Data encryption and decryption method, data uploading end, data receiving end and system

A data decryption and data encryption technology, applied in the field of blockchain, can solve data security problems such as hidden dangers

Active Publication Date: 2021-09-03
JIANGXI AGRICULTURAL UNIVERSITY
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Based on this, the object of the present invention is to provide a data encryption and decryption method, a data uploading terminal, a data receiving terminal and a ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and decryption method, data uploading end, data receiving end and system
  • Data encryption and decryption method, data uploading end, data receiving end and system
  • Data encryption and decryption method, data uploading end, data receiving end and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] In the embodiment of the present invention, please refer to image 3 , image 3 It is a schematic diagram of the data encryption method in the embodiment of the present invention, such as image 3 As shown, the method includes step S101 to step S104:

[0055] S101. Obtain data plaintext, perform serialization processing on the data plaintext, and obtain byte stream plaintext.

[0056] First, serialize the data to be encrypted, where the data to be encrypted is the data plaintext, then use the AES key generated by the key generation algorithm to perform AES encryption on the serialized data, and finally encrypt the encrypted data with the k-v key Value pairs are stored in the state of the blockchain world.

[0057] S102. Obtain an AES key, and perform AES algorithm encryption on the byte stream plaintext in combination with the AES key to obtain data ciphertext.

[0058] In the data input phase, the data owner uploads the password of the data to be encrypted to the c...

Embodiment 2

[0090] An embodiment of the present application also provides a data upload terminal, including:

[0091] The data plaintext acquisition module is used to obtain the data plaintext, serialize the data plaintext, and obtain the byte stream plaintext;

[0092] The encryption module is used to obtain the AES key, and combines the AES key to perform AES algorithm encryption on the byte stream plaintext to obtain the data ciphertext;

[0093] An encoding module, configured to encode the data ciphertext to obtain the string ciphertext;

[0094] The writing module is used to write the string ciphertext into the blockchain database via data uplink.

[0095] To sum up, the data uploader in the above-mentioned embodiments of the present invention performs AES algorithm encryption on the byte stream plaintext obtained by serializing the data plaintext combined with the AES key to the data plaintext, and the obtained data ciphertext is uploaded to the In the blockchain database, when th...

Embodiment 3

[0097] Another aspect of the embodiment of the present application provides a data receiving end, including:

[0098] The data ciphertext acquisition module is used to obtain the data ciphertext sent by the blockchain database;

[0099] The authentication module is used to obtain the decryption password input by the user, and obtain the preset password from the Bloom filter of the blockchain database, and authenticate the decryption password and the preset password. The preset password is pre-stored before the data ciphertext is uploaded to the chain passphrase into the Bloom filter;

[0100] The first execution module, when the authentication is passed, decrypts the data ciphertext with the AES algorithm, deserializes the data ciphertext decrypted by the AES algorithm, obtains the data plaintext corresponding to the data ciphertext, and outputs the data plaintext;

[0101] The second execution module outputs data ciphertext when the authentication fails.

[0102] To sum up,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data encryption and decryption method, a data uploading end, a data receiving end and a system, the method comprises an encryption method and a decryption method, the encryption method comprises the following steps: acquiring a data plaintext and an AES key, and encrypting the data plaintext in combination with the AES key to obtain a data ciphertext; and encoding the data ciphertext to obtain a character string ciphertext, and writing the character string ciphertext into a block chain database. The decryption method comprises the following steps: acquiring a data ciphertext, a decryption password and a preset password, and authenticating the decryption password and the preset password; when the authentication is passed, outputting a data plaintext; and when the authentication is not passed, outputting the data ciphertext. According to the data encryption and decryption method, the data uploading end, the data receiving end and the system, different bloom filters can be set for verification for different groups of data through a password authentication mode without key distribution, differential verification of the data is realized, data security is ensured, and the problems are solved that in the prior art, an encryption algorithm needs to manage a key, and potential safety hazards exist in data security.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a data encryption and decryption method, a data uploading terminal, a data receiving terminal and a system. Background technique [0002] Information security is a hot topic of widespread concern in today's society, and the protection of private data is the top priority. Privacy data not only needs to be kept secret from other users except the data owner, but also needs to be kept secret from the data storage unit. The development of cryptography provides technical support for the former, and the emergence of blockchain technology removes obstacles for the latter. [0003] The smart contract is the key logic code in the blockchain, which runs in a securely isolated virtual machine and is the middle layer of data from the client to the database. A smart contract is essentially a series of codes that are automatically executed by a computer. According to preset condit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/6245G06F21/602
Inventor 易文龙赵小敏赵应丁李求德殷华徐亦璐
Owner JIANGXI AGRICULTURAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products