CN117544309B - Mixed computing storage and transmission method and system for plaintext and ciphertext - Google Patents

Mixed computing storage and transmission method and system for plaintext and ciphertext Download PDF

Info

Publication number
CN117544309B
CN117544309B CN202410037382.9A CN202410037382A CN117544309B CN 117544309 B CN117544309 B CN 117544309B CN 202410037382 A CN202410037382 A CN 202410037382A CN 117544309 B CN117544309 B CN 117544309B
Authority
CN
China
Prior art keywords
ciphertext
matrix
information
mapping
target element
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410037382.9A
Other languages
Chinese (zh)
Other versions
CN117544309A (en
Inventor
陈颖
黄佑君
高立超
洪笑梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Id Check Network Technology Co ltd
Original Assignee
Xiamen Id Check Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Id Check Network Technology Co ltd filed Critical Xiamen Id Check Network Technology Co ltd
Priority to CN202410037382.9A priority Critical patent/CN117544309B/en
Publication of CN117544309A publication Critical patent/CN117544309A/en
Application granted granted Critical
Publication of CN117544309B publication Critical patent/CN117544309B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a method and a system for mixed computing storage and transmission of plaintext and ciphertext, which relate to the technical field of data encryption, wherein the method comprises the following steps: converting the information to be encrypted into an information storage matrix; selecting a target element; determining a ciphertext locating matrix according to the first position information of the target element; setting an encryption mapping function; obtaining a first mapping code according to the characters contained in the target element, the encryption mapping function and the first position information; obtaining a second mapping code according to the non-target element and the encryption mapping function; randomly generating numbers as ciphertext elements; using the second mapping code as a plaintext element; obtaining a plaintext and ciphertext mixing matrix according to the ciphertext elements and the plaintext elements; encrypting the plaintext and ciphertext mixing matrix through a file password to obtain an encrypted file; and storing the encrypted file, the file password, the ciphertext locating matrix, the first mapping code and the encryption mapping function in different storage addresses respectively. According to the invention, the security of secret information during storage and transmission can be improved.

Description

Mixed computing storage and transmission method and system for plaintext and ciphertext
Technical Field
The invention relates to the technical field of data encryption, in particular to a method and a system for mixed computing storage and transmission of plaintext and ciphertext.
Background
In the related art, CN115936078A discloses a method for applying a plaintext domain neural network to homomorphic ciphertext domains, comprising the steps of: the first step, adding candidate activation functions; secondly, counting performance indexes of classical activation functions; thirdly, initializing the candidate activation function; training a neural network model to obtain performance indexes of the candidate activation functions; fifthly, calculating the sum of penalty terms according to an optimization formula of the candidate activation function; and sixthly, determining an optimal activation function. The invention can select the optimal activation function for the homomorphic encryption neural network, so that the plaintext domain neural network with the optimal activation function can be applied to the homomorphic ciphertext domain.
CN115345307a discloses a safe convolutional neural network reasoning method and system on ciphertext image, and designs a splitting method for splitting input image; based on the calculation specificity of the convolutional neural network, distributing reasoning calculation to three servers for execution, wherein two are main calculation nodes and one is a ReLU auxiliary calculation node; the calculation protocol ensures that the calculation results of the two main calculation nodes are added to be the actual convolutional neural network reasoning result. The invention does not need any encryption means, and the time cost is small. For a user, only simple operations such as splitting and merging are needed for the input images, and compared with encryption and decryption operations, the method is more convenient and efficient. Pre-computation at the server side is avoided, which also reduces the overhead. The reasoning method provided by the invention does not need to use any encryption primitive, so that the reasoning calculation time is shorter; and the method has no encryption computing capacity requirement on users, and has stronger practicability.
Based on the above related technology, the technical problem that the decrypting party spends a large amount of time decrypting the encrypted file can be solved, however, the related technology has difficulty in ensuring the security and privacy of the encrypted file when the encrypted file is stored and transmitted, that is, in ensuring that a non-designated decryptor cannot decrypt the encrypted file.
The information disclosed in the background section of this application is only for enhancement of understanding of the general background of this application and should not be taken as an acknowledgement or any form of suggestion that this information forms the prior art already known to a person skilled in the art.
Disclosure of Invention
The invention provides a method and a system for storing and transmitting plaintext and ciphertext through mixed calculation, which can encrypt elements in an information storage matrix in a mode of file passwords, ciphertext locating matrixes, mapping codes and encryption mapping functions, and respectively adopt different storage modes and communication modes when storing and transmitting encrypted files, file passwords, ciphertext locating matrixes, first mapping codes and encryption mapping functions, so that the technical problem that the security and privacy of the encrypted files are difficult to guarantee is solved.
According to a first aspect of the present invention, there is provided a plaintext and ciphertext hybrid computing storage and transmission method, comprising: converting information to be encrypted into an information storage matrix, wherein the information storage matrix is an n multiplied by n square matrix, and elements in the information storage matrix are part of information in the information to be encrypted; selecting a target element of the information storage matrix; determining a ciphertext locating matrix according to the first position information of the target element in the information storage matrix; setting an encryption mapping function according to the proportion of the number of the target elements to the total number of elements in the information storage matrix; obtaining a first mapping code of the target element according to the character contained in the target element, the encryption mapping function and the first position information of the target element in the information storage matrix; obtaining a second mapping code of the non-target element according to the non-target element which is not selected in the information storage matrix and the encryption mapping function; randomly generating numbers to replace target elements and taking the numbers as ciphertext elements; using the second mapping code to replace non-target elements as plaintext elements; obtaining a plaintext and ciphertext mixing matrix according to the ciphertext element and the plaintext element; obtaining a file password according to the first mapping code and the second mapping code, and encrypting the plaintext and ciphertext mixing matrix through the file password to obtain an encrypted file; and storing the encrypted file, the file password, the ciphertext locating matrix, the first mapping code and the encryption mapping function in different storage addresses respectively.
According to the invention, the conversion of information to be encrypted into an information storage matrix comprises: according to the formulaDetermining the number of rows and columns n of an information storage matrix, wherein L is the total number of characters of the information to be encrypted,/->K is a preset character number, and is a positive integer set; if->Supplementing space bits at the end of the information to be encrypted to make the total number of characters of the supplemented information to be encrypted equal to +.>And equally dividing the supplemented information to be encrypted into +.>Each information fragment to be encrypted is respectively used as an element of the information storage matrix to obtain the information storage matrix; if->The front +.>Average division of individual characters into->The information fragment to be encrypted is the first +.>And taking the L-th character as the last information fragment to be encrypted, and taking each information fragment to be encrypted as an element of the information storage matrix respectively to obtain the information storage matrix.
According to the invention, the encryption mapping function is a monotonically increasing function; wherein obtaining a first mapping code of the target element according to the character contained in the target element, the encryption mapping function, and the first position information of the target element in the information storage matrix, includes:
Wherein obtaining a first mapping code of the target element according to the character contained in the target element, the encryption mapping function, and the first position information of the target element in the information storage matrix, includes: acquiring ASCII codes of all characters of the target element; according to the formulaObtain the first position information as +.>First mapping code corresponding to the x-th character in the target element of (2)>Wherein->For the preset operation function, ++>For the encryption mapping function, < >>ASCII code for the x-th character in the target element; according to the first position information is +.>First mapping codes corresponding to the characters in the target element of (2) to obtain a first position information of +.>Is a first mapping code of a target element of (a).
According to the invention, according to the non-target elements which are not selected in the information storage matrix and the encryption mapping function, a second mapping code of the non-target elements is obtained, comprising: acquiring ASCII codes of all characters of the non-target elements; according to the formulaObtain position information as +.>Second mapping code corresponding to the y-th character in the non-target element of (2)>Wherein->For the encryption mapping function, < >>ASCII code for the y-th character in the target element; according to the position information is + >Second mapping code corresponding to each character in non-target element of (2) to obtain position information of +.>Is not a second mapped code of the target element.
According to the invention, the method further comprises: transmitting the encrypted file, the file password, the ciphertext locating matrix, the first mapping code and the encrypted mapping function to a decryption party through different transmission paths respectively; the decryption party decrypts the encrypted file through the file password to obtain a plaintext and ciphertext mixing matrix; the decryption party decrypts the plaintext and ciphertext mixing matrix through the ciphertext locating matrix, the first mapping code and the encryption mapping function to obtain an information storage matrix; and obtaining decryption information according to the information storage matrix.
According to the invention, the number of elements of the ciphertext locating matrix is the same as that of the information storage matrix, and the elements at the first position information in the ciphertext locating matrix are 1, and the elements at other positions are 0; the decryption party decrypts the plaintext and ciphertext mixing matrix through the ciphertext locating matrix, the first mapping code and the encryption mapping function to obtain an information storage matrix, and the decryption party comprises the following steps: determining first position information of ciphertext elements in the plaintext-ciphertext mixing matrix according to the ciphertext locating matrix; matching the first mapping code with the first position information according to the first position information, the first mapping code, the encryption mapping function and the preset character number to obtain a matching result; according to the matching result, the first position information, the first mapping code, the encryption mapping function and the preset character number, decrypting the ciphertext element to obtain a target element; obtaining non-target elements according to the second mapping code and the encryption mapping function in the plaintext and ciphertext mixing matrix; and obtaining the information storage matrix according to the target element and the non-target element.
According to the present invention, according to the first location information, the first mapping code, the encryption mapping function, and the preset character number, the matching between the first mapping code and the first location information is performed to obtain a matching result, which includes: according to the formulaObtaining the minimum data bit error corresponding to the z first mapping code>Wherein->For the mth first position information, M is the number of target elements, +.>For the preset operation function, ++>Is an inverse function of the preset operation function, +.>For the encryption mapping function, < >>As an inverse of the encryption mapping function, +.>In order to find the mapping function of the characters corresponding to ASCII codes, k is the preset number of characters, len is the statistical function for counting the length of the character string, < >>An xth data bit of a zth first mapping code; minimum data bit error->Corresponding first position information is determined to be the first position information matched with the z first mapping code; and obtaining the matching result according to the first position information matched with each first mapping code.
According to a second aspect of the present invention, there is provided a plaintext and ciphertext hybrid computing storage and transmission system, comprising: the information storage matrix module is used for converting the information to be encrypted into an information storage matrix, wherein the information storage matrix is an n multiplied by n square matrix, and elements in the information storage matrix are part of information in the information to be encrypted; a target element module for selecting a target element of the information storage matrix; the ciphertext locating matrix module is used for determining a ciphertext locating matrix according to the first position information of the target element in the information storage matrix; the encryption mapping function module is used for setting an encryption mapping function according to the proportion of the number of the target elements to the total number of elements in the information storage matrix; the first mapping code module is used for obtaining a first mapping code of the target element according to the characters contained in the target element, the encryption mapping function and the first position information of the target element in the information storage matrix; the second mapping code module is used for obtaining a second mapping code of the non-target element according to the non-target element which is not selected in the information storage matrix and the encryption mapping function; the ciphertext element module is used for randomly generating numbers to replace target elements and serve as ciphertext elements; the plaintext element module is used for replacing non-target elements by using the second mapping code to serve as plaintext elements; the plaintext and ciphertext mixing matrix module is used for obtaining a plaintext and ciphertext mixing matrix according to the ciphertext elements and the plaintext elements; the encryption module is used for obtaining a file password according to the first mapping code and the second mapping code, and encrypting the plaintext and ciphertext mixing matrix through the file password to obtain an encrypted file; and the storage module is used for respectively storing the encrypted file, the file password, the ciphertext locating matrix, the first mapping code and the encryption mapping function in different storage addresses.
According to a third aspect of the present invention, there is provided an plaintext and ciphertext hybrid computing storage and transmission apparatus, comprising: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to invoke the instructions stored by the memory to perform the plaintext and ciphertext hybrid computing storage and transmission method.
According to a fourth aspect of the present invention, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the plaintext and ciphertext hybrid calculation storage and transmission method.
The technical effects are as follows: according to the invention, the information to be encrypted can be converted and expressed in the form of the information storage matrix, and the relation between the total number of characters of the information to be encrypted and the number of preset characters and the number of elements in the matrix is referred when the information storage matrix is generated, so that the convenience of subsequent operation is improved. When the first mapping code is determined, the first mapping code of the target element can be obtained according to the character contained in the target element, the encryption mapping function and the first position information of the target element in the information storage matrix, and the encryption mapping function, the ASCII code and the first position information are referred to when the first mapping code is generated, so that a non-designated decryption party cannot decrypt according to part of information after obtaining the information, and the confidentiality of the information is improved. When the second mapping code is determined, the second mapping code of the non-target element can be obtained according to the non-target element and the encryption mapping function, and the non-target element is mapped through the encryption mapping function, so that the mapping code in a digital form can be obtained after the target element and the non-target element are mapped, even if a non-designated decryption party cannot distinguish the non-target element and the target element, decryption is difficult, and the information security is improved. When the matching result is determined, the minimum data bit error can be determined according to the first position information, the first mapping code, the encryption mapping function and the preset character number, so that the matching result is obtained according to the first position information corresponding to the minimum data bit error and the first mapping code, the first mapping code corresponds to the first position information, and the accuracy of decryption information is ensured. In addition, because of the matching processing process, the corresponding relation between the first mapping code and the first position information is not marked in the transmission process of the encrypted information, so that the difficulty of decrypting by a stealer of secret information is increased, and the safety of the encrypted information is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention as claimed. Other features and aspects of the present invention will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
In order to more clearly illustrate the embodiments of the invention or the solutions of the prior art, the drawings which are necessary for the description of the embodiments or the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other embodiments may be obtained from these drawings without inventive effort to a person skilled in the art,
FIG. 1 schematically illustrates a flow diagram of a plaintext and ciphertext hybrid computing storage and transmission method according to an embodiment of the present invention;
fig. 2 schematically illustrates a block diagram of a plaintext and ciphertext hybrid computing storage and transmission system according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The technical scheme of the invention is described in detail below by specific examples. The following embodiments may be combined with each other, and some embodiments may not be repeated for the same or similar concepts or processes.
Fig. 1 schematically shows a flowchart of a method for storing and transmitting plaintext and ciphertext hybrid computation according to an embodiment of the invention, the method comprising:
step S101, converting information to be encrypted into an information storage matrix, wherein the information storage matrix is an n multiplied by n square matrix, and elements in the information storage matrix are part of information in the information to be encrypted;
step S102, selecting target elements of the information storage matrix;
step S103, determining a ciphertext locating matrix according to the first position information of the target element in the information storage matrix;
step S104, setting an encryption mapping function according to the proportion of the number of the target elements to the total number of elements in the information storage matrix;
step 105, obtaining a first mapping code of the target element according to the character contained in the target element, the encryption mapping function and the first position information of the target element in the information storage matrix;
Step S106, obtaining a second mapping code of the non-target element according to the non-target element which is not selected in the information storage matrix and the encryption mapping function;
step S107, randomly generating numbers to replace target elements as ciphertext elements;
step S108, using the second mapping code to replace non-target elements as plaintext elements;
step S109, obtaining a plaintext and ciphertext mixing matrix according to the ciphertext element and the plaintext element;
step S110, a file password is obtained according to the first mapping code and the second mapping code, and the plaintext and ciphertext mixing matrix is encrypted through the file password to obtain an encrypted file;
step S111, storing the encrypted file, the file password, the ciphertext locating matrix, the first mapping code and the encryption mapping function in different storage addresses.
According to the plaintext and ciphertext hybrid computing storage and transmission method, the information to be encrypted is converted into the information storage matrix, the first mapping code of the ciphertext elements and the second mapping code of the plaintext elements are obtained in different modes, the file passwords are obtained based on the first mapping code and the second mapping code, the encrypted file is further obtained, and when the encrypted file, the file passwords, the ciphertext locating matrix, the first mapping code and the encryption mapping function are stored and transmitted, different storage modes and communication modes are respectively adopted, so that even if a non-appointed decryption party can obtain partial information, the positions of the plaintext elements and the ciphertext elements, namely the mapping modes, cannot be determined, the encrypted file cannot be decrypted, and the safety and the privacy of the information transmission are improved.
According to one embodiment of the present invention, in step S101, information to be encrypted is converted into an information storage matrix, where the information storage matrix is an n×n square matrix, and elements in the information storage matrix are part of information in the information to be encrypted.
For example, plaintext in plaintext and ciphertext refers to text or character strings that have not been encrypted, and ciphertext refers to text that has been encrypted. The information to be encrypted is converted into a storage matrix, which is an n×n square matrix, for example, the characters to be encrypted are converted into a 2×2 information storage matrix.
According to one embodiment of the present invention, converting information to be encrypted into an information storage matrix includes: the number of rows and columns n of the information storage matrix is determined according to equation (1),
(1)
wherein L is the total number of characters of the information to be encrypted,k is a preset character number, and is a positive integer set; if it isSupplementing space bit at the end of the information to be encryptedMaking the total number of characters of the information to be encrypted after supplementing equal to +.>And equally dividing the supplemented information to be encrypted into +.>Each information fragment to be encrypted is respectively used as an element of the information storage matrix to obtain the information storage matrix; if- >The information to be encrypted is precededAverage division of individual characters into->The information fragment to be encrypted is the first +.>And taking the L-th character as the last information fragment to be encrypted, and taking each information fragment to be encrypted as an element of the information storage matrix respectively to obtain the information storage matrix.
In accordance with one embodiment of the present invention,the number of characters that can be stored for the information storage matrix, < >>For the difference between the number of characters storable in the information storage matrix and the total number of characters of the information to be encrypted, +.>Representing determining the order n of the information storage matrix such that the difference between the number of characters storable in the information storage matrix and the total number of characters of the information to be encrypted can take a minimum value, e.g. a preset number of characters of 3 and the total number of characters of the information to be encrypted of 12, the order of the information storage matrixTaking 2, so that the difference value is 0, and obtaining the minimum value; if->If the number of characters which can be stored in the information storage matrix is larger than the total number of characters of the information to be encrypted, supplementing +.>Space bits are used for ensuring that the total number of characters of the information to be encrypted is equal to the number of characters which can be stored in the information storage matrix, and the information after supplement is equally divided into +.>The number of fragments, as elements of the information storage matrix, for example, the preset number of characters is 3, the total number of characters of the information to be encrypted is 10, the order of the information storage matrix is 2, 2 space bits are supplemented at the end of the encrypted information, and the supplemented information is equally divided into 4 fragments and is respectively used as the elements of the information storage matrix; if- >The number of characters which can be stored in the information storage matrix is less than or equal to the total number of characters of the information to be encrypted, and the information to be encrypted is subjected to the former +.>Average division of individual characters into->The method comprises the steps of taking the characters of the rest information to be encrypted as the last information piece to be encrypted, for example, the preset character number is 3, the total number of the characters of the information to be encrypted is 13, the order of an information storage matrix is 2, the first 9 characters of the information to be encrypted are divided into 3 information pieces to be encrypted on average, the rest 4 characters are taken as the last information piece to be encrypted, and all the information pieces to be encrypted are taken as elements of the information storage matrix respectively.
In this way, the information to be encrypted is converted and expressed in the form of the information storage matrix, and the relation between the total number of characters of the information to be encrypted and the number of preset characters and the number of elements in the matrix is referred when the information storage matrix is generated, so that the convenience of subsequent operation is improved.
According to one embodiment of the invention, in step S102, a target element of the information storage matrix is selected.
For example, an element including important information in each element of the information storage matrix is generally selected as a target element, and the target element may be selected randomly, for example, an element of row 1 and column 2 in the 2×2 information storage matrix is selected as the target element.
According to one embodiment of the present invention, in step S103, a ciphertext locating matrix is determined according to the first position information of the target element in the information storage matrix.
For example, the position of the target element in the information storage matrix is the first position information, the ciphertext locating matrix is used for locating the position of the ciphertext, the ciphertext locating matrix is equal to the information storage matrix in order, in the ciphertext locating matrix, the element of the position of the target element is 1, other elements in the ciphertext locating matrix are 0, for example, the element of the first row and the second column in the 2×2 matrix is selected as the target element, the element of the first row and the second column in the ciphertext locating matrix is 1, and other elements are 0.
According to one embodiment of the present invention, in step S104, an encryption mapping function is set according to the ratio of the number of target elements to the total number of elements in the information storage matrix.
For example, the total number of elements in the information storage matrix is a, the number of target elements is b, the encryption mapping function may be set as a linear function, wherein the slope of the linear function is the ratio of the total number of elements a to the number of target elements b, and a constant term of the linear function may be arbitrarily set, and the encryption mapping function is a monotonically increasing function.
According to one embodiment of the present invention, in step S105, a first mapping code of the target element is obtained according to the character contained in the target element, the encryption mapping function, and first location information of the target element in the information storage matrix.
According to one embodiment of the present invention, the encryption mapping function is a monotonically increasing function; wherein obtaining a first mapping code of the target element according to the character contained in the target element, the encryption mapping function, and the first position information of the target element in the information storage matrix, includes: acquiring ASCII codes of all characters of the target element; obtaining the first position information as according to formula (2)First mapping code corresponding to the x-th character in the target element of (2)>
(2)
Wherein,for the preset operation function, ++>For the encryption mapping function, < >>ASCII code for the x-th character in the target element; according to the first position information is +.>First mapping codes corresponding to the characters in the target element of (2) to obtain a first position information of +.>Is a first mapping code of a target element of (a).
According to one embodiment of the invention, the target element may contain information in the form of numbers, characters, symbols, etc., and the contained characters of the target element are converted into ASCII code using a specified 7-bit or 8-bit binary combination To represent 128 or 256 possible characters for facilitating subsequent calculations;for mapping result obtained by mapping ASCII code of the x-th character in the target element by encryption mapping function,/I>For the first position information to be subjected to a predetermined operation function, for example, the predetermined operation function may be multiplication, ">The predetermined operation function may be a division operation,the invention does not limit the type of the preset operation function. />In order to map the ASCII code mapped by the mapping function with the first position information calculated by the preset function, and then calculate the preset function, a first mapping code corresponding to the x-th character in the target element is obtained, for example, when the preset function is multiplication,when the preset function is division operation,the method comprises the steps of carrying out a first treatment on the surface of the And combining the first mapping codes corresponding to the characters in the target element to obtain the first mapping codes of the target element.
In this way, according to the character contained in the target element, the encryption mapping function and the first position information of the target element in the information storage matrix, the first mapping code of the target element is obtained, and the encryption mapping function, the ASCII code and the first position information are referred to when the first mapping code is generated, so that a non-designated decryption party cannot decrypt according to part of information after obtaining part of information, and the confidentiality of the information is improved.
According to one embodiment of the present invention, in step S106, a second mapping code of the non-target element is obtained according to the non-target element not selected in the information storage matrix and the encryption mapping function.
According to one embodiment of the present invention, obtaining the second mapping code of the non-target element according to the non-target element not selected in the information storage matrix and the encryption mapping function includes: acquiring ASCII codes of all characters of the non-target elements; obtaining the position information as according to formula (3)Second mapping code corresponding to the y-th character in the non-target element of (2)>
(3)
Wherein,for the encryption mapping function, < >>ASCII code for the y-th character in the target element; according to the position information is +>Second mapping code corresponding to each character in non-target element of (2) to obtain position information of +.>Is not a second mapped code of the target element.
In accordance with one embodiment of the present invention,to map the ASCII code of the y-th character in the non-target element by the encryption mapping function to obtain the y-th character in the non-target elementAnd combining the second mapping codes corresponding to the characters in the non-target elements according to the second mapping codes corresponding to the characters in the non-target elements, and determining the second mapping codes of the non-target elements.
In this way, according to the non-target element and the encryption mapping function, the second mapping code of the non-target element is obtained, and the non-target element is mapped by the encryption mapping function, so that the mapping code in a digital form can be obtained after the target element and the non-target element are mapped, even if a non-designated decryption party cannot distinguish the non-target element and the target element, decryption is difficult, and the information security is improved.
According to one embodiment of the present invention, in step S107, a number is randomly generated as a ciphertext element in place of the target element.
For example, the target element is subjected to an encryption mapping function and a first position information operation to obtain a first mapping code, the first mapping code is a string of numbers, and the numbers can be randomly generated as ciphertext elements to replace the target element, that is, the target element is a ciphertext element at the position, the ciphertext element is a string of randomly generated numbers, and the ciphertext element cannot obtain the target element through inverse operation.
According to one embodiment of the present invention, in step S108, the second mapping code is used instead of the non-target element as the plaintext element. For example, the non-target element is located in the second mapping code, and the plaintext is subjected to inverse mapping to obtain the non-target element.
According to one embodiment of the present invention, in step S109, a plaintext-ciphertext mixing matrix is obtained from the ciphertext element and the plaintext element. That is, after the process of replacing the target element in the information storage matrix with the ciphertext element and replacing the non-target element in the information storage matrix with the plaintext element, the plaintext-ciphertext hybrid matrix may be obtained.
For example, in the plaintext-ciphertext hybrid matrix, both the ciphertext elements and the plaintext elements are in digital form, and decryption can be performed only by determining the position of the ciphertext in the matrix according to the ciphertext locating matrix, thereby improving the information security.
According to one embodiment of the present invention, in step S110, a file password is obtained according to the first mapping code and the second mapping code, and the plaintext and ciphertext mixing matrix is encrypted by the file password to obtain an encrypted file.
For example, according to the first mapping code and the second mapping code, a number is randomly selected to be combined into a file password, and the file password can be used for encrypting the plaintext and ciphertext mixing matrix to obtain an encrypted file.
According to one embodiment of the present invention, in step S111, the encrypted file, the file password, the ciphertext locating matrix, the first mapping code, and the encryption mapping function are stored in different storage addresses, respectively.
For example, the encrypted file, the file password, the ciphertext locating matrix, the first mapping code and the encrypted mapping function are respectively stored in different storage addresses, so that the information is prevented from being stolen at one time. When transmission is carried out, different transmission ways are adopted, for example, an encrypted file is transmitted in a mail mode, a file password is transmitted in a voice call mode, and therefore when a non-designated decryption party does not steal all the encrypted file, the file password, the ciphertext locating matrix, the first mapping code and the encryption mapping function information, the encrypted file cannot be decrypted, and therefore information cannot be checked.
According to one embodiment of the invention, the method further comprises: transmitting the encrypted file, the file password, the ciphertext locating matrix, the first mapping code and the encrypted mapping function to a decryption party through different transmission paths respectively; the decryption party decrypts the encrypted file through the file password to obtain a plaintext and ciphertext mixing matrix; the decryption party decrypts the plaintext and ciphertext mixing matrix through the ciphertext locating matrix, the first mapping code and the encryption mapping function to obtain an information storage matrix; and obtaining decryption information according to the information storage matrix.
For example, the encrypted file, the file password, the ciphertext locating matrix, the first mapping code and the encryption mapping function are transmitted to the decryptor through different communication channels respectively, and in this way, information leakage caused by interception of a single transmission path can be prevented. The plaintext matrix is encrypted by a file password to obtain an encrypted file, and a decryption party can decrypt the encrypted file by the received file password to obtain a ciphertext mixing matrix; the ciphertext locating matrix can locate the position of the ciphertext in the ciphertext mixing matrix, and the decrypting party can decrypt the ciphertext mixing matrix through the ciphertext locating matrix, the first mapping code and the encryption mapping function to obtain an information storage matrix; the information storage matrix is formed by converting information to be encrypted, and decryption information can be determined according to the information storage matrix.
According to one embodiment of the present invention, the number of elements of the ciphertext locating matrix is the same as that of the information storage matrix, and the element at the first position information in the ciphertext locating matrix is 1, and the elements at other positions are 0; the decryption party decrypts the plaintext and ciphertext mixing matrix through the ciphertext locating matrix, the first mapping code and the encryption mapping function to obtain an information storage matrix, and the decryption party comprises the following steps: determining first position information of ciphertext elements in the plaintext-ciphertext mixing matrix according to the ciphertext locating matrix; matching the first mapping code with the first position information according to the first position information, the first mapping code, the encryption mapping function and the preset character number to obtain a matching result; according to the matching result, the first position information, the first mapping code, the encryption mapping function and the preset character number, decrypting the ciphertext element to obtain a target element; obtaining non-target elements according to the second mapping code and the encryption mapping function in the plaintext and ciphertext mixing matrix; and obtaining the information storage matrix according to the target element and the non-target element.
For example, the number of elements of the ciphertext locating matrix is the same as that of the information storage matrix, and the elements at the first position information in the ciphertext locating matrix are 1, and the elements at other positions are 0; determining the position of the ciphertext element in the plaintext matrix, namely first position information, according to the position of the 1 element in the ciphertext positioning matrix; according to the first position information, the first mapping code, the encryption mapping function and the preset character number are matched to obtain a matching result, when encryption is carried out, numbers are randomly generated to replace target elements, the target elements possibly are multiple, and when decryption is carried out, as the first mapping code received by a decryption party is not marked with the first position information of which target element is matched with the first mapping code, the first mapping code is required to be matched with the first position information to determine ciphertext elements corresponding to the first mapping code, then the ciphertext elements are replaced with the first mapping code to be decrypted, for example, the elements of the 1 st row, the 2 nd column and the 2 nd row, the 1 st column of the information storage matrix are used as target elements, the number of the generated first mapping codes is 2, the first mapping codes respectively corresponding to the two target elements are required to be matched to determine, and decryption is carried out on the ciphertext elements according to the matching result to obtain the target elements; performing inverse function operation of an encryption mapping function on the second mapping code to obtain non-target elements; after the target elements and non-target elements are obtained, an information storage matrix may be obtained.
According to one embodiment of the present invention, matching the first mapping code and the first location information according to the first location information, the first mapping code, the encryption mapping function, and the preset number of characters, to obtain a matching result includes: obtaining the minimum data bit error corresponding to the z first mapping code according to the formula (4)
(4)
Wherein,for the mth first position information, M is the number of target elements, +.>In order to set the operation function in advance,is an inverse function of the preset operation function, +.>For the encryption mapping function, < >>As an inverse function of the encryption mapping function,in order to find the mapping function of the characters corresponding to ASCII codes, k is the preset number of characters, len is the statistical function for counting the length of the character string, < >>An xth data bit of a zth first mapping code; minimum data bit error->Corresponding first position information is determined to be the first position information matched with the z first mapping code; and obtaining the matching result according to the first position information matched with each first mapping code.
According to one embodiment of the present invention, the result of the first location information after the operation of the preset function and the result of the ASCII code corresponding to the character in the target element after the operation of the encryption mapping function may obtain the first mapping code corresponding to the character, And performing inverse operation of a preset function on the x data bit of the z first mapping code and the result of the preset function operation on the m first position information to obtain the result of the encryption mapping function operation on the ASCII codes of the characters in the target elements corresponding to the x data bit of the z first mapping code. Performing an inverse operation of the encryption mapping function on the result, in other words, performing an operation on the result by means of the inverse function of the encryption mapping function, i.e./>Can obtain the z-th firstASCII codes of characters corresponding to the xth data bit of the mapping code. Further, the->In order to perform mapping function operation of searching for characters corresponding to ASCII codes on ASCII codes of characters corresponding to the x-th data bit of the z-th first mapping code, namely, determining operation of original characters corresponding to the ASCII codes, and obtaining characters in target elements corresponding to the x-th data bit of the z-th first mapping code. />And the z-th first mapping code can respectively perform the operation with M first position information for the difference value between the sum of the lengths of all the characters obtained by the operation and the preset character number, and when the ratio of the difference value to the preset character number obtains the minimum value, the minimum data bit error is obtained, and the first position information with the minimum value obtained by the ratio is the first position information matched with the z-th first mapping code.
According to an embodiment of the present invention, theoretically, when the minimum data bit error is 0, the first mapping code is matched with the first position information, so as to avoid that the minimum data bit error cannot be equal to 0 due to the reserved precision of the small digits in the operation, and the unmatched result is caused, the first position information when the ratio obtains the minimum value can be used as the first position information matched with the z first mapping code. When the first map code and the first position information are not matched, since the first position information which is not matched does not match the first position information when the operation of the formula (2) is performed, the result when the operation of the preset operation function is performed on the first position information which is not matched is different from the result when the operation of the preset operation function is performed on the first position information which is matched, and therefore, the character string obtained through the inverse operation is different from the target element, and the length of the character string is different from the character string length (i.e., the preset character length) of the target element, and therefore, the ratio obtained when the operation is performed on the first map code and the first position information which is not matched is larger than the ratio obtained when the operation is performed on the first map code and the first position information which is matched is performed, and therefore, when the ratio is at the minimum value, the first position information which is matched with the first map code can be obtained.
In this way, the minimum data bit error can be determined according to the first position information, the first mapping code, the encryption mapping function and the preset character number, so that the matching result is obtained according to the first position information corresponding to the minimum data bit error and the first mapping code, the first mapping code corresponds to the first position information, and the accuracy of decryption information is ensured. In addition, because of the matching processing process, the corresponding relation between the first mapping code and the first position information is not marked in the transmission process of the encrypted information, so that the difficulty of decrypting by a stealer of secret information is increased, and the safety of the encrypted information is improved.
According to an embodiment of the present invention, after the matching process, the first location information corresponding to the first mapping code may be determined, so that the inverse operation may be performed by the first mapping code to obtain the target element. And performing inverse mapping on the second mapping code on other position information to obtain non-target elements, further obtaining an information storage matrix, and splicing all elements in the information storage matrix to obtain decryption information.
According to the plaintext and ciphertext hybrid computing storage and transmission method, the information to be encrypted is converted into the information storage matrix, the first mapping code of the ciphertext elements and the second mapping code of the plaintext elements are obtained in different modes, the file passwords are obtained based on the first mapping code and the second mapping code, the encrypted file is further obtained, and when the encrypted file, the file passwords, the ciphertext locating matrix, the first mapping code and the encryption mapping function are stored and transmitted, different storage modes and communication modes are respectively adopted, so that even if a non-appointed decryption party can obtain partial information, the positions of the plaintext elements and the ciphertext elements, namely the mapping modes, cannot be determined, the encrypted file cannot be decrypted, and the safety and the privacy of the information transmission are improved.
When the information storage matrix is determined, the information to be encrypted can be converted and expressed in the form of the information storage matrix, and the relation between the total number of characters of the information to be encrypted and the number of preset characters and the number of elements in the matrix is referred when the information storage matrix is generated, so that the convenience of subsequent operation is improved. When the first mapping code is determined, the first mapping code of the target element can be obtained according to the character contained in the target element, the encryption mapping function and the first position information of the target element in the information storage matrix, and the encryption mapping function, the ASCII code and the first position information are referred to when the first mapping code is generated, so that a non-designated decryption party cannot decrypt according to part of information after obtaining the information, and the confidentiality of the information is improved. When the second mapping code is determined, the second mapping code of the non-target element can be obtained according to the non-target element and the encryption mapping function, and the non-target element is mapped through the encryption mapping function, so that the mapping code in a digital form can be obtained after the target element and the non-target element are mapped, even if a non-designated decryption party cannot distinguish the non-target element and the target element, decryption is difficult, and the information security is improved. When the matching result is determined, the minimum data bit error can be determined according to the first position information, the first mapping code, the encryption mapping function and the preset character number, so that the matching result is obtained according to the first position information corresponding to the minimum data bit error and the first mapping code, the first mapping code corresponds to the first position information, and the accuracy of decryption information is ensured. In addition, because of the matching processing process, the corresponding relation between the first mapping code and the first position information is not marked in the transmission process of the encrypted information, so that the difficulty of decrypting by a stealer of secret information is increased, and the safety of the encrypted information is improved.
Fig. 2 schematically illustrates a block diagram of a plaintext and ciphertext hybrid computing storage and transmission system according to an embodiment of the invention, the system comprising:
the information storage matrix module is used for converting the information to be encrypted into an information storage matrix, wherein the information storage matrix is an n multiplied by n square matrix, and elements in the information storage matrix are part of information in the information to be encrypted;
a target element module for selecting a target element of the information storage matrix;
the ciphertext locating matrix module is used for determining a ciphertext locating matrix according to the first position information of the target element in the information storage matrix;
the encryption mapping function module is used for setting an encryption mapping function according to the proportion of the number of the target elements to the total number of elements in the information storage matrix;
the first mapping code module is used for obtaining a first mapping code of the target element according to the characters contained in the target element, the encryption mapping function and the first position information of the target element in the information storage matrix;
the second mapping code module is used for obtaining a second mapping code of the non-target element according to the non-target element which is not selected in the information storage matrix and the encryption mapping function;
The ciphertext element module is used for randomly generating numbers to replace target elements and serve as ciphertext elements;
the plaintext element module is used for replacing non-target elements by using the second mapping code to serve as plaintext elements;
the plaintext and ciphertext mixing matrix module is used for obtaining a plaintext and ciphertext mixing matrix according to the ciphertext elements and the plaintext elements;
the encryption module is used for obtaining a file password according to the first mapping code and the second mapping code, and encrypting the plaintext and ciphertext mixing matrix through the file password to obtain an encrypted file;
and the storage module is used for respectively storing the encrypted file, the file password, the ciphertext locating matrix, the first mapping code and the encryption mapping function in different storage addresses.
The invention also provides a mixed computing storage and transmission device for the plaintext and ciphertext, which comprises: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to invoke the instructions stored by the memory to perform the plaintext and ciphertext hybrid computing storage and transmission method.
The invention also provides a computer readable storage medium having stored thereon computer program instructions which when executed by a processor implement the plaintext and ciphertext hybrid computing storage and transmission method.
The present invention may be a method, apparatus, system, and/or computer program product. The computer program product may include a computer readable storage medium having computer readable program instructions embodied thereon for performing various aspects of the present invention.
It will be appreciated by persons skilled in the art that the embodiments of the invention described above and shown in the drawings are by way of example only and are not limiting. The objects of the present invention have been fully and effectively achieved. The functional and structural principles of the present invention have been shown and described in the examples and embodiments of the invention may be modified or practiced without departing from the principles described.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention.

Claims (10)

1. The method for mixed computing, storing and transmitting the plaintext and ciphertext is characterized by comprising the following steps of:
converting information to be encrypted into an information storage matrix, wherein the information storage matrix is an n multiplied by n square matrix, and elements in the information storage matrix are part of information in the information to be encrypted;
selecting a target element of the information storage matrix;
determining a ciphertext locating matrix according to the first position information of the target element in the information storage matrix;
setting an encryption mapping function according to the proportion of the number of the target elements to the total number of elements in the information storage matrix;
obtaining a first mapping code of the target element according to the character contained in the target element, the encryption mapping function and the first position information of the target element in the information storage matrix;
obtaining a second mapping code of the non-target element according to the non-target element which is not selected in the information storage matrix and the encryption mapping function;
randomly generating numbers to replace target elements and taking the numbers as ciphertext elements;
using the second mapping code to replace non-target elements as plaintext elements;
obtaining a plaintext and ciphertext mixing matrix according to the ciphertext element and the plaintext element;
Obtaining a file password according to the first mapping code and the second mapping code, and encrypting the plaintext and ciphertext mixing matrix through the file password to obtain an encrypted file;
and storing the encrypted file, the file password, the ciphertext locating matrix, the first mapping code and the encryption mapping function in different storage addresses respectively.
2. The method for mixed computing storage and transmission of plaintext and ciphertext according to claim 1, wherein converting the information to be encrypted into an information storage matrix comprises:
according to the formula
Determining the number of rows and columns n of an information storage matrix, wherein L is the total number of characters of the information to be encrypted,k is a preset character number, and is a positive integer set;
if it isSupplementing space bits at the end of the information to be encrypted to make the total number of characters of the supplemented information to be encrypted equal to +.>And equally dividing the supplemented information to be encrypted into +.>Each information fragment to be encrypted is respectively used as an element of the information storage matrix to obtain the information storage matrix;
if it isThe front +.>Average division of individual characters into->The information fragment to be encrypted is the first +. >And taking the L-th character as the last information fragment to be encrypted, and taking each information fragment to be encrypted as an element of the information storage matrix respectively to obtain the information storage matrix.
3. The plaintext hybrid computing storage and transmission method according to claim 1, wherein the encryption mapping function is a monotonically increasing function;
wherein obtaining a first mapping code of the target element according to the character contained in the target element, the encryption mapping function, and the first position information of the target element in the information storage matrix, includes:
acquiring ASCII codes of all characters of the target element;
according to the formula
Obtaining the first position information asFirst mapping code corresponding to the x-th character in the target element of (2)>Wherein->For the preset operation function, ++>For the encryption mapping function, < >>ASCII code for the x-th character in the target element;
according to the first position information isFirst mapping codes corresponding to the characters in the target element of (2) to obtain a first position information of +.>Is a first mapping code of a target element of (a).
4. The method according to claim 1, wherein obtaining the second mapping code of the non-target element according to the non-target element in the information storage matrix, which is not selected, and the encryption mapping function, comprises:
Acquiring ASCII codes of all characters of the non-target elements;
according to the formula
Obtaining position information asSecond mapping code corresponding to the y-th character in the non-target element of (2)>Wherein->For the encryption mapping function, < >>ASCII code that is the y-th character in the non-target element;
according to the position informationSecond mapping codes corresponding to each character in non-target elements of the number, and obtaining position information asIs not a second mapped code of the target element.
5. The plaintext and ciphertext hybrid computing storage and transmission method of claim 2, the method further comprising:
transmitting the encrypted file, the file password, the ciphertext locating matrix, the first mapping code and the encrypted mapping function to a decryption party through different transmission paths respectively;
the decryption party decrypts the encrypted file through the file password to obtain a plaintext and ciphertext mixing matrix;
the decryption party decrypts the plaintext and ciphertext mixing matrix through the ciphertext locating matrix, the first mapping code and the encryption mapping function to obtain an information storage matrix;
and obtaining decryption information according to the information storage matrix.
6. The method for mixed computing, storing and transmitting plaintext according to claim 5, wherein the ciphertext locating matrix has the same number of elements as the information storing matrix, and the element at the position corresponding to the first position information in the ciphertext locating matrix is 1, and the elements at other positions are 0;
The decryption party decrypts the plaintext and ciphertext mixing matrix through the ciphertext locating matrix, the first mapping code and the encryption mapping function to obtain an information storage matrix, and the decryption party comprises the following steps:
determining first position information of ciphertext elements in the plaintext-ciphertext mixing matrix according to the ciphertext locating matrix;
matching the first mapping code with the first position information according to the first position information, the first mapping code, the encryption mapping function and the preset character number to obtain a matching result;
according to the matching result, the first position information, the first mapping code, the encryption mapping function and the preset character number, decrypting the ciphertext element to obtain a target element;
obtaining non-target elements according to the second mapping code and the encryption mapping function in the plaintext and ciphertext mixing matrix;
and obtaining the information storage matrix according to the target element and the non-target element.
7. The plaintext hybrid computing storage and transmission method according to claim 6, wherein matching the first mapping code and the first position information according to the first position information, the first mapping code, the encryption mapping function, and the preset number of characters, to obtain a matching result, comprises:
According to the formula
Obtaining the minimum data bit error corresponding to the z first mapping codeWherein->For the mth first position information, M is the number of target elements, +.>For the preset operation function, ++>Is an inverse function of the preset operation function, +.>For the encryption mapping function, < >>As an inverse of the encryption mapping function, +.>In order to find the mapping function of the characters corresponding to ASCII codes, k is the preset number of characters, len is the statistical function for counting the length of the character string, < >>An xth data bit of a zth first mapping code;
to minimize data bit errorCorresponding first position information is determined to be the first position information matched with the z first mapping code;
and obtaining the matching result according to the first position information matched with each first mapping code.
8. A plaintext and ciphertext hybrid computing storage and transmission system, comprising:
the information storage matrix module is used for converting the information to be encrypted into an information storage matrix, wherein the information storage matrix is an n multiplied by n square matrix, and elements in the information storage matrix are part of information in the information to be encrypted;
a target element module for selecting a target element of the information storage matrix;
the ciphertext locating matrix module is used for determining a ciphertext locating matrix according to the first position information of the target element in the information storage matrix;
The encryption mapping function module is used for setting an encryption mapping function according to the proportion of the number of the target elements to the total number of elements in the information storage matrix;
the first mapping code module is used for obtaining a first mapping code of the target element according to the characters contained in the target element, the encryption mapping function and the first position information of the target element in the information storage matrix;
the second mapping code module is used for obtaining a second mapping code of the non-target element according to the non-target element which is not selected in the information storage matrix and the encryption mapping function;
the ciphertext element module is used for randomly generating numbers to replace target elements and serve as ciphertext elements;
the plaintext element module is used for replacing non-target elements by using the second mapping code to serve as plaintext elements;
the plaintext and ciphertext mixing matrix module is used for obtaining a plaintext and ciphertext mixing matrix according to the ciphertext elements and the plaintext elements;
the encryption module is used for obtaining a file password according to the first mapping code and the second mapping code, and encrypting the plaintext and ciphertext mixing matrix through the file password to obtain an encrypted file;
And the storage module is used for respectively storing the encrypted file, the file password, the ciphertext locating matrix, the first mapping code and the encryption mapping function in different storage addresses.
9. A plaintext and ciphertext hybrid computing storage and transmission device, comprising: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to invoke the instructions stored in the memory to perform the method of any of claims 1-7.
10. A computer readable storage medium, having stored thereon computer program instructions which, when executed by a processor, implement the method of any of claims 1-7.
CN202410037382.9A 2024-01-10 2024-01-10 Mixed computing storage and transmission method and system for plaintext and ciphertext Active CN117544309B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410037382.9A CN117544309B (en) 2024-01-10 2024-01-10 Mixed computing storage and transmission method and system for plaintext and ciphertext

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410037382.9A CN117544309B (en) 2024-01-10 2024-01-10 Mixed computing storage and transmission method and system for plaintext and ciphertext

Publications (2)

Publication Number Publication Date
CN117544309A CN117544309A (en) 2024-02-09
CN117544309B true CN117544309B (en) 2024-03-22

Family

ID=89796300

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410037382.9A Active CN117544309B (en) 2024-01-10 2024-01-10 Mixed computing storage and transmission method and system for plaintext and ciphertext

Country Status (1)

Country Link
CN (1) CN117544309B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002076014A1 (en) * 1999-12-03 2002-09-26 Purdue Research Foundation, Inc. Method and system for secure computational outsourcing and disguise
CN104486315A (en) * 2014-12-08 2015-04-01 北京航空航天大学 Revocable key external package decryption method based on content attributes
CN114826580A (en) * 2022-04-24 2022-07-29 杭州博盾习言科技有限公司 Privacy set intersection method, device and storage medium based on multi-party security calculation
CN115102685A (en) * 2022-06-21 2022-09-23 西安现代控制技术研究所 Physical layer information encryption method based on infinite dimension hyperchaos
CN116010984A (en) * 2022-12-30 2023-04-25 深圳市广通软件有限公司 Multiple encryption storage method, device and equipment for relational database data
CN116094716A (en) * 2022-12-14 2023-05-09 兰州理工大学 Text encryption and decryption method, system and equipment based on elliptic curve cryptography
CN116192396A (en) * 2022-12-05 2023-05-30 航天信息股份有限公司 Signature rapid generation method and device, electronic equipment and computer storage medium
CN116389137A (en) * 2023-04-18 2023-07-04 深圳市简爱零陆科技有限公司 Data encryption method and system based on network information security
CN116865950A (en) * 2023-09-05 2023-10-10 北京安图生物工程有限公司 Detection kit quality inspection data safety storage system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030210783A1 (en) * 2000-07-27 2003-11-13 Ross Filippi Method and system of encryption

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002076014A1 (en) * 1999-12-03 2002-09-26 Purdue Research Foundation, Inc. Method and system for secure computational outsourcing and disguise
CN104486315A (en) * 2014-12-08 2015-04-01 北京航空航天大学 Revocable key external package decryption method based on content attributes
CN114826580A (en) * 2022-04-24 2022-07-29 杭州博盾习言科技有限公司 Privacy set intersection method, device and storage medium based on multi-party security calculation
CN115102685A (en) * 2022-06-21 2022-09-23 西安现代控制技术研究所 Physical layer information encryption method based on infinite dimension hyperchaos
CN116192396A (en) * 2022-12-05 2023-05-30 航天信息股份有限公司 Signature rapid generation method and device, electronic equipment and computer storage medium
CN116094716A (en) * 2022-12-14 2023-05-09 兰州理工大学 Text encryption and decryption method, system and equipment based on elliptic curve cryptography
CN116010984A (en) * 2022-12-30 2023-04-25 深圳市广通软件有限公司 Multiple encryption storage method, device and equipment for relational database data
CN116389137A (en) * 2023-04-18 2023-07-04 深圳市简爱零陆科技有限公司 Data encryption method and system based on network information security
CN116865950A (en) * 2023-09-05 2023-10-10 北京安图生物工程有限公司 Detection kit quality inspection data safety storage system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
鲁棒性数字图像水印技术研究;罗雪萍;《中国优秀博硕士学位论文全文数据库 (硕士)·信息科技辑》;20060915(第09期);全文 *

Also Published As

Publication number Publication date
CN117544309A (en) 2024-02-09

Similar Documents

Publication Publication Date Title
US5365589A (en) Method and apparatus for encryption, decryption and authentication using dynamical systems
US6490353B1 (en) Data encrypting and decrypting apparatus and method
US7899190B2 (en) Security countermeasures for power analysis attacks
US20090041236A1 (en) Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups
CN110299987B (en) Mega-rich-root problem solving method based on homomorphic encryption
Thangavel et al. Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud
JP2011164607A (en) Method and system for privacy-preserving computation of edit distance of symbol sequence
EP2742644B1 (en) Encryption and decryption method
CN115276947B (en) Private data processing method, device, system and storage medium
JP2004512570A (en) Method and apparatus using an insecure cryptographic accelerator
US6111952A (en) Asymmetrical cryptographic communication method and portable object therefore
CN114172651B (en) SM9 public key encryption algorithm and decryption algorithm GPU acceleration implementation method
CN117544309B (en) Mixed computing storage and transmission method and system for plaintext and ciphertext
JP4758110B2 (en) Communication system, encryption apparatus, key generation apparatus, key generation method, restoration apparatus, communication method, encryption method, encryption restoration method
CN114465708B (en) Privacy data processing method, device, system, electronic equipment and storage medium
WO2001091368A2 (en) Encryption system based on crossed inverse quasigroups
CN115529120A (en) Secret computing system
JP4598269B2 (en) Fast finite field operations on elliptic curves
Al-Attab et al. Lightweight effective encryption algorithm for securing data in cloud computing
CN115378588B (en) Method, apparatus and storage medium for inadvertent transmission
Sekhar et al. Data Encryption technique using Random number generator
CN116488810B (en) Identity authentication method, identity authentication system, and readable storage medium
Gorbenko et al. Algorithms of asymmetric encryption and encapsulation of keys of post-quantum period of 5-7 stability stability levels and their applications
CN116455575B (en) Key generation, encryption and decryption methods, electronic equipment and storage medium
EP4280530A1 (en) Secure provision of keys for fully homomorphic encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant