Improved large file encryption method
An encryption method, technology for large files
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0034] Embodiment 1 is the embodiment of this encryption method, and we choose SequenceFile file as an example, and the encryption step is as follows:
[0035] 1. Read the file, you can analyze each record and its length, and use one of its records as a data block. The start position and end position of the record are used as the positioning information of the data block.
[0036] 2. According to the set keyword calculation rules, the sensitivity of the records is obtained. The records that reach a certain threshold are determined to be encrypted. At the same time, according to the rules, it can be determined whether it is symmetric encryption or public key encryption (including some homomorphic encryption and proxy re-encryption). ), if the user chooses to encrypt records that do not reach the threshold according to their needs, the block is also encrypted. If the file does not belong to the above two situations, it will not be encrypted.
[0037] 3. Select an existing key ...
Embodiment 2
[0040] Embodiment 2 is a further improvement of Embodiment 1 of the encryption method. On the basis of Embodiment 1, considering that in files, text and numerical values are often mixed together, when numerical values and texts are mixed together, text and numerical values are mixed together. For isolation, each adopts an appropriate encryption method. For example, for the initial segmentation, considering different encryption needs, perform further segmentation, use different encryption methods for numerical values and texts, perform homomorphic encryption on numerical values, and use general symmetric encryption for other data. So segment them for isolation as well. For streaming files, there is no need to increase the number of records. When a record contains data that needs to be homomorphically encrypted, the data is segmented before and after the data. The ciphertexts of multiple segments in the record are put together, but the starting position of the first segm...
Embodiment 3
[0041] Embodiment 3 is a further improvement of Embodiment 1 of the encryption method. On the basis of Embodiment 1, the calculation functions that may be involved in the numerical value requiring homomorphic encryption are analyzed to determine whether the data involved need to use the same method. What kind of homomorphic encryption needs to be used for state encryption? When performing some entrusted calculations, other general encryption and non-fully homomorphic encryption cannot be directly calculated. When fully homomorphic encryption is required, fully homomorphic encryption is used. , when both fully homomorphic encryption and non-fully homomorphic encryption are feasible, the non-fully homomorphic (semi-homomorphic) encryption method is used. When ordinary encryption is feasible, the ordinary encryption method is preferred, that is, when multiple methods are When the purpose can be achieved, the preferred order is general encryption, semi-homomorphic encryption, and f...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More