Off-line data tamper-proofing method based on hash chain
A hash chain, offline technology, used in digital data protection, digital transmission systems, electrical components, etc., can solve the problem of hash chain security relying on one-way hash function, can not be derived, etc., to achieve low bandwidth requirements, The effect of key management simplicity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0037] Aiming at the problem of anti-tampering of offline data, the invention proposes a safe and reliable off-line data anti-tampering system based on hash chain technology and hybrid encryption mechanism. Among them, the hash chain technology is used to realize the anti-tampering of offline data, and then the hybrid encryption mechanism is used to prevent offline users from deleting the offline hash chain. Some basic concepts related to the present invention are:
[0038] 1. Hash chain: A hash chain is usually defined as the repeated application of an encrypted hash function to a given data asset. The specific implementation of the hash chain is to perform multiple hash operations on the data asset, and the The resu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


