Electronic bill encryption and decryption method and device based on related parties

A technology of electronic bills and encryption methods, which is applied in electronic digital data processing, computer security devices, usage of multiple keys/algorithms, etc., can solve problems such as low efficiency, large redundancy, and difficulty in maintaining database tables, reducing Redundancy, improving encryption speed, and ensuring the effect of security

Active Publication Date: 2021-02-05
TSINGHUA UNIV
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This encryption method does ensure the privacy data isolation of all parties involved in a single electronic bill, but the data is still stored in plain text, and the information is still transparent to the database manager, and the complicated database tables are difficult to maintain. also very low
The other is based on asymmetric encryption. Each related party encrypts the electronic bill with its own public key, and then transmits it to the database. This method ensures the privacy of data storage, but the database will store each relevant The ciphertext of the electronic bill corresponding to the party has a large amount of redundancy, and the private data of each related party of a single electronic bill is mutually visible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic bill encryption and decryption method and device based on related parties
  • Electronic bill encryption and decryption method and device based on related parties
  • Electronic bill encryption and decryption method and device based on related parties

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] see figure 1 , figure 1 It is a schematic flowchart of a method for encrypting an electronic note based on a related party provided by an embodiment of the present invention. The authority control terminal applied to the electronic note can be executed by an encryption device based on the related party's electronic note, which can be realized by software and / or hardware, which is not limited in the embodiment of the present invention. Such as figure 1 As shown, the encryption method of the electronic bill provided in this embodiment specifically includes:

[0072] 110. Split the field information in the electronic bill into the first type of bill information visible to all, the second type of bill information visible to all related parties, and the third type of bill information visible to some related parties according to privacy rights.

[0073] Among them, the life cycle of electronic bills includes invoicing, printing, downloading, reimbursement application, and ...

Embodiment 2

[0096] see Figure 4 , Figure 4 It is a schematic flowchart of a method for decrypting an electronic note based on a related party provided by an embodiment of the present invention. The decryption method provided in this embodiment corresponds to the related party-based encryption method provided in the above-mentioned embodiments, and can be applied to the authority access terminal of the electronic note corresponding to the related party (also called the querying party). Such as Figure 4 As shown, the method includes:

[0097] 210. Split the encrypted electronic bill information to obtain the first type of bill information visible to everyone and the encrypted bill ciphertext of the bill information.

[0098] 220. For any related party, if the related party corresponds to the second type of note information visible to all related parties, determine the corresponding symmetric key ciphertext according to the identity of the related party, and use the related party's pri...

Embodiment 3

[0107] see Figure 7 , Figure 7 It is a schematic structural diagram of an encryption device for an electronic note based on a related party provided by an embodiment of the present invention. The device can be applied to the weight control terminal of bills. Such as Figure 7 As shown, the device includes: a field splitting module 310, a symmetric encryption module 320, and / or an asymmetric encryption module 330; wherein,

[0108] The field splitting module 310 is configured to: split the field information in the electronic note into first-type note information visible to all, second-type note information visible to all related parties, and partly visible to related parties according to privacy rights. The third type of bill information, wherein the relevant parties include the payer, the billing unit and the reimbursement unit;

[0109] The symmetric encryption module 320 is configured to perform symmetric encryption on the second type of note information by using a sym...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an electronic bill encryption and decryption method and device based on related parties, and the method comprises the steps: dividing field information in anelectronic bill into first-type bill information visible to all people and second-type bill information visible to all related parties according to a privacy authority, wherein the third type of billinformation is visible to a part of related parties; for the second type of bill information, based on a symmetric key, performing symmetric encryption on the second type of bill information, and performing asymmetric encryption on the symmetric key; and / or for the third type of bill information, asymmetrically encrypting the third type of bill information by utilizing the public key of each related party corresponding to the third type of bill information. By the adoption of the technical scheme, on the premise that data safety is guaranteed, the requirements of actual services can be well met, and the redundancy of the data can be reduced to the maximum extent.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of data encryption, and in particular to a method and device for encrypting and decrypting electronic notes based on related parties. Background technique [0002] With the advent of the digital age, the government has begun to vigorously promote the development of financial electronic bills (hereinafter referred to as "electronic bills"), and electronic bills are gradually replacing paper bills. The life cycle of electronic bills includes invoicing, printing, downloading, reimbursement application, and account feedback. Each stage corresponds to a number of related parties. For example, invoicing corresponds to the payer and billing unit, and account feedback corresponds to the reimbursement unit. [0003] However, in the traditional electronic bill service system, the information of each stage of the electronic bill is recorded in plain text, which leads to the risk of information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L29/06G06F21/60G06F21/62
CPCH04L9/14H04L63/045G06F21/602G06F21/6245
Inventor 丁旋卢光宏杨铮
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products