Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption, decryption and processing method and device, equipment and storage medium

A data encryption and data decryption technology, applied in the field of information security, can solve the problems of increasing the data computing burden on the client side, and the information security cannot be guaranteed, and achieve the effect of avoiding the risk of information leakage, reducing the amount of data computing, and improving security.

Pending Publication Date: 2022-02-11
BEIJING QIANXIN TECH +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if you directly put the salary plaintext on the cloud, the enterprise information will be exposed to the server, and the information security cannot be guaranteed. If you store the salary ciphertext data in the cloud, any calculation of the salary data at this time needs to first convert the ciphertext salary data from The cloud downloads to the client, and then the client decrypts the ciphertext salary data to obtain the plaintext data, and then performs related calculation processing on the plaintext salary data, which greatly increases the data calculation burden of the client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption, decryption and processing method and device, equipment and storage medium
  • Data encryption, decryption and processing method and device, equipment and storage medium
  • Data encryption, decryption and processing method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. In the description of the present application, the terms "first", "second" and the like are only used for distinguishing descriptions, and cannot be understood as indicating or implying relative importance.

[0054] Such as figure 1 As shown, this embodiment provides an electronic device 1, including: at least one processor 11 and a memory 12, figure 1 Take a processor as an example. Processor 11 and memory 12 are connected via bus 10 . The memory 12 stores instructions that can be executed by the processor 11, and the instructions are executed by the processor 11, so that the electronic device 1 can execute all or part of the processes of the methods in the following embodiments, so as to improve the security of data storage and reduce customer The amount of data operations at the end.

[0055] I...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data encryption, decryption and processing method and device, equipment and a storage medium, and the encryption method comprises the steps: obtaining a key corresponding to to-be-processed data, wherein the order of magnitude of the key is greater than the order of magnitude of the to-be-processed data; and performing target homomorphic encryption processing on the to-be-processed data according to the key corresponding to the to-be-processed data to obtain ciphertext data of the to-be-processed data. According to the data processing method and device, homomorphic encryption processing is conducted on the to-be-processed data through the secret key with the order of magnitude larger than the order of magnitude of the to-be-processed data, the ciphertext data of the to-be-processed data can be obtained, polynomial operation can be directly conducted on the ciphertext data of the to-be-processed data, and the information leakage risk caused by direct plaintext data operation is avoided.

Description

technical field [0001] The present application relates to the technical field of information security, in particular, to a data encryption, decryption, processing method, device, device and storage medium. Background technique [0002] With the development of the Internet and the birth of the concept of cloud computing, as well as the increasing demand for ciphertext search, electronic voting, mobile code and multi-party computing, homomorphic encryption (Homomorphic Encryption) has become more important. Homomorphic encryption is a kind of encryption method with special natural properties. This concept was first proposed by Rivest et al. in the 1970s. Compared with general encryption algorithms, homomorphic encryption can not only realize basic encryption operations, but also A variety of calculation functions between ciphertexts can be realized, that is, calculation before decryption is equivalent to decryption before calculation. This feature is of great significance for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L9/00H04L9/08
CPCH04L63/0435H04L9/008H04L9/0869H04L2209/08H04L2463/062
Inventor 张华
Owner BEIJING QIANXIN TECH