Movatterモバイル変換


[0]ホーム

URL:


CN110380841A - A kind of Electronic Document exchange encryption method based on BlockChain - Google Patents

A kind of Electronic Document exchange encryption method based on BlockChain
Download PDF

Info

Publication number
CN110380841A
CN110380841ACN201910674325.0ACN201910674325ACN110380841ACN 110380841 ACN110380841 ACN 110380841ACN 201910674325 ACN201910674325 ACN 201910674325ACN 110380841 ACN110380841 ACN 110380841A
Authority
CN
China
Prior art keywords
data
algorithm
document
input
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910674325.0A
Other languages
Chinese (zh)
Inventor
徐秦成
刘清源
徐龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Heilongjiang Touyan Technology Co Ltd
Original Assignee
Heilongjiang Touyan Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Heilongjiang Touyan Technology Co LtdfiledCriticalHeilongjiang Touyan Technology Co Ltd
Priority to CN201910674325.0ApriorityCriticalpatent/CN110380841A/en
Publication of CN110380841ApublicationCriticalpatent/CN110380841A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The present invention provides a kind of data ciphering methods, which comprises acquisition data source document by private key array K by data original file encryption, and generates ciphertext C, while generating corresponding encrypted indexes I.C, I are uploaded to server, recipient and sender share private key array K simultaneously, if recipient wants the data file that search includes keyword w, can calculate corresponding Search Flags by private key array Ktw, while the Search Flags are uploaded to server, at this time server end by combination C, I,twCalculated resultCij, recipient can be in local decryption at this timeCij

Description

Electronic official document exchange encryption method based on BlockChain
Technical Field
The invention relates to the field of data security, in particular to an electronic official document exchange encryption method.
Background
The data contains a great deal of visual and hidden values, but how to develop, perfect and reasonably protect the data becomes the first problem to be solved nowadays.
The electronic document exchange system needs interactive cooperation of information management and a resource exchange mechanism, and accordingly, the management mechanism of the electronic document is optimized. It can be known in bitcoin and other cryptocurrency block chains that resource mining gradually rises to a bottleneck, a user can conveniently access cloud-end data on any equipment, and the existing Searchable Symmetric Encryption (SSE) scheme needs to pay before searching, which is unfair for the user, so that a novel electronic document exchange encryption method is needed to protect the data in the electronic document and ensure the safety and reliability of the data.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide the electronic document exchange encryption method, the provided method realizes safer monitoring management and authorization functions, and has the advantages of high data access safety factor, optimized resource monitoring, reduced resource consumption and the like.
The invention aims at an electronic official document exchange encryption method, which can comprise the following steps: and collecting a data source document, encrypting the data original document through a private key array K, generating a ciphertext C, and generating a corresponding encryption index I. C, I is uploaded to a server, the receiver and the sender share the private key array K at the same time, if the receiver wants to search the data document containing the keyword w, the corresponding search identification can be calculated by the private key array KtwAnd at the same time, uploading the search identifier to the server, wherein the server side passes through the combination C, I,twCalculation resultsCijAt this point, the receiver can decrypt locallyCij
The source data collected may be a data warehouse, in-server data, etc.
The private key array firstly provides a security parameter k for data in the process of encrypting the original document and outputs the private key arrayK=(k1,k2,k3,k4,k5)。
The index generation first extracts keywords from the document, and for each keywordwiWNull set should be setDBwi) If the jth document contains keywordswiThen, thenDB(wi)[j]Is set to 1, otherwise, willDB(wi)[j]Is set to 0.
Wherein,twi,ewi,Macwithe value of (c) will be calculated as follows:
twi=F1(K2,wi||0)
kwi=F1(K2,wi||1)
ewi= 𝛿.Enc(K=kwi,DB(wi))
kwi=F1(K3,wi)
Macwi =H(Kwi||DB(wi))
at this time, willtwiewiMacwiPut into a length ofm·(2k +λ) C, I is finally uploaded to the server.
The search identification of the document containing the keyword w is calculated through the private key arrayTwShould be calculated as follows:
tw=F1(k2,w|| 0)
kw=F1(k2,w|| 1)
k31=F1(k4,wi)
Tw= 𝛿.Enck(k31,tw||kw||H(k31))
when the server side combines and calculates the output result, ask and Pay are calculated through search algorithm, and then Reed is usedAnd the Dec algorithm calculates the Redeem,Dj
The fairness is based on the block chain technique being irreversible, and if the user and the server are not honest, then Pay cannot be accepted by the block chain.
When the search mode is executed, the user and the server carry out six times of interaction, and the intelligent contract is realizedD(. a) andSHA256,V(xy) AndAESandSHA256, the contract may automatically determine whether the embedded result is valid.
Drawings
Fig. 1 shows a flow chart of an electronic document exchange encryption algorithm according to an example embodiment of the present invention.
Detailed Description
As shown in fig. 1, an embodiment of the present invention provides an electronic document exchange encryption method.
First, a source data document is collected in step S101, and user data is derived from data in a data warehouse and a server.
Next, in step S102, after the data owner takes the parameter K as input, the key array K = (K =) can be correctly outputk1,k2,k3,k4,k5)。
In generating the ciphertext C in step S103, the ciphertext C should be calculated using the private key and the source document as follows.
Ci=ε.Enck1(Di)(1 ≤in)
MAC(Ci)=(K5,Ci)
C((C1MAC(C1)),...,(Cn,MAC(Cn)))
Generating the index first extracts keywords from the documents, for each keywordwiWNull set should be setDBwi) If the jth document contains keywordswiThen, thenDB(wi)[j]Is set to 1, otherwise, willDB(wi)[j]Is set to 0.
Wherein,twi,ewi,Macwithe value of (c) will be calculated as follows:
twi=F1(K2,wi||0)
kwi=F1(K2,wi||1)
ewi= A.Enc(K=kwi,DB(wi))
kwi=F1(K3,wi)
Macwi =H(Kwi||DB(wi))
at this time, willtwi,ewi,MacwiPut into a length ofm·(2k +λ) C, I is finally uploaded to the server.
The data owner shares the key array k with the user in step S104, and when searching for a document containing the keyword w, it should be obtained by the following calculationTwAnd upload it to the server.
tw=F1(k2,w|| 0)
kw=F1(k2,w|| 1)
k31=F1(k4,wi)
Tw=A.Enck(k31,tw||kw||H(k31))
In step S105, a value ofdNon-redemption of BTs1Then will beV(k31Tw) Is embedded intoaskIn the script of (2), the user outputs the main body of the Pay using ask, and propagates the Pay value.
The calculated should be used in step S106twewMacwAnd usekw:DB(w)=𝛿.Dec(kw,ew) Decryptionew. Setting of empty collectorCwAnd will beMAC(Cj) Is put intoCw,Thereafter will beTu1AndTu2the main body Get is output as input, and the script of pro is output by Get.
Using the key in step S107k1To pairCjDj=ε.Dec(K1Cj) Decryption, and finally updating by new keyCiIs/are as followsMAC(Ci) Deleting old cloud storage endMAC(Ci)。

Claims (6)

CN201910674325.0A2019-07-252019-07-25A kind of Electronic Document exchange encryption method based on BlockChainPendingCN110380841A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201910674325.0ACN110380841A (en)2019-07-252019-07-25A kind of Electronic Document exchange encryption method based on BlockChain

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201910674325.0ACN110380841A (en)2019-07-252019-07-25A kind of Electronic Document exchange encryption method based on BlockChain

Publications (1)

Publication NumberPublication Date
CN110380841Atrue CN110380841A (en)2019-10-25

Family

ID=68255664

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201910674325.0APendingCN110380841A (en)2019-07-252019-07-25A kind of Electronic Document exchange encryption method based on BlockChain

Country Status (1)

CountryLink
CN (1)CN110380841A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN112653550A (en)*2020-10-112021-04-13黑龙江头雁科技有限公司Multi-item key management method based on BlockChain

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108111587A (en)*2017-12-152018-06-01中山大学A kind of cloud storage searching method based on time release
CN108366072A (en)*2018-03-062018-08-03中山大学A kind of cloud storage method for supporting voice encryption to search for

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108111587A (en)*2017-12-152018-06-01中山大学A kind of cloud storage searching method based on time release
CN108366072A (en)*2018-03-062018-08-03中山大学A kind of cloud storage method for supporting voice encryption to search for

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李晓坤 等: "基于BlockChain 的电子公文交换加密方法研究", 《电测与仪表》, vol. 56, no. 12, 25 June 2019 (2019-06-25), pages 38 - 42*

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN112653550A (en)*2020-10-112021-04-13黑龙江头雁科技有限公司Multi-item key management method based on BlockChain

Similar Documents

PublicationPublication DateTitle
US10951394B2 (en)System and method for publication of private data using a blockchain network
CN106776904A (en)The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment
US20090138698A1 (en)Method of searching encrypted data using inner product operation and terminal and server therefor
WO2024077948A1 (en)Private query method, apparatus and system, and storage medium
CN112182630A (en)Symmetric searchable encryption method, device, equipment and medium
CN113067702B (en)Identity-based encryption method supporting ciphertext equivalence test function
CN112328606A (en)Keyword searchable encryption method based on block chain
CN108038128A (en)A kind of search method, system, terminal device and storage medium for encrypting file
CN102571357A (en)Signature realization method and signature realization device
CN107291861A (en)A kind of approximate beeline querying method of belt restraining towards encryption figure
CN118573490B (en)Communication verification method, device and medium based on combined encryption algorithm
CN114021196A (en)Fair searchable encryption method and system
CN104113543B (en)A kind of message discrimination method based on block cipher
KR100951034B1 (en) Public key based searchable ciphertext generation method to reduce ciphertext size, and public key based data retrieval method
CN115865524A (en)Data secure transmission method and system
CN109274659B (en)Certificateless online/offline searchable ciphertext method
CN110968892A (en)Data encryption system based on electric quantity data query
CN110380841A (en)A kind of Electronic Document exchange encryption method based on BlockChain
CN112561701B (en)Transaction creation method, verification method and transaction equipment of blockchain system
CN117828673A (en)Block chain-based data circulation and privacy protection method and device
CN115618381B (en)Data processing method, device, equipment and storage medium
CN116861449A (en) A blockchain-based searchable encryption system for medical data
CN115422579A (en) Method and system for encrypted data storage and post-storage query
CN115580863A (en) A method and system for real-name authentication of Internet of Vehicles card
Singhai et al.An efficient image security mechanism based on advanced encryption standard

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
WD01Invention patent application deemed withdrawn after publication

Application publication date:20191025

WD01Invention patent application deemed withdrawn after publication

[8]ページ先頭

©2009-2025 Movatter.jp