High-performance data multi-level encryption and decryption method and system based on complete homomorphic encryption
A homomorphic encryption, encryption and decryption technology, applied in the field of information security, can solve problems such as inability to dynamically adjust, inability to access ciphertext, and large ciphertext
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0063] Example
[0064] For the sake of convenience, this embodiment uses the simplest summation and disassembly scheme for description, taking three-level encryption as an example, where PK is the public key and SK is the private key. The specific operation steps are as follows:
[0065] A. The first-level platform provides centralized identity registration, key generation, and key distribution services, and initializes a pair of public and private keys SK pub and PK pub as the public ciphertext space (S pub ) key;
[0066] B. After the secondary account A completes the registration, the central platform generates the corresponding public and private key pair SK A and PK A , and send PK pub and the conversion dictionary (T pub=>A ) to A, and owns the conversion dictionary (T A=>pub );
[0067] C. After the third-level account A1 (organization) under the second-level account is registered, the central platform generates the corresponding public-private key pair SK A1 ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap