Off-line data tamper-proofing system based on hash chain
A hash chain, offline technology, applied in the direction of digital transmission system, transmission system, digital data protection, etc., can solve the problem that the security of the hash chain depends on the one-way hash function and cannot be derived, and achieves low bandwidth requirements, The effect of key management simplicity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0036] Aiming at the problem of anti-tampering of offline data, the invention proposes a safe and reliable off-line data anti-tampering system based on hash chain technology and hybrid encryption mechanism. Among them, the hash chain technology is used to realize the anti-tampering of offline data, and then the hybrid encryption mechanism is used to prevent offline users from deleting the offline hash chain. Some basic concepts related to the present invention are:
[0037] 1. Hash chain: A hash chain is usually defined as the repeated application of an encrypted hash function to a given data asset. The specific implementation of the hash chain is to perform multiple hash operations on the data asset, and the The resu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


