Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Private key distribution method and device, private key decryption method and device, equipment and medium

A technology of private keys and devices, applied in the field of information security, can solve problems such as private key leakage and affect information security, and achieve the effect of ensuring security

Pending Publication Date: 2022-01-07
北京信安世纪科技股份有限公司
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a private key distribution and decryption method, device, device and medium to solve the problem in the prior art that since the private key is stored in the device, once the device is invaded, the private key will be leaked and the information will be seriously affected. security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private key distribution method and device, private key decryption method and device, equipment and medium
  • Private key distribution method and device, private key decryption method and device, equipment and medium
  • Private key distribution method and device, private key decryption method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] In order to reduce the risk of private key leakage and protect the security of information, embodiments of the present invention provide a private key distribution and decryption method, apparatus, device and medium.

[0041] figure 1 A schematic diagram of a process of a private key distribution method provided by an embodiment of the present invention, the process includes the following steps:

[0042] S101: Generate a corresponding public-private key pair according to a lattice encryption algorithm, wherein the public-private key pair includes a private key.

[0043] The private key distribution method provided by the embodiment of the present invention is applied to an electronic device, and the electronic device may be a device such as an intelligent terminal, a PC, or a server.

[0044] In order to ensure the security of information, the file or information to be transmitted may be encrypted at the sending end based on an encryption algorithm, and the encrypted f...

Embodiment 2

[0059] In order to encrypt the plaintext and generate the corresponding ciphertext, on the basis of the above embodiment, in the embodiment of the present invention, after the corresponding public-private key pair is generated, the method further includes:

[0060] Publish the public key contained in the public-private key pair.

[0061] After the corresponding public-private key pair is generated according to the lattice encryption algorithm, in order to realize that the electronic device where the encryptor is located can encrypt the file or information to be transmitted, that is, in order to realize that the encryptor encrypts the plaintext and generates the corresponding ciphertext , in this embodiment of the present invention, after obtaining the public-private key pair, the electronic device publishes the public key included in the public-private key pair.

Embodiment 3

[0063] In order to realize that the sub-private keys can be stored in different devices and reduce the risk of private key leakage, on the basis of the above embodiments, in this embodiment of the present invention, the at least two sub-private keys are sent to the first device. At least one target sub-private key in the key includes:

[0064] Each of the at least two sub-private keys is determined as a target sub-private key, and the at least two target sub-private keys are respectively sent to the corresponding at least two first devices.

[0065] In order to realize that there is no risk of private key leakage when one device or several devices are hacked, the split sub-private keys can be stored in different devices. In this embodiment of the present invention, the at least two private keys can be Each of the sub-private keys is determined as the target sub-private key, and the at least two target sub-private keys are sent to the corresponding at least two first devices, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a private key distribution method and device, a private key decryption method and device, equipment and a medium. In the embodiment of the invention, after a private key is generated, the private key is split into at least two sub-private keys, and a target sub-private key in the at least two sub-private keys is sent to first equipment, so that different sub-private keys are stored in different pieces of equipment, even if one equipment is invaded, the private key cannot be leaked, and the information security is ensured.

Description

technical field [0001] The present invention relates to the technical field of information security, and in particular, to a private key distribution and decryption method, device, device and medium. Background technique [0002] With the attention paid to the security in the process of file transmission and information transmission, more and more encryption methods and decryption algorithms have been applied. Among them, the lattice encryption algorithm is currently recognized as an encryption algorithm that can resist quantum computers. [0003] However, in the prior art, in the process of applying the lattice encryption algorithm, the private key is in the hands of a single decrypting party, that is, the private key is stored in a device. After encrypting the file to be encrypted according to the published public key, the encryptor sends the encrypted ciphertext to the device. After receiving the ciphertext, the device decrypts the ciphertext according to the pre-stored p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/30
CPCH04L63/0428H04L63/0442H04L9/3093H04L63/06
Inventor 张宇张庆勇
Owner 北京信安世纪科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products