CN113569262B - Ciphertext storage method and system based on block chain - Google Patents
Ciphertext storage method and system based on block chain Download PDFInfo
- Publication number
- CN113569262B CN113569262B CN202110871053.0A CN202110871053A CN113569262B CN 113569262 B CN113569262 B CN 113569262B CN 202110871053 A CN202110871053 A CN 202110871053A CN 113569262 B CN113569262 B CN 113569262B
- Authority
- CN
- China
- Prior art keywords
- data
- research
- encryption
- importance
- ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Finance (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Accounting & Taxation (AREA)
- Bioethics (AREA)
- Data Mining & Analysis (AREA)
- Computing Systems (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of data encryption, in particular to a ciphertext storage method and system based on a block chain, wherein the system comprises: the first encryption module is used for encrypting the data content of the research data to obtain data encryption information, generating and storing data ciphertext, evaluating the relevance between the research data and a research project, evaluating the importance of the research data to the research project, and determining the encryption series according to the relevance and the importance; the second encryption module is used for merging the data encryption information and the data ciphertext for encryption; the third encryption module is used for combining the index data ciphertext with the encrypted ciphertext to generate a block encrypted ciphertext; and the fourth encryption module is used for acquiring the source information of the data content, recoding the source information by adopting coding element combination to form an information source, and carrying out random combination operation on the code value of each bit element of the information source. The invention solves the technical problem that the prior art can not give full play to the performance of the block chain.
Description
Technical Field
The invention relates to the technical field of data encryption, in particular to a ciphertext storage method and system based on a block chain.
Background
For the block chain technology, digital encryption is the key, the encryption method is also challenged by cracking data security, and the non-tampering property of the block chain is not existed. At present, data is encrypted and stored, when the data is used, the data is re-encrypted and compared with original encrypted content, and the consistency comparison ensures that the data is not modified, so that the data cannot be modified. However, under the original mechanism for ensuring that the data is not modifiable, if the encryption method is leaked or broken, the encrypted content can still be ensured to be unchanged after the data modification, so that the measures for preventing the data modification are similar to the nominal measures.
To this end, the chinese prior art discloses a data encryption system and method, wherein the method includes the steps of: performing first-layer encryption in the data mart server, encrypting data contents through an encryption algorithm, generating and storing data ciphertexts; performing second-layer encryption in the data routing server, storing corresponding data encryption information when the data generate the index, combining the data encryption information with the first-layer encryption ciphertext for encryption, generating and storing index data ciphertext; performing third-layer encryption in the block chain server, and when the index data are stored in the block, combining and encrypting the plurality of index data pairwise, and combining and encrypting the encryption result step by step to generate and store a block transaction encryption ciphertext; and performing fourth-layer encryption in the block chain server, combining the previous block cipher text with the transaction encryption cipher text of the block, generating and maintaining the block encryption cipher text of the block, and completing the four-layer HASH encryption.
By adopting a four-layer HASH encryption mode, the encryption content of the previous layer is used as the encryption item of the layer by each layer, and if data is modified, the encryption content of each layer needs to be modified, so that the difficulty of data modification is improved, and the probability of data modification is reduced. However, when the third layer of encryption is performed in the block chain server, the plurality of index data are combined and encrypted two by two, the encryption results are combined and encrypted step by step, and the block transaction encrypted ciphertext is generated and stored.
Disclosure of Invention
The invention provides a cipher text storage method and system based on a block chain, which solve the technical problem that the performance of the block chain cannot be fully exerted in the prior art.
The basic scheme provided by the invention is as follows: ciphertext storage system based on a block chain, comprising:
the first encryption module is used for encrypting the data content of the research data to obtain data encryption information, and generating and storing a data ciphertext;
the second encryption module is used for merging the data encryption information and the data ciphertext for encryption, generating and storing an index data ciphertext;
the third encryption module is used for encrypting the index data in a pairwise combination mode to generate encrypted ciphertext and storing the encrypted ciphertext, combining the index data ciphertext and the encrypted ciphertext to generate block encrypted ciphertext and storing the block encrypted ciphertext;
the fourth encryption module is used for acquiring source information of data content, recoding the source information by adopting coding element combination to form an information source, and performing random combination operation on code values of each bit element of the information source;
the first encryption module is also used for evaluating the relevance of the research data and the research project, evaluating the importance of the research data to the research project and determining the encryption level according to the relevance and the importance.
The working principle and the advantages of the invention are as follows: evaluating the relevance of the research data and the research project, and evaluating the importance of the research data to the research project; determining an encryption series according to the relevance and the importance, and encrypting according to the encryption series; the research data with high relevance and high importance is encrypted four times, the research data with high importance and low relevance is encrypted three times, the research data with low importance and high relevance is encrypted twice, and the research data with low importance and low relevance is encrypted once. In this way, the encryption level of the research data is determined according to the relevance size and the importance level, so that the encryption efficiency can be improved while the safety of the important data is ensured.
The invention determines the encryption grade of the research data according to the relevance size and the importance level, can ensure the safety of the important data, can improve the encryption efficiency, and solves the technical problem that the prior art can not fully exert the performance of the block chain.
Further, the rule for determining the encryption level number by the first encryption module is as follows:
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is high, the encryption stage number is four stages;
if the relevance of the research data and the research project is small, the importance of the research data to the research project is high, and the encryption series is three stages;
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is low, the encryption stage number is two stages;
if the relevance of the research data and the research project is small, and the importance of the research data to the research project is low, the encryption stage number is one stage.
Has the advantages that: the specific encryption stage number of the research data is determined according to the relevance between the research data and the research project and the importance of the research data to the research project, so that the storage space can be reasonably utilized, and the storage efficiency is improved.
Further, the standard value of the parameter for evaluating the relevance of the research data and the research project and the standard value of the parameter for evaluating the importance of the research data to the research project are dynamically variable.
Has the advantages that: the standard value of the parameter for evaluating the correlation and the standard value of the parameter for evaluating the importance are dynamically variable, and different encryption levels can be adopted at different moments according to the rule of dynamic change and the corresponding standard values at different moments.
Further, the first encryption module is used for evaluating that the standard value of the parameter of the relevance of the research data and the research project is an increasing function or a decreasing function of time, and the standard value of the parameter of the importance of the research data to the research project is an increasing function or a decreasing function of time.
Has the advantages that: the standard value is an increasing function or a decreasing function of time, so that the standard value can continuously change along with the time, the time is as thin as possible, and the corresponding dynamic precision is improved.
Further, the research data includes value data, identity data and execution data; wherein the encryption level of the value data is four, the encryption level of the identity data is three, and the encryption level of the execution data is two.
Has the advantages that: the encryption series is adopted for common value data, identity data and execution data, the pertinence is strong, the space is saved, and the efficiency is high.
Based on the above ciphertext storage system based on the block chain, the present invention further provides a ciphertext storage method based on the block chain, which includes:
s1, evaluating the relevance of the research data and the research project, evaluating the importance of the research data to the research project, and determining the encryption level according to the relevance and the importance:
if the encryption level is one, S2 is performed,
if the number of encryption stages is two, S2-S3 are performed,
if the number of encryption stages is three, S2-S4 are performed,
if the encryption stage number is four, performing S2-S5;
s2, encrypting the data content of the research data to obtain data encryption information, and generating and storing a data ciphertext;
s3, merging the data encryption information and the data ciphertext for encryption, generating and storing an index data ciphertext;
s4, combining and encrypting the index data pairwise to generate encrypted ciphertexts and storing the ciphertexts, and combining the index data ciphertexts and the encrypted ciphertexts to generate block encrypted ciphertexts and storing the block encrypted ciphertexts;
s5, acquiring source information of data content, re-encoding the source information by adopting encoding element combination to form an information source, and performing any combination operation on code values of each bit element of the information source.
