A Hierarchical Verifiable Query System Based on Selective Leakage
A query system and selective technology, applied in the field of cryptography, can solve a large number of dynamic scanning, affect information transmission, damage a credible image, etc., to reduce the risk of tampering, protect data security, and reduce corporate overhead.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] The present invention is further described below through specific embodiments, so that those skilled in the relevant fields can better understand the technical and functional characteristics of the present invention, but the protection scope of the present invention is not limited to the following embodiments.
[0040] In this embodiment, the programming language is Python, JavaScript, and HTML, and the browser is Chrome.
[0041] figure 1 For the system architecture diagram, the specific process of each module is:
[0042] 1. Storage module
[0043] In the storage module, the fields stored in the database are stored in an improved triple one-way hash Huffman tree (selectively leaked Huffman tree). The specific process is as follows:
[0044] (1) Set the weight value of each field according to the probability of the stored field. Assuming that there are n weight values, the constructed Huffman tree has n leaf nodes. The n weights are respectively set to w 1 , w 2 ,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


