Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption method, data processing method, data decryption method and electronic device

A data encryption and data processing technology, applied in the direction of electrical digital data processing, digital data protection, instruments, etc., can solve data leakage, affect the security of data transmission and other problems, achieve the effect of improving security and avoiding data leakage

Active Publication Date: 2021-12-21
北京信安世纪科技股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For untrustworthy environments, such as cloud environments, there is a risk of data leakage, which affects the security of data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, data processing method, data decryption method and electronic device
  • Data encryption method, data processing method, data decryption method and electronic device
  • Data encryption method, data processing method, data decryption method and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to enable those skilled in the art to better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

[0035] In some processes described in the specification and claims of the present application and the description in the above-mentioned drawings, multiple operations appearing in a specific order are included, but it should be clearly understood that these operations may not be performed in the order in which they appear herein Execution or parallel execution, the serial numbers of the operations, such as 101, 102, etc., are only used to distinguish different operations, and the serial numbers themselves do not represent any execution order. Additionally, these processes can include more or fewer operations, and these operations can be performed sequentially or in paral...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present application provide a data encryption method, a data processing method, a data decryption method, and an electronic device. Wherein, based on the group homomorphism mapping from the elliptic curve group on the finite field to the elliptic curve group on the remaining class ring, determine the second elliptic curve point corresponding to the first elliptic curve point on the elliptic curve group on the remaining class ring , the first elliptic curve point is generated according to the public key; the class function of the second elliptic curve point is calculated; the data to be encrypted is encrypted using the class function to obtain the first sub-ciphertext; the first sub-ciphertext A ciphertext is formed with the second sub-ciphertext, and the second sub-ciphertext and the public key are generated according to the elliptic curve parameters on the finite field. The technical solutions provided by the embodiments of the present application improve the security of data transmission.

Description

technical field [0001] The embodiments of the present application relate to the field of computer application technologies, and in particular, to a data encryption method, a data processing method, a data decryption method, and electronic equipment. Background technique [0002] In order to ensure the security of data transmission, cryptography is indispensable. Typically, the data is encrypted using an elliptic curve encryption algorithm. The existing elliptic curve encryption algorithm usually adopts the elliptic curve on the finite field, and uses the points of the elliptic curve on the finite field to encrypt data. Specifically, according to the public key of the elliptic curve on the finite field, the elliptic curve point is generated, and the hash function is used to encrypt the elliptic curve point and data to obtain the first sub-ciphertext, and the first sub-ciphertext and the second sub-ciphertext The ciphertext is obtained, wherein the second sub-ciphertext and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 秦体红
Owner 北京信安世纪科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products