An Auditable Encrypted Storage Method
A technology for encrypting storage and encrypting data, which is applied to the public key and key distribution of secure communication, which can solve the problems of terminal consumption, encryption not working as expected, and remote file auditing, etc., so as to improve security and facilitate file auditing Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0047]First, it is to be noted that the present invention relates to an inspection of questionnaire data analysis techniques, and is an application in the field of information security technology. In the implementation of the present invention, the application of multiple software function modules will be involved. Applicants believe that,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, The aforementioned software function modules include, but are not limited to, key generation modules, data processing modules, auditing modules, integrity verification modules, encrypted data restore modules, integrity certification modules, etc., all of which are mentioned in this category Applicants are no longer listed.
[0048] One auditable encryption storage method as an example, is as follows:
[0049] 1, key generation
[0050] Suppose the given security parameter λ is 2048, the user end...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

