. Sortinghat: Efficient private decision tree evaluation via homomorphic encryption and transciphering
US20170308580A1 (en) Data Aggregation/Analysis System and Method Therefor
US10038562B2 (en) Method and system for providing encrypted data for searching of information therein and a method and system for searching of information on encrypted data
US20150326388A1 (en) Generation and verification of alternate data having specific format
US11860875B2 (en) System and method for encrypted search using hash vectorization models
US11184163B2 (en) Value comparison server, value comparison encryption system, and value comparison method
EP4181456A1 (en) Secure integer comparison using binary trees
Lin et al. Privacy-preserving similarity search with efficient updates in distributed key-value stores
CN117171817B (en) Electronic signature safety management method based on block chain
Wang et al. Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing
CN113569262B (en) Ciphertext storage method and system based on block chain
Riazi et al. PriSearch: Efficient search on private data
Mennink On the collision and preimage security of MDC-4 in the ideal cipher model
WO2017168798A1 (en) Encryption search index merge server, encryption search index merge system, and encryption search index merge method
CN112287374A (en) Excel ciphertext document recovery method, computer equipment and storage medium
US11977657B1 (en) Method and system for confidential repository searching and retrieval
US20230239142A1 (en) Method and apparatus for encoding order information
Tosun Practical and fully secure multi keyword ranked search over encrypted data with lightweight client

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant