A method and device for encrypting and decrypting electronic bills based on related parties

A technology of electronic bills and encryption methods, which is applied in the direction of secure communication devices, computer security devices, and electronic digital data processing, can solve the problems of large redundancy, difficult maintenance of database tables, and low efficiency, so as to reduce redundancy, The effect of ensuring security and improving encryption speed

Active Publication Date: 2022-03-04
TSINGHUA UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This encryption method does ensure the privacy data isolation of all parties involved in a single electronic bill, but the data is still stored in plain text, and the information is still transparent to the database manager, and the complicated database tables are difficult to maintain. also very low
The other is based on asymmetric encryption. Each related party encrypts the electronic bill with its own public key, and then transmits it to the database. This method ensures the privacy of data storage, but the database will store each relevant The ciphertext of the electronic bill corresponding to the party has a large amount of redundancy, and the private data of each related party of a single electronic bill is mutually visible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for encrypting and decrypting electronic bills based on related parties
  • A method and device for encrypting and decrypting electronic bills based on related parties
  • A method and device for encrypting and decrypting electronic bills based on related parties

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] see figure 1 , figure 1 It is a schematic flowchart of a method for encrypting an electronic note based on a related party provided by an embodiment of the present invention. The authority control terminal applied to the electronic note can be executed by an encryption device based on the related party's electronic note, which can be realized by software and / or hardware, which is not limited in the embodiment of the present invention. Such as figure 1 As shown, the encryption method of the electronic bill provided in this embodiment specifically includes:

[0072] 110. Split the field information in the electronic bill into the first type of bill information visible to all, the second type of bill information visible to all related parties, and the third type of bill information visible to some related parties according to privacy rights.

[0073] Among them, the life cycle of electronic bills includes invoicing, printing, downloading, reimbursement application, and ...

Embodiment 2

[0096] see Figure 4 , Figure 4 It is a schematic flowchart of a method for decrypting an electronic note based on a related party provided by an embodiment of the present invention. The decryption method provided in this embodiment corresponds to the related party-based encryption method provided in the above-mentioned embodiments, and can be applied to the authority access terminal of the electronic note corresponding to the related party (also called the querying party). Such as Figure 4 As shown, the method includes:

[0097] 210. Split the encrypted electronic bill information to obtain the first type of bill information visible to everyone and the encrypted bill ciphertext of the bill information.

[0098] 220. For any related party, if the related party corresponds to the second type of note information visible to all related parties, determine the corresponding symmetric key ciphertext according to the identity of the related party, and use the related party's pri...

Embodiment 3

[0107] see Figure 7 , Figure 7 It is a schematic structural diagram of an encryption device for an electronic note based on a related party provided by an embodiment of the present invention. The device can be applied to the weight control terminal of bills. Such as Figure 7 As shown, the device includes: a field splitting module 310, a symmetric encryption module 320, and / or an asymmetric encryption module 330; wherein,

[0108] The field splitting module 310 is configured to: split the field information in the electronic note into first-type note information visible to all, second-type note information visible to all related parties, and partly visible to related parties according to privacy rights. The third type of bill information, wherein the relevant parties include the payer, the billing unit and the reimbursement unit;

[0109] The symmetric encryption module 320 is configured to perform symmetric encryption on the second type of note information by using a sym...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses a method and device for encrypting and decrypting electronic notes based on related parties, wherein the encryption method for electronic notes includes: splitting the field information in the electronic notes into the first One type of bill information, the second type of bill information visible to all related parties, and the third type of bill information visible to some related parties; for the second type of bill information, based on the symmetric key, the type of bill information is encrypted symmetrically, and Asymmetric encryption is performed on the symmetric key; and / or, for the third type of bill information, asymmetric encryption is performed on this type of bill information by using the corresponding public keys of each related party. By adopting the above-mentioned technical solution, under the premise of ensuring data security, it can well meet the needs of actual business, and at the same time, it can also reduce the redundancy of data to the greatest extent.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of data encryption, and in particular to a method and device for encrypting and decrypting electronic notes based on related parties. Background technique [0002] With the advent of the digital age, the government has begun to vigorously promote the development of financial electronic bills (hereinafter referred to as "electronic bills"), and electronic bills are gradually replacing paper bills. The life cycle of electronic bills includes invoicing, printing, downloading, reimbursement application, and account feedback. Each stage corresponds to a number of related parties. For example, invoicing corresponds to the payer and billing unit, and account feedback corresponds to the reimbursement unit. [0003] However, in the traditional electronic bill service system, the information of each stage of the electronic bill is recorded in plain text, which leads to the risk of information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14H04L9/40G06F21/60G06F21/62
CPCH04L9/14H04L63/045G06F21/602G06F21/6245
Inventor 丁旋卢光宏杨铮
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products