The working principle and the advantages of the invention are as follows: the research data with high relevance and high importance is encrypted four times, the research data with high importance and low relevance is encrypted three times, the research data with low importance and high relevance is encrypted twice, and the research data with low importance and low relevance is encrypted once. In this way, the encryption level of the research data is determined according to the relevance size and the importance level, so that the encryption efficiency can be improved while the safety of the important data is ensured.
Further, in S1, the rule for determining the encryption stage number is as follows:
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is high, the encryption stage number is four stages;
if the relevance of the research data and the research project is small, the importance of the research data to the research project is high, and the encryption series is three stages;
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is low, the encryption stage number is two stages;
if the relevance of the research data and the research items is small, and the importance of the research data to the research items is low, the encryption level is one level.
Has the advantages that: by means of the mode, the specific encryption stage number of the research data is determined, the storage space can be reasonably utilized, and the storage efficiency is improved.
Further, in S1, the standard value of the parameter for evaluating the relevance of the research data to the research project and the standard value of the parameter for evaluating the importance of the research data to the research project are dynamically variable.
Has the advantages that: by the mode, different encryption levels can be adopted at different moments according to the rule of dynamic change and the corresponding standard values at different moments.
Further, in S1, the standard value of the parameter for evaluating the association of the research data with the research project is an increasing function or a decreasing function of time, and the standard value of the parameter for evaluating the importance of the research data to the research project is an increasing function or a decreasing function of time.
Has the advantages that: by the mode, the standard value can continuously change along with time, and the corresponding dynamic precision is improved.
Further, in S1, the research data includes value data, identity data and execution data; wherein the encryption level of the value data is four, the encryption level of the identity data is three, and the encryption level of the execution data is two.
Has the advantages that: by adopting the encryption stage number, the method has strong pertinence, space saving, high efficiency and easy realization.
Drawings
Fig. 1 is a system structure block diagram of an embodiment of a cipher text storage system based on a block chain according to the present invention.
Detailed Description
The following is further detailed by the specific embodiments:
example 1
An embodiment is substantially as shown in figure 1, comprising:
the first encryption module is used for encrypting the data content through an encryption algorithm to generate and store a data ciphertext;
the second encryption module is used for storing corresponding data encryption information when the data generate the index, combining the data encryption information with the data ciphertext for encryption, generating and storing the index data ciphertext;
the third encryption module is used for encrypting the plurality of index data in a pairwise combination manner when the index data are stored in the block, and combining and encrypting the encryption result step by step to generate and store a block encryption ciphertext; combining the previous block cipher text with the block cipher text to generate and store the block cipher text of the block;
and the fourth encryption module is used for acquiring the source information of the data content, recoding the source information by adopting coding element combination to form an information source, and carrying out random combination operation on the code value of each bit element of the information source.
In this embodiment, the first encryption module, the second encryption module, the third encryption module and the fourth encryption module are all integrated on the server, and the functions thereof are realized by software/program/code/computer instructions.
The specific implementation process is as follows:
and S1, the first encryption module encrypts the data content through an encryption algorithm to obtain data encryption information, generates a data ciphertext and stores the data ciphertext. For example, setting a key data item to be encrypted, acquiring the data content of the key data item to be encrypted in each piece of data according to the set key data item to be encrypted, encrypting the data content by using a preset encryption algorithm, generating a data ciphertext and storing the data ciphertext, thereby completing the first-layer encryption.
And S2, merging the data encryption information and the data ciphertext for encryption, generating and storing the index data ciphertext. For example, when the index is generated from the acquired research data, the corresponding data encryption information is stored as a data item, the stored data item and the key data item in the first-layer encryption are encrypted and calculated at the same time, an index data ciphertext is generated and stored, and the second-layer encryption is completed.
And S3, combining and encrypting the index data pairwise to generate encrypted ciphertext and storing the encrypted ciphertext, combining the index data ciphertext and the encrypted ciphertext to generate block encrypted ciphertext and storing the block encrypted ciphertext. When the index data of the third encryption module is stored in the block, the plurality of index data are encrypted in a pairwise combination manner, the encryption result is encrypted in a step-by-step combination manner to generate a block encryption ciphertext and stored, for example, when the index data is stored in the block, the plurality of index data are encrypted in a pairwise combination manner to perform HASH encryption on the index data to form hexadecimal data; and combining the previous block cipher text with the block cipher text to generate and store the block cipher text of the cost block, thereby completing the third layer of encryption.
S4, the fourth encryption module obtains the source information of the data content, re-encodes the source information by adopting the coding element combination to form the information source, and performs any combination operation on the code value of each bit element of the information source. The specific process is as follows: firstly, recoding source information in a coding element combination mode to form an information source; then, generating a numerical ID which is cumulatively increased or decreased for the information source as a unique ID, and attaching the unique ID to the head of the information source; then, carrying out any combination operation of modulus, addition, subtraction, multiplication, division, exclusive or, and non-operation on the code value of each bit element of the information source to realize encryption on the information source, for example, calculating the code value and the length of each bit character according to a characteristic character string formed by a key, forming a long integer string C _ ID after any combination operation, and carrying out any combination operation on the code value of each bit element of the information source for many times by taking the C _ ID as one of operands; then, accumulating and increasing the unique ID of the information source participating in the operation each time, and setting a receiving ID at a receiving end to receive the ciphertext of the increased unique ID; and finally, carrying out length statistics on the encrypted ciphertext received by the receiving ID, and recoding the encrypted ciphertext by adopting a coding element combination mode to realize the encryption of the source information.
Based on the above embodiment, the present invention also discloses a cipher text storage method based on a block chain, which comprises the following steps:
s1, encrypting the data content through an encryption algorithm to generate and store a data ciphertext;
s2, storing corresponding data encryption information when the data generate the index, merging the data encryption information with the data ciphertext for encryption, generating an index data ciphertext and storing the index data ciphertext;
s3, when the index data are stored in the block, combining and encrypting the index data pairwise, combining and encrypting the encryption result step by step, generating a block transaction encryption ciphertext and storing the block transaction encryption ciphertext; combining the block cipher text of the previous block with the block cipher text to generate and store the block cipher text of the cost block;
s4, acquiring source information of data content, re-encoding the source information by adopting encoding element combination to form an information source, and performing any combination operation on code values of each bit element of the information source.
Example 2
The difference from the embodiment 1 is that the fourth encryption module adopts more than two coding element groups, or groups the coding element groups according to the length and the bit characteristics of the source information, and the same group adopts more than two coding element groups, wherein the coding element groups comprise a digital coding element group, an alphabetic coding element group, a Chinese character coding element group, a character coding element group and a language coding element group. Therefore, the coding element groups are combined in a static mode, or the coding element groups are combined in a dynamic mode, so that the cracking difficulty can be improved, and the safety can be ensured.
Example 3
The difference from the embodiment 2 is that the investigation data of the investigation item is encrypted and stored, and the encryption level, that is, the encryption frequency of the investigation data is determined according to two dimensions, namely, the relevance between the investigation data and the investigation item and the importance of the investigation data to the investigation item.
For research data, if the encryption series is 1, only the first encryption module is required to participate in encryption, and the encryption frequency is 1; if the encryption series is 2, the first encryption module and the second encryption module are required to participate in encryption in sequence, and the encryption frequency is 2; if the encryption series is 3, the first encryption module, the second encryption module and the third encryption module are required to participate in encryption in sequence, and the encryption frequency is 3; if the encryption series is 4, the first encryption module, the second encryption module, the third encryption module and the third encryption module are required to participate in encryption in sequence, and the encryption frequency is 4.
In this embodiment, the correlation between the research data and the research project and the importance of the research data to the research project may be quantitatively evaluated by the first encryption module through the prior art, which is not described herein again. In the present embodiment, the relevance refers to the relevance of the research data to the research project, and the importance refers to the importance of the research data to the research project. Research data can be divided into four categories including identity data, performance data, value data, and other data; the identity data is basic information of the surveyor, such as age, gender and income, the characteristics of a certain crowd can be analyzed by combining with value data, and the relevance is high and the importance is high; the execution data is basic information of a research project, such as research time and research place, and has high relevance and low importance; the value data is core data of a research project and data really required to be acquired by research work, and is high in relevance and importance; other data, which are less important than those in research, such as form fillers and tabulators, have less relevance and less importance.
In the storage process, the value data with the maximum relevance and the highest importance is stored in the first encryption module, and the data is encrypted for four times, so that the data security is fully ensured; storing the small identity data with high importance and relevance in a second encryption module, and encrypting for three times; storing the execution data in a third encryption module, encrypting twice; the other data is stored in the fourth encryption module and encrypted only once. In this way, the encryption level of the research data is determined according to the relevance size and the importance level, so that the encryption efficiency can be improved while the safety of the important data is ensured.
Example 4
The difference from embodiment 3 is that the evaluation criteria of the relevance size and the importance level of the research data are dynamically changed with time and are not fixed, that is, the evaluation criteria of the relevance size and the importance level of the research data are functions of time. For example, the parameter for measuring the relevance between the research data and the research project is J, the standard value of J is J0, the relevance is large when J is larger than or equal to J0, and the relevance is small when J is smaller than J0; the parameter for measuring the importance of research data to research projects is K, the standard value of K is K0, K is more than or equal to K0 to indicate high importance, and K is less than K0 to indicate low importance.
In the embodiment, J is determined by an evaluation algorithm and does not change along with time, and a standard value J0 of J is a function of time t and is marked as J0-J0 (t); likewise, K is determined by the evaluation algorithm to be invariant over time, the criterion K0 for K being a function of time t, denoted K0 ≠ K0(t), when t1 ≠ t2, J0(t1) ≠ J0(t2), K0(t1) ≠ K0(t 2). For research data (including four categories of identity data, performance data, value data, and other data), there are four cases (t1 < t 2):
(1) if J0(t) is an increasing function of time t and J0(t1) is less than or equal to J0(t2), then the relevance is large at time t1 and small at time t 2;
(2) if J0(t) is a decreasing function of time t and J0(t2) is equal to or less than J0(t1), then the correlation is small at time t1 and large at time t 2;
(3) if K0(t) is an increasing function of time t and K0(t1) is more than or equal to K is less than or equal to K0(t2), then the importance is high at the moment t1 and the importance is low at the moment t 2;
(4) if K0(t) is a decreasing function of time t and K0(t2) ≦ K0(t1), then the importance is low at time t1 and high at time t 2.
Therefore, in the present embodiment, after the research and survey data is completely stored at time t1, the size relationship between the relevance J and J0(t) and the size relationship between the importance K and K0(t) are evaluated in real time during the period of time [ t1, t2 ], so as to adjust the encryption level, wherein t1 < t 2. Taking the value data as an example, for the value data, it is assumed that J0(t) is an increasing function of time t, and K0(t) is a decreasing function of time t; at the moment of t1, J is more than or equal to J0(t1) and K is more than or equal to K0(t1), so that the relevance is high, the importance is high, and four-level encryption is required; j is less than J0(t1) and K is more than or equal to K0(t1) at the moment of t3(t1 is less than t3 and is less than or equal to t2), so that the relevance is small, the importance is high, and only three-level encryption is needed; that is, the number of encryptions is reduced by one at time t3 compared to time t 1; similar steps are carried out until t3 is t 2. By the mode, the encryption times of the research data can be dynamically adjusted, the encryption times can be updated along with the change of time, the corresponding and proper encryption times can be adopted at all times according to the relevance and the importance, the storage space can be reasonably utilized, and the storage efficiency can be improved.
The foregoing is merely an example of the present invention, and common general knowledge in the field of known specific structures and characteristics is not described herein in any greater extent than that known in the art at the filing date or prior to the priority date of the application, so that those skilled in the art can now appreciate that all of the above-described techniques in this field and have the ability to apply routine experimentation before this date can be combined with one or more of the present teachings to complete and implement the present invention, and that certain typical known structures or known methods do not pose any impediments to the implementation of the present invention by those skilled in the art. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.
Claims (10)
1. Ciphertext storage system based on a block chain, comprising:
the first encryption module is used for encrypting the data content of the research data to obtain data encryption information, and generating and storing a data ciphertext;
the second encryption module is used for merging the data encryption information and the data ciphertext for encryption, generating and storing an index data ciphertext;
the third encryption module is used for combining and encrypting the index data pairwise to generate encrypted ciphertext and storing the encrypted ciphertext, combining the index data ciphertext and the encrypted ciphertext to generate block encrypted ciphertext and storing the block encrypted ciphertext;
the fourth encryption module is used for acquiring source information of data content, recoding the source information by adopting coding element combination to form an information source, and performing random combination operation on code values of each bit element of the information source; it is characterized in that the preparation method is characterized in that,
the first encryption module is also used for evaluating the relevance of the research data and the research project, evaluating the importance of the research data to the research project and determining the encryption series according to the relevance and the importance; storing the value data with the maximum relevance and the highest importance in a first encryption module, and encrypting for four times; storing the small identity data with high importance and relevance in a second encryption module, and encrypting for three times; storing the execution data in a third encryption module, encrypting twice; storing other data in a fourth encryption module, and encrypting once;
the evaluation criteria of the correlation size and the importance of the research data are all functions of time.
2. The blockchain-based ciphertext storage system of claim 1, wherein the rule for the first encryption module to determine the number of encryption stages is as follows:
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is high, the encryption stage number is four stages;
if the relevance of the research data and the research project is small, the importance of the research data to the research project is high, and the encryption series is three stages;
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is low, the encryption stage number is two stages;
if the relevance of the research data and the research project is small, and the importance of the research data to the research project is low, the encryption stage number is one stage.
3. The blockchain-based ciphertext storage system of claim 2, wherein the first encryption module is configured to dynamically vary the criterion value of the parameter for evaluating the association of the research data with the research project and the criterion value of the parameter for evaluating the importance of the research data to the research project.
4. The blockchain-based ciphertext storage system of claim 3, wherein the first encryption module is configured to evaluate the standard value of the parameter for the association of the research data with the research project as an increasing function or a decreasing function of time, and the standard value of the parameter for the importance of the research data to the research project as an increasing function or a decreasing function of time.
5. The blockchain-based ciphertext storage system of claim 4, wherein the research data includes value data, identity data and execution data; wherein the encryption level of the value data is four, the encryption level of the identity data is three, and the encryption level of the execution data is two.
6. The ciphertext storage method based on the block chain is characterized by comprising the following steps:
s1, evaluating the relevance of the research data and the research project, evaluating the importance of the research data to the research project, and determining the encryption level according to the relevance and the importance:
if the encryption level is one, S2 is performed,
if the number of encryption stages is two, S2-S3 are performed,
if the number of encryption stages is three, S2-S4 are performed,
if the encryption stage number is four, carrying out S2-S5;
storing the value data with the maximum relevance and the highest importance in a first encryption module, and encrypting for four times; storing the small identity data with high importance and relevance in a second encryption module, and encrypting for three times; storing the execution data in a third encryption module, encrypting twice; storing other data in a fourth encryption module, and encrypting once;
the evaluation standards of the relevance size and the importance of the research data are all functions of time;
s2, encrypting the data content of the research data to obtain data encryption information, and generating and storing a data ciphertext;
s3, merging the data encryption information and the data ciphertext for encryption, generating and storing an index data ciphertext;
s4, combining and encrypting the index data pairwise to generate encrypted ciphertexts and storing the ciphertexts, and combining the index data ciphertexts and the encrypted ciphertexts to generate block encrypted ciphertexts and storing the block encrypted ciphertexts;
s5, acquiring source information of data content, re-encoding the source information by adopting encoding element combination to form an information source, and performing any combination operation on code values of each bit element of the information source.
7. The ciphertext storage method based on the block chain as claimed in claim 6, wherein in S1, the rule for determining the encryption level is as follows:
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is high, the encryption stage number is four stages;
if the relevance of the research data and the research project is small, the importance of the research data to the research project is high, and the encryption series is three stages;
if the relevance of the research data and the research project is large, and the importance of the research data to the research project is low, the encryption stage number is two stages;
if the relevance of the research data and the research project is small, and the importance of the research data to the research project is low, the encryption stage number is one stage.
8. The block chain-based ciphertext storage method of claim 7, wherein, in S1, the standard value of the parameter for evaluating the association of the research data with the research project and the standard value of the parameter for evaluating the importance of the research data to the research project are dynamically variable.
9. The block chain-based ciphertext storage method of claim 8, wherein, in S1, the standard value of the parameter for evaluating the association of the research data with the research project is an increasing function or a decreasing function of time, and the standard value of the parameter for evaluating the importance of the research data to the research project is an increasing function or a decreasing function of time.
10. The blockchain-based ciphertext storage method of claim 9, wherein in S1, the research data includes value data, identity data and execution data; wherein the encryption level of the value data is four, the encryption level of the identity data is three, and the encryption level of the execution data is two.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110871053.0A CN113569262B (en) | 2021-07-30 | 2021-07-30 | Ciphertext storage method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110871053.0A CN113569262B (en) | 2021-07-30 | 2021-07-30 | Ciphertext storage method and system based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113569262A CN113569262A (en) | 2021-10-29 |
CN113569262B true CN113569262B (en) | 2022-05-10 |
Family
ID=78169467
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110871053.0A Active CN113569262B (en) | 2021-07-30 | 2021-07-30 | Ciphertext storage method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113569262B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103051638A (en) * | 2013-01-09 | 2013-04-17 | 中国科学院深圳先进技术研究院 | Multimedia data encryption method and multimedia data encryption distributing system |
CN104724103A (en) * | 2013-12-20 | 2015-06-24 | 株式会社电装 | Inter-vehicle control apparatus and inter-vehicle control method |
CN109359477A (en) * | 2018-11-01 | 2019-02-19 | 山东众阳健康科技集团有限公司 | A kind of data encryption, data verification method and its system |
CN109802962A (en) * | 2019-01-16 | 2019-05-24 | 广东辰宜信息科技有限公司 | Encryption and decryption method in a kind of block chain technology |
CN111680316A (en) * | 2020-08-12 | 2020-09-18 | 国网浙江省电力有限公司营销服务中心 | Information security sharing method for multiple business bodies in power industry |
CN112784300A (en) * | 2021-01-22 | 2021-05-11 | 重庆秦嵩科技有限公司 | Multi-stage log encryption processing system and method |
CN113169874A (en) * | 2018-11-27 | 2021-07-23 | 区块链控股有限公司 | Computer-implemented system and method for enabling access to data stored on blockchains |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130291080A1 (en) * | 2012-04-26 | 2013-10-31 | Appsense Limited | Systems and methods for data access protection |
US10503933B2 (en) * | 2016-09-15 | 2019-12-10 | Nuts Holdings, Llc | Structured data folding with transmutations |
US10554394B1 (en) * | 2016-09-30 | 2020-02-04 | William Krut | Toggle mute |
CN109327325A (en) * | 2017-07-31 | 2019-02-12 | 深圳中软华泰信息技术有限公司 | Multi-stage data acquisition and the evidences collection method of facing cloud platform Credibility Assessment |
CN112367169B (en) * | 2020-11-11 | 2022-11-29 | 平安科技(深圳)有限公司 | Data encryption and decryption method, device, equipment and storage medium |
CN112667888A (en) * | 2020-12-23 | 2021-04-16 | 唐金胜 | Big data processing system based on block chain |
-
2021
- 2021-07-30 CN CN202110871053.0A patent/CN113569262B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103051638A (en) * | 2013-01-09 | 2013-04-17 | 中国科学院深圳先进技术研究院 | Multimedia data encryption method and multimedia data encryption distributing system |
CN104724103A (en) * | 2013-12-20 | 2015-06-24 | 株式会社电装 | Inter-vehicle control apparatus and inter-vehicle control method |
CN109359477A (en) * | 2018-11-01 | 2019-02-19 | 山东众阳健康科技集团有限公司 | A kind of data encryption, data verification method and its system |
CN113169874A (en) * | 2018-11-27 | 2021-07-23 | 区块链控股有限公司 | Computer-implemented system and method for enabling access to data stored on blockchains |
CN109802962A (en) * | 2019-01-16 | 2019-05-24 | 广东辰宜信息科技有限公司 | Encryption and decryption method in a kind of block chain technology |
CN111680316A (en) * | 2020-08-12 | 2020-09-18 | 国网浙江省电力有限公司营销服务中心 | Information security sharing method for multiple business bodies in power industry |
CN112784300A (en) * | 2021-01-22 | 2021-05-11 | 重庆秦嵩科技有限公司 | Multi-stage log encryption processing system and method |
Also Published As
Publication number | Publication date |
---|---|
CN113569262A (en) | 2021-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11843687B2 (en) | Systems, devices, and processes for homomorphic encryption | |
Wan et al. | VPSearch: Achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data | |
US10489604B2 (en) | Searchable encryption processing system and searchable encryption processing method | |
US8938067B2 (en) | Format preserving encryption methods for data strings with constraints | |
US11860875B2 (en) | System and method for encrypted search using hash vectorization models | |
Chatterjee et al. | A modified lightweight PRESENT cipher for IoT security | |
Cong et al. | Sortinghat: Efficient private decision tree evaluation via homomorphic encryption and transciphering | |
US20170308580A1 (en) | Data Aggregation/Analysis System and Method Therefor | |
US10341086B2 (en) | Method and system for providing encrypted data for searching of information therein and a method and system for searching of information on encrypted data | |
CN110110163A (en) | Safe substring search is with filtering enciphered data | |
US9906511B1 (en) | Secure impersonation detection | |
US9762384B2 (en) | Generation and verification of alternate data having specific format | |
US10038562B2 (en) | Method and system for providing encrypted data for searching of information therein and a method and system for searching of information on encrypted data | |
Akavia et al. | Secure search on encrypted data via multi-ring sketch | |
US20190363878A1 (en) | Value comparison server, value comparison encryption system, and value comparison method | |
US11977657B1 (en) | Method and system for confidential repository searching and retrieval | |
EP4181456A1 (en) | Secure integer comparison using binary trees | |
CN112287374A (en) | Excel ciphertext document recovery method, computer equipment and storage medium | |
Wang et al. | Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing | |
CN113569262B (en) | Ciphertext storage method and system based on block chain | |
WO2017168798A1 (en) | Encryption search index merge server, encryption search index merge system, and encryption search index merge method | |
Riazi et al. | PriSearch: Efficient search on private data | |
JP6351890B1 (en) | Search device, secret search system, and search program | |
Zhang et al. | Optimal Compression for Encrypted Key-Value Store in Cloud Systems | |
Harvan et al. | Processing encrypted and compressed time series data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |