CN112685760A - Financial data privacy processing and sharing method capable of authorizing on block chain - Google Patents

Financial data privacy processing and sharing method capable of authorizing on block chain Download PDF

Info

Publication number
CN112685760A
CN112685760A CN202110023432.4A CN202110023432A CN112685760A CN 112685760 A CN112685760 A CN 112685760A CN 202110023432 A CN202110023432 A CN 202110023432A CN 112685760 A CN112685760 A CN 112685760A
Authority
CN
China
Prior art keywords
data
sharing
financial
homomorphic
authorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110023432.4A
Other languages
Chinese (zh)
Inventor
魏本强
刘洋
程撰
程小永
林大亮
王睿达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Taike Digital Information Technology Co ltd
Original Assignee
Zhejiang Taike Digital Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Taike Digital Information Technology Co ltd filed Critical Zhejiang Taike Digital Information Technology Co ltd
Priority to CN202110023432.4A priority Critical patent/CN112685760A/en
Publication of CN112685760A publication Critical patent/CN112685760A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a financial data privacy processing and sharing method capable of authorizing on a block chain, which comprises the steps of combining a national secret SM4 algorithm and BGV-based homomorphic encryption to realize financial data privacy processing and multi-party or multi-stage sharing on a alliance chain, enabling financial institutions to share multi-party or multi-stage data on the alliance chain, enabling a data owner to carry out encryption protection on written data by using the national secret SM4 algorithm, then chaining and packaging, and enabling only authorized financial institutions to decrypt the data when ciphertext data need to be shared and authorized to other cooperators or application parties. According to the invention, the encrypted ciphertext of the authorizing party SM4 is converted into the new ciphertext of the data applying party under the full homomorphic encryption, so that the BaaS can be used for ensuring the safe processing and sharing of financial data, and simultaneously, the multi-stage sharing of the data is supported.

