Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

44 results about "Verifiable encryption" patented technology

Verifiable encryption is an encryption scheme where one can prove some property of a message m, while the message is given in an encrypted form. When an encryption scheme is secure, the encryption E(m) should reveal no information regarding m.

Multiparty fair PDF contract signing method based on block chain

The invention relates to a multiparty fair PDF contract signing method based on a block chain. Participants comprise a plurality of contract signers P<1>,... and P<n>, a trusted third party (TTP) andblock chain nodes. The method comprises the steps that the P<1> generates a verifiable encryption signature VES<1> of a contract, calculates a hash context CTX<1> of contract content, generates elements GE<1> of a group key negotiation agreement GKA, packages the VES<1>, the CTX<1> and the GE<1> into block chain transaction and sends the block chain transaction to any block chain node; a P verifies VES<i-1> of a P<i-1>, wherein the i is greater than 1 and is smaller than or equal to the n, after the verification is successful, the P generates a new VES, CTX and GE, and sends theVES, CTX and GE to any block chain node through transaction; after the P<n> finishes operation, a P<j> calculates a group encryption key GK, wherein the j is greater than or equal to 1 and is smaller than or equal to the n, the P<j> encrypts a digital signature of a PDF document to form a ciphertext C<j>, packages the C<j> into the transaction and sends the transaction to the block chainnode; the P<j> queries block chain data, decrypts the block chain data through utilization of the GK and then combines the block chain data into a complete PDF contract; and if the P<j> does not obtain the block chain data after the P<j> is overtime, the P<j> communicates with the TTP to process an exception. According to the method, the dependence on the TTP is relatively weak, and the efficiency is relatively high.
Owner:信睿吉科技(北京)有限公司

File encryption and decryption method and system

ActiveCN106372529ARealize encryption and decryptionDigital data protectionArray data structureJumping function
The invention relates to a file encryption and decryption method and system. The method comprises the following steps of: creating a secret key array and a jump function; reading data elements of an original file; respectively taking the data elements of the original file as dependent variables of the jump function, calculating a value corresponding to the jump function, and taking the corresponding value as an index to query the secret key array so as to obtain secret keys corresponding to the data elements; carrying out XOR on the data elements of the original file and the corresponding secret keys to obtain an encrypted file; and carrying out XOR restoration on the data elements of the encrypted file and the corresponding secret keys to obtain the original file. According to the method and system provided by the invention, the jump function is created on the basis of reversibility of XOR, so that the secret keys corresponding to the data elements of the original file are indexed in a jump manner, XOR is carried out on the data elements of the original file and the corresponding secret keys to obtain the encrypted file, and XOR restoration is carried out on the data elements of the encrypted file and the corresponding secret keys to obtain the original file, thereby well realizing the encryption and decryption of the file on embedded devices with small memories.
Owner:GUANGZHOU SHIYUAN ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products