Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Electronic official document exchange encryption method based on BlockChain

An encryption method and electronic document technology, applied in the field of data security, can solve problems such as unfairness of users

Inactive Publication Date: 2019-10-25
黑龙江头雁科技有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen in Bitcoin and other cryptocurrency blockchains that the mining of resources has gradually risen to the bottleneck, and users can easily access cloud data on any device, while the existing searchable symmetric encryption (SSE) scheme needs to be searched Paying in advance, this method is unfair to users, therefore, a new encryption method for electronic document exchange is needed to protect the data in the electronic document to ensure the safety and reliability of the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic official document exchange encryption method based on BlockChain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Such as figure 1 As shown, the embodiment of the present invention provides an electronic document exchange encryption method.

[0026] First, source data documents are collected in step S101, and user data comes from data warehouses and data in servers.

[0027] Secondly, in step S102, after the data owner takes the parameter k as input, the key array K=( k 1 , k 2 , k 3 , k 4 , k 5 ).

[0028] In the process of generating the ciphertext C in step S103, the ciphertext C should be calculated in the following manner using the private key and the source document.

[0029] C i =ε.Enc k1 (D i )(1 ≤ i ≤ n )

[0030] MAC ( C i )=( K 5 , C i )

[0031] C ← (( C 1 , MAC ( C 1 )), ..., ( C n , MAC ( C n )))

[0032] Generating an index first extracts keywords from the document, for each keyword w i ∈ W empty array should be set DB ( w i ), if the jth document contains keywords w i ,butDB ( w i )[ j ] to 1, otherwise, set DB ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data encryption method, which comprises the following steps: acquiring a data source document, encrypting an original data document through a private key array K, generating aciphertext C, and simultaneously generating a corresponding encryption index I; uploading the C and the I to a server; the receiver and the sender sharing a private key array K at the same time; if areceiver wants to search for a data document containing a keyword w, the receiver can calculate a corresponding search identifier tw through the private key array K and upload the search identifier to the server, at the moment, the server calculating a result Cij through combination of C, I and tw, and at the moment, the receiver can decrypt Cij locally.

Description

technical field [0001] The invention relates to the field of data security, and more specifically, to an electronic document exchange encryption method. Background technique [0002] Data contains a lot of intuitive and hidden value, but how to develop and protect it reasonably has become the primary problem that needs to be solved today. [0003] The electronic document exchange system requires the interaction and cooperation of information management and resource exchange mechanism, and optimizes the management mechanism of electronic documents accordingly. It can be seen in Bitcoin and other cryptocurrency blockchains that the mining of resources has gradually risen to the bottleneck, and users can easily access cloud data on any device, while the existing searchable symmetric encryption (SSE) scheme needs to be searched Paying in advance is unfair to users. Therefore, a new encryption method for electronic document exchange is needed to protect the data in the electroni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/08H04L29/06
CPCH04L63/0428H04L9/085H04L9/0643H04L9/0631
Inventor 徐秦成刘清源徐龙
Owner 黑龙江头雁科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products