Unlock instant, AI-driven research and patent intelligence for your innovation.

A Hierarchical Verifiable Query System Based on Selective Leakage

A query system and selective technology, applied in the field of cryptography, can solve a large number of dynamic scanning, affect information transmission, damage a credible image, etc., to reduce the risk of tampering, protect data security, and reduce corporate overhead.

Active Publication Date: 2022-06-17
FUDAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After the content of the website is tampered with, it will cause the public to question the information security protection capabilities of government enterprises and damage their credible image;
[0006] (2) Influence information transmission
For the query system, if the returned data is tampered with, it will affect all aspects of all walks of life: the financial system may cause huge losses, scientific research institutions may cause experiments to fail, and government, schools and other official institutions may suffer losses. Credibility affects social harmony and stability
Existing anti-tampering systems for web pages require a large number of dynamic scans, which is extremely expensive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Hierarchical Verifiable Query System Based on Selective Leakage
  • A Hierarchical Verifiable Query System Based on Selective Leakage
  • A Hierarchical Verifiable Query System Based on Selective Leakage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention is further described below through specific embodiments, so that those skilled in the relevant fields can better understand the technical and functional characteristics of the present invention, but the protection scope of the present invention is not limited to the following embodiments.

[0040] In this embodiment, the programming language is Python, JavaScript, and HTML, and the browser is Chrome.

[0041] figure 1 For the system architecture diagram, the specific process of each module is:

[0042] 1. Storage module

[0043] In the storage module, the fields stored in the database are stored in an improved triple one-way hash Huffman tree (selectively leaked Huffman tree). The specific process is as follows:

[0044] (1) Set the weight value of each field according to the probability of the stored field. Assuming that there are n weight values, the constructed Huffman tree has n leaf nodes. The n weights are respectively set to w 1 , w 2 ,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of passwords, in particular to a selective leak-based hierarchical verifiable query system. The system of the present invention includes a storage module, a user module, and a verification module; the storage module is responsible for storing and processing data; the storage module stores the fields stored in the database in a selectively leaked Huffman tree, and mixes them in different orders at different nodes of the tree Use four 256-bit encryption functions to encrypt information; the user module is responsible for receiving and processing user operations; users register and log in to the system on the browser side, and use the SM2 national secret algorithm to encrypt personal information; the verification module is equivalent to a validator, using To verify whether the field stored in the storage module has been tampered with. The system of the present invention enables users to check the obtained data at the client end, reduces the risk of web page content being tampered with, greatly reduces the operating frequency of anti-tampering mechanisms such as core embedded technology, and reduces enterprise expenses while ensuring the correct rate.

Description

technical field [0001] The invention belongs to the technical field of cryptography, in particular to a hierarchical verifiable query system based on selective leakage. Background technique [0002] The 21st century is an era of rapid development of the Internet. According to a report released by the United Nations Broadband Commission for Sustainable Development, by the end of 2015, about 3.2 billion people in the world had used the Internet, and by the end of 2016, this number could reach 3.5 billion. The Internet has penetrated all walks of life, and is gradually changing the way people live and work, and has also brought new business models and opportunities to various industries. However, due to the immature market environment and regulatory mechanisms, various networks have also become Crimes emerge in an endless stream, posing a huge threat to Internet security. [0003] As one of the oldest and most important information distribution and access methods in the Intern...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64G06F21/62G06F21/60G06F21/31
CPCG06F21/64G06F21/6227G06F21/602G06F21/31G06F2221/2113G06F2221/2141G06F2221/2117
Inventor 袁和昕阚海斌刘百祥
Owner FUDAN UNIV