Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

97results about How to "Improve decryption efficiency" patented technology

Access control system and method supporting cross-domain data sharing and wireless communication system

The invention belongs to the technical field of wireless communication networks, and discloses an access control system and method supporting cross-domain data sharing, and a wireless communication system. Users needing to share data in a domain A select elliptic curve parameters to generate ECC key pairs; a global authentication center CA of the domain B generates a global public parameter; the proxy node in the domain B encrypts the system public key and the attribute set by using the ECC public key of the domain A user; the domain A user decrypts the data from the domain B by using the ECCprivate key of the domain A user and uploads the data to the public cloud; the legal user sends a file access request to the public cloud; and when user revocation occurs, the proxy server searches acorresponding attribute private key list according to the global identifier of the user and deletes the attribute private key list. The method is high in safety under the condition of the same secretkey length. The method gives full play to the characteristic of strong computing power of agent nodes, completes the preprocessing of some data, helps a user to carry out partial decryption, and improves the decryption efficiency of the user.
Owner:XIDIAN UNIV

Method and system for remote bid opening and bid evaluation

The invention relates to data safety technology, and particularly discloses a method and a system for remote bid opening and bid evaluation. The method includes the steps: uploading bidding documents, primarily encrypting the bidding documents and secondarily encrypting a primary encryption key; receiving and decrypting the bidding documents in an online manner, decrypting the primary encryption key by acquiring a secondary primary encryption key, and then decrypting the bidding documents by the aid of the primary encryption key; verifying validity of the bidding documents and generating a bid opening list when bid opening time comes; distributing bid inviting documents, the bidding documents and bid opening process documents; and performing evaluation according to preset evaluation standards to obtain bid evaluation results. The system comprises a bidding service subsystem, a bid opening service subsystem and a bid evaluation service subsystem, wherein the bid opening service subsystem is capable of decrypting the secondarily encrypted bidding documents in the online manner and providing the corresponding bid inviting documents, the bidding documents and the bid opening process documents to the bid evaluation service subsystem for evaluation. By the aid of the method and the system, safety of the bidding documents is facilitated, and decrypting efficiency is improved.
Owner:SICHUAN CONSTR NETWORK

BGN type cryptograph decryption outsourcing scheme based on attributes

The invention particularly relates to a BGN type cryptograph decryption outsourcing scheme based on attributes. The scheme comprises steps that (1), a system parameter is set, and an encryption secret key is generated; (2), an access structure is selected by a sending side, message encryption is carried out, and cryptograph is generated; (3), a main secret key and the attributes are inputted by a receiving side, and a conversion secret key and a private secret key are outputted; (4), the cryptograph is sent by the sending side to a cloud end; (5), the conversion secret key is sent to the cloud end by the receiving side; (6), the cryptograph is converted by the cloud end through utilizing the conversion secret key to acquire a part of the cryptograph which is sent to the receiving side; and (7), the private secret key is utilized by the receiving side to decrypt the part of the cryptograph to acquire a message, and homomorphic computation operation for the cryptograph carried out by the cloud end is further comprised between the step (4) and the step (5). The scheme is advantaged in that not only can system decryption efficiency be improved, but also storage cost of a receiver is reduced; according to the cryptograph acquired according to the encryption method, a server is permitted to carry out multiple addition homomorphic operation and multiplication homomorphic operation for cryptograph data, on the condition that decryption difficulty does not increase, CPA safety of the user information is substantially improved.
Owner:ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE

An intelligent management method and a system for a construction project concrete standard culture homoculture test block

The invention relates to an intelligent management method and a system for a construction project concrete standard curing homoculture test block. The method comprises the following steps: S1, two attributes of a magnetic body being determined as two numbers representing binary; 2, arranging a plurality of magnetic bodies accord to a preset digital arrangement rule to form encrypted information; S3, embedding the encrypted information into the concrete test block corresponding to the encoded lattice to obtain the encrypted concrete test block; S4, when the encrypted concrete test block is sentfor inspection, identifying information obtained by identifying the magnetic body in the encrypted concrete test block, generating a binary encoded lattice according to the identifying information, and determining the binary encoded lattice as decryption information; 5, checking whether that decrypt information matches the encrypted information. Through the management method, the replacement of standard curing by the construction side and the submission of concrete test blocks under the same conditions are effectively prevented, and the concrete can not be tampered with after densification, thus ensuring the true quality of the construction project concrete.
Owner:四川广聚其力电子科技有限公司

Rainbow table parallel system design method and device based on MapReduce

InactiveCN104281816AControl overlap problemImplement parallel readsProgram initiation/switchingDigital data protectionData vectorRainbow
The invention discloses a rainbow table parallel system design method and device based on MapReduce. The design method includes a rainbow table data generation step and a rainbow table decryption step; the method includes aiming to each rainbow chain of a rainbow table, allowing a map module to acquire a chain head node data vector and chain end node data vector of the rainbow chain, recording the chain head node data vector as (img file = 'DDA0000586158180000011.TIF' wi = '88' he = '72' /), recording the chain end node data vector as (img file = 'DDA0000586158180000012.TIF' wi = '95' he = '66' /), adopting EPi as Key, adopting SPi as Value, and transmitting <EPi, SPi> data to a Reduce module of the rainbow chain; allowing the Reduce module of the rainbow chain to reorganize the <EPi, SPi> data, acquiring a data structure that (img file = 'DDA0000586158180000013 .TIF 'wi =' 400 'he =' 72 '/), presenting a chain table as (img file =' DDA0000586158180000014.TIF 'wi =' 238 'he =' 68 '/), and allowing the value of the chain table to be a set of chain head node data vectors of the rainbow table with all chain end node data vectors serving as the EPi; inserting all reorganized rainbow table data and fresh & lt; Key, Value & gt; data into a database NoSQL; analyzing Hash H0 to be decrypted, and mapping the H0 as nodes Nodei of the rainbow chain; converting the Nodek as the chain end node data vectors EP'i; adopting the EP'i as the key to read the reorganized rainbow chain data from the database NoSQL, and analyzing and acquiring the H0 passwords.
Owner:XIAMEN ZHIXIN TONGCHUANG NETWORK TECH

Method for scheduling decryption machines

The invention relates to a method for scheduling decryption machines. The method comprises: step 1, a receiver receiving invoice data information comprising invoice ciphertexts; step 2, the receiver querying the working state table of the decryption machines, determining whether there are decryption machines at idle working states, and if there are such idle decryption machines, selecting one as a specified decryption machine, wherein the decryption machine working state table comprises the working states of all the decryption machines, and the working states of the decryption machines comprise an idle state and a busy state; step 3, the server sending the invoice ciphertexts to the specified decryption machine and changes the working state of the specified decryption machine from the idle state to the busy state in the decryption machine working state table; step 4, the specified decryption machine decrypting the invoice ciphertexts and sending obtained invoice decryption information to the server; and step 5, the server, after receiving the invoice decryption information, changes the working state of the specified decryption machine from the busy state to the idle state in the decryption machine working state table. By using the method provided by the invention, the utilization efficiency of the decryption machines can be enhanced and the decryption efficiency can be improved.
Owner:AEROSPACE INFORMATION

Aggregation method for multi-dimensional data encryption and decryption in intelligent power grid

The invention discloses an aggregation method for multi-dimensional data encryption and decryption in an intelligent power grid. The aggregation method comprises the following steps: 1, respectively generating an encrypted public key and a decrypted private key of power utilization data by utilizing a Chinese remainder theorem; 2, generating a public key and a private key of the password system; 3, encrypting the power utilization data; 4, respectively aggregating the ciphertext and the ciphertext decryption parameters; 5, decrypting the aggregated ciphertext; 6, solving a discrete logarithm for the intermediate ciphertext; and 7, decrypting the mixed ciphertext. In the key generation process, the encrypted public key and the decrypted private key of the power consumption data are generated by utilizing the Chinese remainder theorem, so that the key generation efficiency is improved, and the calculation burden of a control center and the risk of data leakage are reduced. In the decryption process, only one discrete logarithm needs to be obtained for the intermediate ciphertext, the decryption efficiency of the aggregated ciphertext is improved, and finally the efficiency of the whole data aggregation process is improved.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products