Description

Financial data privacy processing and sharing method capable of authorizing on block chain
Technical Field
The invention relates to the technical field of cryptography and blockchain, in particular to a financial data privacy processing and sharing method capable of authorizing on a blockchain.
Background
The 21 st century is an era of data processing and sharing, data being the most valuable asset, but the value of data is in the interconnection. The competition and marketing council CMA2016 of the british government began to dominate the Open Banking program and began to be implemented gradually in the great britain bank in 2018. The european union 2016, by the PSD2 directive, stipulates that european banks must open payment services and related customer data to third party facilitators from 2018, 1 month 13. 2017, 10 and 18, the U.S. customer financial protection agency (CFPB) issued a customer-authorized principle of financial data sharing and integration, since which was a constantly trending financial topic. Many companies (including "FinTech" companies, banks and other financial institutions) are authorized by consumers to access account data located in separate organizations to provide various products and services. The core idea is as follows: through financial data sharing, traditional banks and financial technology companies are promoted to cooperate and compete deeply, and finally the benefit of users is maximized. In China, in view of the interest relationship among banks, financial institutions and financial science and technology, financial data sharing seems to be a remote topic, but the rise of the internet finance and credit investigation industry, the continuous enhancement of financial supervision and the improvement of personal information protection laws and regulations make it possible to realize the financial data sharing under correct supervision. While consumer-authorized data sharing is expected to provide great benefit to consumers and the financial industry, with the continued development of these technologies, there are security and privacy challenges that need to be considered.
Open Banking services promises to introduce global financial technology competition into the next half. The sharing of the financial data behind them is more than enough to initiate a big revolution in the financial industry. However, financial data sharing, like medical data sharing, faces security and privacy protection issues. The value of financial data is not just shared, but rather the real value behind it that is hidden after processing.
A federation chain is a block chain structure between private and public chains that is commonly maintained by a business community or business federation. Joining a federation chain requires a certain authentication mechanism and strict business specifications, business terms. For example, a plurality of banks form a community (somewhat like a union of banks), each bank acting as a node in the federation chain, collectively recording various transactions in the bank system. Compared with the public link, the alliance link has the characteristics of strong controllability (data can be tampered when most nodes achieve consensus), no external disclosure of data, high transaction speed and the like. Thus, the federation chain is "partially decentralized," allowing only the internal members to read data. The alliance chain solution can be used as an extension of a block chain in the cloud computing industry and belongs to the service category of cloud computing. In real life, almost all industries are federation industries of multiple enterprises, and a federation chain can solve their data sharing problem. Cloud vendors may provide underlying computing services and management services for blockchain platforms to help these enterprises.
From the aspect of security, the security in cloud computing mainly ensures that the operation can be safely, stably and reliably operated. This security falls under the traditional security category. And the block chain ensures that each data block is not tampered, and the recorded content of the data block is not read by a user without a private key. The block chain is tightly combined with cloud computing, BaaS (block chain as a service) is invented on the basis of IaaS, PaaS and SaaS, the BaaS is originally proposed by Microsoft and IBM, namely a block chain frame is embedded into a cloud computing platform, and a block chain ecological environment and ecological matching service which are convenient and high in performance are provided for developers by using the deployment and management advantages of cloud service infrastructure, so that a block chain open platform supporting business expansion and operation support of the developers is provided. Compared with a common node and a trading exchange node, the BaaS node mainly has the following purposes: the development environment required by the user is quickly established, and a series of operation services such as search query, transaction submission, data analysis and the like based on the block chain are provided. An internet company represented by BAT in China already builds such a basic service platform, and 7 months and 21 days in 2017, Baidu finance launches a blockchain open platform BaaS, which is a business-level blockchain cloud computing platform and mainly helps enterprises to construct own blockchain network platforms. Tencent also promotes a block chain basic service platform BaaS, and provides an integral one-stop service by combining the capabilities of Tencent financial science and technology in the aspects of big data, credit investigation, AI, identity authentication, third party payment and the like, so that enterprises can be more quickly applied when accessing the block chain. BaaS is promoted to become public trust root equipment, and a combined development trend of embedding a block chain skill structure into a cloud computing channel is formed. The block chain enterprise channel represented by the alliance chain needs to use cloud equipment to improve the ecological environment of the block chain. Bass, while serving as a common platform for big data storage and powerful computing power, security issues arising from storing critical data in the cloud remain a potential threat.
The SM4(SMS4) algorithm is a block cipher algorithm independently researched and designed in China, and is an encryption algorithm used in the WAPI wireless network standard. The SM4 algorithm is a block cipher with a block length of 128 bits and a key length of 128 bits, and both the encryption algorithm and the key generation algorithm adopt 32-round nonlinear iterative structures. The decryption process of the SM4 algorithm is the same as the encryption process except that the order of use of the round keys is reversed.
The holomorphic encryption (FHE) can allow arbitrary operations on ciphertexts without mastering private keys, and is considered as a 'holy cup' in cryptography, namely, for a function f and a plaintext m, f (Enc (m)) Enc (f (m)) is satisfied, because of the good property, the holomorphic encryption can realize authorization calculation and reduce communication traffic.2012 Brakerski et al proposes a BGV homomorphic scheme, the security of which is established on RLWE, the homomorphic encryption scheme reduces the problem of cipher text dimension expansion and cipher text noise expansion by using a key switching technology, constructs a hierarchical holomorphic encryption scheme without using Bootstrapping, discloses a function library hellib for realizing a BGV scheme by Halevi et al in 2013, the hellib is a homomorphic encryption function library written by using C + +, focuses on a ciphertext encapsulation technology and a GHS optimization algorithm, and issues a new version of the hey encryption library in 2013, through heavy linearization, the efficiency is improved by 15-75 times.
Disclosure of Invention
In view of the above technical problems in the related art, the present invention provides a method for privacy processing and sharing authorized financial data on a block chain, which can overcome the above disadvantages of the prior art.
In order to achieve the technical purpose, the technical scheme of the invention is realized as follows:
a method for processing financial data privacy authorized on a block chain comprises the steps that each financial institution joins a alliance chain according to an admission criterion of the alliance chain, and obtains a private key or a public and private key pair from a key distribution center; the financial institution A (a data owner) encrypts data m into c-SM 4(m) by using a national secret SM4 algorithm, and packages the data to be linked; the financial institution B (data applicant) makes an application whether the financial institution A is willing to share the data on the chain; if the financial institution A agrees to share, the financial institution B is authorized to encrypt a private key SM4_ sk, namely Enc, of the financial institution B by using a public key HE _ pk of the financial institution BHE_pk(SM4_ sk) then pack the uplink; BaaS homomorphic calculation SM4 encryption, wherein a plaintext is divided into four homomorphic ciphertexts to be represented, and a round key is represented by using 32 homomorphic ciphertexts; and the financial institution B acquires the new ciphertext of the m and decrypts by using the key HE _ sk of the financial institution B to acquire homomorphic ciphertext data m.
Financial institution A obtains its own SM4 private key SM4_ sk from the key distribution center, and financial institution B and so on obtain its own homomorphic encryption public and private key pair (HE _ pk, HE _ sk) from the key distribution center.
In the BaaS homomorphic calculation SM4 encryption process, firstly, BGV homomorphic addition is used for realizing the XOR of four 32-bit bits in a ciphertext.
In the process of BaaS homomorphic calculation SM4 encryption, the S-box algebraic structure of SM4 is F2By affine transformation plus a finite field
Figure BDA0002889388330000041
The same affine transformation is added to the inverse transformation of (1).
In the process of BaaS homomorphic calculation SM4 encryption, linear transformation is carried out, BGV homomorphic encryption only supports rotary displacement between plain text slots and does not support internal displacement of the slots, so that B < 2 > is firstly achieved by linear transformation, then B < 2 > is achieved by rotation, B < 18 > (B < 24 can be directly obtained by rotating an original ciphertext).
The invention has the beneficial effects that: by converting the encrypted ciphertext of the authorizer SM4 into a new ciphertext of the data applicant under the fully homomorphic encryption, the secure processing and sharing of financial data can be guaranteed by using BaaS (block chaining as a service), and meanwhile, the multi-stage sharing of data is supported.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a flowchart illustrating a method for privacy processing and sharing authorized financial data on a block chain according to an embodiment of the present invention.
Fig. 2 is a schematic flowchart of the cryptographic SM4 encryption algorithm of the method for privacy processing and sharing of financial data authorized on a block chain according to the embodiment of the present invention.
Fig. 3 is a schematic diagram of shifting left 2 bits of a homomorphic ciphertext of a method for privacy processing and sharing of financial data authorized on a block chain according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present invention.
As shown in fig. 1-2, according to the authorized privacy processing and sharing algorithm for financial data on a blockchain according to the present invention, first, each financial institution joins the alliance chain according to the admission criteria of the alliance chain, and each financial institution in the alliance chain uses the storage and computation capability of the alliance chain to store, process and share data without revealing the data to an unauthorized institution. Financial institution A preferably obtains own SM4 private key SM4_ sk from a key distribution center (KGC), and the financial institution A obtains own homomorphic encryption public and private key pair (HE _ pk, HE _ sk) from the key distribution center (KGC).
The financial institution A encrypts the data m into c-SM 4(m) by using the SM4 algorithm, and then packs the uplink.
When the encrypted data needs to be shared and authorized to other partners, only the authorized financial institution B user can decrypt the data. The financial institution B can authorize the financial institution C user or other users for two or more times, and the financial institution C user or other users can decrypt the data after obtaining authorization. The method comprises the following specific steps:
financial data is shared among multiple parties. The method comprises the steps of firstly converting an original ciphertext into a new ciphertext which can be decrypted under a new private key, so that the ciphertext state of data m stored in the BaaS can be guaranteed all the time, the data can be shared secretly to an authorized financial institution B, and finally, a party B can obtain shared data by decrypting the ciphertext through the private key of the party B. Secondly, multiparty sharing can be achieved, the BaaS always stores the encrypted ciphertext of SM4, each time an applicant applies for shared data, only the homomorphic public key of the applicant needs to be issued, and then the authorizer and the BaaS process the ciphertext according to the applied public key.
And sharing the financial data after processing the ciphertext. The new ciphertext is a homomorphic ciphertext. The fully homomorphic encryption allows arbitrary operation to be performed on the ciphertext without decryption, so that an applicant can homomorphically process and analyze data on the financial data m by using BaaS.
And (4) multi-level sharing of financial data. And after decrypting the data, the financial institution B applies for a new SM4 encryption key to the KGC again, uploads the SM4 encrypted ciphertext, and when the financial institution applies for sharing the data, the frame of FIG. 1 is used for realizing data processing and sharing.
And the financial institution B of the member in the alliance chain applies for the financial institution A.
If financial institution A agrees to share data on the chain, then party B's public key HE _ pk will be encrypted with its own private key SM4_ sk, EncHE_pk(SM4_ sk) then uplink.
The BaaS homomorphic calculation SM4 decryption idea is as follows:
DecsM4_sk(EncHE_pk(EncsM4_sk(m,rk));EncHE_pk(rk))=EncHE_pk(m)
the encryption process of the homomorphic calculation SM4 is to divide a plaintext into four homomorphic ciphertext identifications, 32 rounds of keys use 32 homomorphic ciphertext identifications, and the calculation process is as follows:
(1)Xi+1+Xi+2+Xi+3+rk[i]utilizing homomorphic addition of BGV to realize the XOR of 32 bits in the four ciphertexts;
(2) the S-box algebraic structure of SM4 is F2By affine transformation plus a finite field
Figure BDA0002889388330000061
The same affine transformation is added to the inverse transformation of (1). Wherein F2Affine transformation can be converted into
Figure BDA0002889388330000062
Whereas the inversion of finite fields can be converted into multiplications, i.e. x-1=x254Finding x2543 Frobenius self-isomorphs and 3 multiplications can be used.
Namely:
c2=c>>2
c3=c*c2
c12=c3>>4
c14=c12*c2
c15=c12*c3
c240=c15>>16
c254=c240*c14
(3) linear transformation: b + B < 2+ B < 10+ B < 18+ B < 24.
As shown in fig. 3, BGV homomorphic encryption only supports rotation shift between plaintext slots and does not support shift inside slots, but as long as B < 2 is achieved, we can do B < 10, B < 18 (8 bits per slot), which is simply obtained by linear transformation and rotation supported by BGV homomorphic encryption.
And the financial institution A decrypts the homomorphic ciphertext, decrypts the acquired new ciphertext of the m by using the key HE _ sk of the financial institution A to acquire the data m.
Wherein the computing resources and time consumed by the first financial institution encryption and the second financial institution decryption are fully acceptable to any party with limited computing power.
The safety of the method is that the data uploaded by the first party of the financial institution is ensured by the safety of the SM4 algorithm; the cloud end utilizes the strong computing power of the cloud end to decrypt the homomorphic SM4, and the safety of the BGV homomorphic scheme is established in RLWE; the private key of the financial institution A exists in the form of homomorphic cryptograph on the cloud.
In summary, according to the technical solution of the present invention, by converting the ciphertext encrypted by the authority SM4 into a new ciphertext encrypted by the applicant under the fully homomorphic encryption, the secure processing and sharing of financial data can be ensured by using BaaS (block chaining as a service), and multi-level sharing of data is supported.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (7)

1. A method for privacy handling and sharing of financial data authorized on a blockchain, comprising the steps of:
s1, each financial institution adds into the alliance chain according to the admittance criterion of the alliance chain, and obtains the private key or the public and private key pair from the key distribution center;
s2, the data owner encrypts the data m into c-SM 4(m) by using the SM4 cryptographic algorithm, and packs the data to be uplink;
s3, after completing the packaging and chaining, the data application side puts forward an application whether the data owner is willing to share the data on the chain;
s4 if the data owner agrees to share, it authorizes the data applicant who uses the public key HE _ pk to encrypt its own private key SM4_ sk, namely EncHE_pk(SM4_ sk) then packs the uplink.
2. The method of private processing and sharing of financial data authorized on a blockchain of claim 1, wherein the data owner obtains its own SM4 private key SM4_ sk from the key distribution center, and the data applicant obtains its own homomorphic cryptographic public-private key pair from the key distribution center.
3. The method for privacy processing and sharing of financial data authorized on a blockchain according to claim 1, wherein the private encryption key of the data application party is encrypted by BaaS homomorphic computation SM4, a plaintext is divided into four homomorphic ciphertexts to represent the four homomorphic ciphertexts, and the core computation process of each round of 32 rounds of keys using 32 homomorphic ciphertexts is Xi+1+Xi+2+Xi+3+rk[i]。
4. The method of claim 3, wherein during each round of computation, the exclusive OR of 32-bit bits in four ciphertexts is first implemented by using BGV homomorphic addition.
5. The method for privacy handling and sharing of financial data authorized on a blockchain of claim 3, wherein the method includes the step of providing privacy information to the financial data authorized on the blockchainIn each round of computation, the S-box algebraic structure of SM4 is F2By affine transformation plus a finite field
Figure FDA0002889388320000011
The same affine transformation is added to the inverse transformation of (1).
6. A method of authorized privacy handling and sharing of financial data in block chains as claimed in claim 3 wherein each round of computation is performed with linear transformations, BGV homomorphic encryption only supports rotational shifts between plaintext slots and not intra-slot shifts, so that first B < 2 is done with linear transformations and then B < 10, B < 18 is done with rotations.
7. The method for privacy processing and sharing of financial data authorized on a block chain according to claim 3, wherein in each round of calculation, a data application party obtains a new ciphertext of m and decrypts by using its own key HE _ sk to obtain plaintext data m.
CN202110023432.4A 2021-01-08 2021-01-08 Financial data privacy processing and sharing method capable of authorizing on block chain Pending CN112685760A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110023432.4A CN112685760A (en) 2021-01-08 2021-01-08 Financial data privacy processing and sharing method capable of authorizing on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110023432.4A CN112685760A (en) 2021-01-08 2021-01-08 Financial data privacy processing and sharing method capable of authorizing on block chain

Publications (1)

Publication Number Publication Date
CN112685760A true CN112685760A (en) 2021-04-20

Family

ID=75456501

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110023432.4A Pending CN112685760A (en) 2021-01-08 2021-01-08 Financial data privacy processing and sharing method capable of authorizing on block chain

Country Status (1)

Country Link
CN (1) CN112685760A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127917A (en) * 2021-06-17 2021-07-16 四川新龟科技有限公司 Privacy protection method for block chain data under supply chain financial system
CN113313488A (en) * 2021-05-26 2021-08-27 北京航空航天大学 Data privacy protection method based on block chain and homomorphic encryption
CN113542220A (en) * 2021-06-09 2021-10-22 浙江泰科数联信息技术有限公司 Data security sharing method based on block chain
CN114124499A (en) * 2021-11-15 2022-03-01 中国科学院沈阳计算技术研究所有限公司 Block chain-based charitable system privacy protection method and system
CN115203728A (en) * 2022-09-14 2022-10-18 南京紫米网络科技有限公司 Financial data safety storage system and method based on alliance block chain and big data
CN117349900A (en) * 2023-09-27 2024-01-05 南京财经大学 Intelligent prediction system and prediction method based on data mining

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105490806A (en) * 2015-11-28 2016-04-13 中国电子科技集团公司第三十研究所 Homomorphic key generating-sharing method and device
WO2018091084A1 (en) * 2016-11-16 2018-05-24 Huawei Technologies Co., Ltd. Homomorphic based method and system for securely aggregating data
CN108809652A (en) * 2018-05-21 2018-11-13 安徽航天信息有限公司 A kind of block chain encryption account book based on privacy sharing
CN109214201A (en) * 2018-08-31 2019-01-15 平安科技(深圳)有限公司 A kind of data sharing method, terminal device and computer readable storage medium
CN109933603A (en) * 2019-03-15 2019-06-25 中国科学技术大学 The data query method that protection data-privacy and the result for inquiring privacy can verify that
CN110891066A (en) * 2019-12-03 2020-03-17 重庆交通大学 Proxy anonymous communication method based on homomorphic encryption scheme
US20200344049A1 (en) * 2017-12-28 2020-10-29 Mitsubishi Electric Corporation Conversion key generation device, ciphertext conversion device, privacy-preserving information processing system, conversion key generation method, ciphertext conversion method, and computer

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105490806A (en) * 2015-11-28 2016-04-13 中国电子科技集团公司第三十研究所 Homomorphic key generating-sharing method and device
WO2018091084A1 (en) * 2016-11-16 2018-05-24 Huawei Technologies Co., Ltd. Homomorphic based method and system for securely aggregating data
US20200344049A1 (en) * 2017-12-28 2020-10-29 Mitsubishi Electric Corporation Conversion key generation device, ciphertext conversion device, privacy-preserving information processing system, conversion key generation method, ciphertext conversion method, and computer
CN108809652A (en) * 2018-05-21 2018-11-13 安徽航天信息有限公司 A kind of block chain encryption account book based on privacy sharing
CN109214201A (en) * 2018-08-31 2019-01-15 平安科技(深圳)有限公司 A kind of data sharing method, terminal device and computer readable storage medium
CN109933603A (en) * 2019-03-15 2019-06-25 中国科学技术大学 The data query method that protection data-privacy and the result for inquiring privacy can verify that
CN110891066A (en) * 2019-12-03 2020-03-17 重庆交通大学 Proxy anonymous communication method based on homomorphic encryption scheme

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113313488A (en) * 2021-05-26 2021-08-27 北京航空航天大学 Data privacy protection method based on block chain and homomorphic encryption
CN113542220A (en) * 2021-06-09 2021-10-22 浙江泰科数联信息技术有限公司 Data security sharing method based on block chain
CN113127917A (en) * 2021-06-17 2021-07-16 四川新龟科技有限公司 Privacy protection method for block chain data under supply chain financial system
CN114124499A (en) * 2021-11-15 2022-03-01 中国科学院沈阳计算技术研究所有限公司 Block chain-based charitable system privacy protection method and system
CN114124499B (en) * 2021-11-15 2023-08-29 中国科学院沈阳计算技术研究所有限公司 Charity system privacy protection method and system based on blockchain
CN115203728A (en) * 2022-09-14 2022-10-18 南京紫米网络科技有限公司 Financial data safety storage system and method based on alliance block chain and big data
CN117349900A (en) * 2023-09-27 2024-01-05 南京财经大学 Intelligent prediction system and prediction method based on data mining
CN117349900B (en) * 2023-09-27 2024-04-05 南京财经大学 Intelligent prediction system and prediction method based on data mining

Similar Documents

Publication Publication Date Title
US20240250808A1 (en) Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
CN112685760A (en) Financial data privacy processing and sharing method capable of authorizing on block chain
US6125185A (en) System and method for encryption key generation
CN101789934B (en) Method and system for online security trading
Song et al. Efficient Attribute‐Based Encryption with Privacy‐Preserving Key Generation and Its Application in Industrial Cloud
US7499551B1 (en) Public key infrastructure utilizing master key encryption
CN109729041A (en) A kind of publication of encrypted content and acquisition methods and device
CN108347404A (en) A kind of identity identifying method and device
CN110599163A (en) Transaction record outsourcing method facing block chain transaction supervision
CN110390212A (en) Based on the supply of material monitoring method of block chain, node apparatus
Job et al. A modified secure version of the Telegram protocol (MTProto)
WO2020146605A1 (en) Method, system, and computer program product for network bound proxy re-encryption and pin translation
CN113225302A (en) Data sharing system and method based on proxy re-encryption
CN116668072A (en) Data security sharing method and system based on multi-authority attribute base encryption
Olumide et al. A hybrid encryption model for secure cloud computing
CN113159745B (en) Block chain transaction privacy protection method based on full homomorphism
Saranya et al. A survey on mobile payment request verification over cloud using key distribution
Tyagi et al. Analysis and Implementation of AES and RSA for cloud
Chakraborti et al. On the optimality of non-linear computations for symmetric key primitives
Moldovyan et al. Deniability of symmetric encryption based on computational indistinguishability from probabilistic ciphering
CN110162989A (en) Polymorphic type file encryption based on CBC mode is shared and access control method
Blaise et al. An Understanding and Perspectives of End-To-End Encryption
CN117648706B (en) Access control method based on block chain and attribute encryption
CN115550058B (en) Shared file transparent encryption method and system
Prabahar et al. CCSC—DHKEP: Data Confidentiality Using Improved Security Approaches in Cloud Environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination