Blockchain-based searchable encryption method
An encryption method and blockchain technology, applied in the direction of secure communication, payment system, and transmission system through chaotic signals, can solve the problems of information loss, malicious tampering, etc., and achieve strong robustness, privacy data protection, and high search efficiency Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0021] The user will encrypt and submit the information including personal information, transaction records, transaction purpose, transaction related parties and transaction property to the system after signing by all parties. At the same time, the user terminal generates a keyword table about the plaintext information, and the information in the table is hashed and submitted to the system together with the encrypted plaintext. The system first verifies the legitimacy of the user's identity through a series of operations using the chaotic map. If the user's identity is illegal, the writing process will be interrupted, otherwise the system will encrypt the hash table submitted by the user to form a mapping table between the hash value and its encrypted value, and write the mapping table together with the encrypted ciphertext submitted by the user to the zone blockchain.
[0022] When searching, the user enters a keyword into the system, and the keyword is hashed and submitted ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More