Check patentability & draft patents in minutes with Patsnap Eureka AI!

Decryption system, method, device, electronic equipment and storage medium

A device and ciphertext technology, applied in encryption devices with shift registers/memory, transmission systems, digital transmission systems, etc., can solve the problems of private key leakage, affecting data security, etc. The difficulty of cracking and the effect of avoiding private key leakage

Active Publication Date: 2021-08-31
北京信安世纪科技股份有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the decryption device is invaded by an attacker, it is easy to cause the private key to be leaked, thereby affecting the security of the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decryption system, method, device, electronic equipment and storage medium
  • Decryption system, method, device, electronic equipment and storage medium
  • Decryption system, method, device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to enable those skilled in the art to better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

[0047] In some processes described in the specification and claims of the present application and the description in the above-mentioned drawings, multiple operations appearing in a specific order are included, but it should be clearly understood that these operations may not be performed in the order in which they appear herein Execution or parallel execution, the serial numbers of the operations, such as 101, 102, etc., are only used to distinguish different operations, and the serial numbers themselves do not represent any execution order. Additionally, these processes can include more or fewer operations, and these operations can be performed sequentially or in paral...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application provides a decryption system, method, device, electronic equipment, and storage medium. The technical solution provided by the embodiment of the present application relies on a decryption system including n decryption devices, a first server, and a second server. The first The server determines n private keys and corresponding private key parameters and distributes them to n decryption devices; the second server randomly selects k first decryption devices from n decryption devices to participate in the decryption task, and triggers k first decryption devices Each device determines its own decryption parameters based on its own private key and k private key parameters, and selects one of the k first decryption devices as the second decryption device; the second decryption device performs a decryption operation based on the k decryption parameters. Since the private key required to decrypt the ciphertext data is distributed in multiple decryption devices, the decryption requires the participation of multiple decryption devices, which increases the difficulty of cracking by the attacker, effectively avoids the leakage of the private key, and improves data security.

Description

technical field [0001] The embodiments of the present application relate to the field of computer application technology, and in particular to a decryption system, method, device, electronic equipment, and storage medium. Background technique [0002] The National Commercial Cryptography Standard Algorithm SM9 issued by the State Cryptography Administration is an Identity-Based Cryptography (IBC) algorithm. public key, which omits the process of exchanging digital certificates and public keys, making the security system easy to deploy and manage. It is very suitable for end-to-end offline secure communication, cloud data encryption, attribute-based encryption, and policy-based encryption. Various occasions. [0003] At present, the private key used to decrypt the ciphertext data is generally stored locally in the decryption device. When the decryption device receives the ciphertext data, it obtains the locally stored private key to decrypt the ciphertext data. However, if t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/14H04L9/08H04L9/06
CPCH04L9/0618H04L9/0643H04L9/0866H04L9/14H04L63/0428
Inventor 张宇汪宗斌
Owner 北京信安世纪科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More