CN105227566A - Cipher key processing method, key handling device and key handling system - Google Patents

Cipher key processing method, key handling device and key handling system Download PDF

Info

Publication number
CN105227566A
CN105227566A CN201510672476.4A CN201510672476A CN105227566A CN 105227566 A CN105227566 A CN 105227566A CN 201510672476 A CN201510672476 A CN 201510672476A CN 105227566 A CN105227566 A CN 105227566A
Authority
CN
China
Prior art keywords
key
fragment
server
clouds
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510672476.4A
Other languages
Chinese (zh)
Inventor
李文杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201510672476.4A priority Critical patent/CN105227566A/en
Publication of CN105227566A publication Critical patent/CN105227566A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Abstract

The invention provides a kind of cipher key processing method, key handling device and key handling system, belong to communication technical field, it can solve the low problem of existing cipher key processing method fail safe.Cipher key processing method of the present invention comprises the steps: to receive secret generating request, generate a pair PKI and private key, and private key is divided into a main fragment and the auxiliary fragment of N part, and main for portion wherein fragment is uploaded in local key server, auxiliary for N part fragment is uploaded at least one high in the clouds key server; N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key; By PKI, data are encrypted, form message ciphertext, and be uploaded to high in the clouds data server; Receive the request of query messages ciphertext, obtain the message ciphertext of high in the clouds data server, and from the key server of high in the clouds, obtain at least a auxiliary fragment, obtain main fragment from local key server, reconstruct private key is decrypted with message cipher text.

Description

Cipher key processing method, key handling device and key handling system
Technical field
The invention belongs to communication technical field, be specifically related to a kind of cipher key processing method, key handling device and key handling system.
Background technology
Along with information-based and digitized universal, secret key safety sex chromosome mosaicism more and more receives the concern of people.Common business exchange activity etc. is all that is the fail safe of all Online activities all depends on private key without exception based on the fail safe of private key, therefore protects the safety of private key to be the vital part of network security.
In prior art, there are the following problems: usually adopt the mode of the single key of centralised storage (this key is normally stored on home server) to encrypt and decrypt data during data owner's uploading data, now the safety decision-making of key is in the safety of physical equipment.But Internet of things node and cloud device easily suffer physical attacks, assailant implements physical damage makes node normally work, or equipment of stealing obtains sensitive information.Assailant tackles the data transmitted in network and signaling, distort, when forging, if obtain the unique communication key stored in a device, just can obtain user sensitive information further or cause information transmission errors.
Summary of the invention
The present invention is directed to the problems referred to above that existing cipher key processing method exists, the cipher key processing method providing a kind of fail safe high, key handling device and key handling system.
The technical scheme that the technical problem that the present invention solves adopts is a kind of cipher key processing method, comprises the steps:
Receive secret generating request, generate a pair PKI and private key, and private key is divided into a main fragment and the auxiliary fragment of N part, and main for portion wherein fragment is uploaded in local key server, auxiliary for N part fragment is uploaded at least one high in the clouds key server; Wherein, N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key;
By PKI, data are encrypted, form message ciphertext, and be uploaded to high in the clouds data server;
Receive the request of query messages ciphertext, obtain the message ciphertext of high in the clouds data server, and from the key server of high in the clouds, obtain at least a auxiliary fragment, obtain main fragment from local key server, reconstruct private key is decrypted with message cipher text.
Preferably, the number of described high in the clouds key server is N, and stores a private key fragment in each high in the clouds key server.
Preferably, the request of described reception query messages ciphertext comprises:
Receive the message cryptogram search request of searching ciphertext mode.
Preferably, described by PKI data are encrypted after also comprise:
Described PKI is destroyed, or described PKI is stored to the step in local key server.
Preferably, described generation a pair PKI and private key, comprising:
Adopt key-function, according to the parameter of setting, stochastic generation PKI and private key;
Describedly by PKI, data to be encrypted, to comprise:
Adopting encryption function, is message ciphertext by data encryption;
Described reconstruct private key, comprising:
Adopt reconstruction of function, be at least aly stored in fragment in the key server of high in the clouds and a fragment be stored in local key server, reconstruct private key according to what receive;
Described message cipher text is decrypted and comprises:
Adopt decryption function, according to the private key of reconstruct, by message decrypt ciphertext.
The technical scheme that the technical problem that the present invention solves adopts is a kind of key handling device, comprising:
Key production module, for according to secret generating request, generates a pair PKI and private key;
Key management module, for private key being divided into a main fragment and the auxiliary fragment of N part, and being uploaded in local key server by main for portion wherein fragment, being uploaded to by auxiliary for N part fragment at least one high in the clouds key server; Wherein, N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key;
Encrypting module, for being encrypted data by described PKI, being formed message ciphertext, and described message ciphertext is uploaded to high in the clouds data server;
Reconstructed module, for obtaining at least a auxiliary fragment from the key server of high in the clouds, obtains main fragment from local key server, reconstruct private key;
Deciphering module, for the request according to received query messages ciphertext, is obtained the message ciphertext of high in the clouds data server, and is decrypted by the private key message cipher text of reconstruct.
Preferably, described key handling device also comprises: index module,
Described index module, for carrying out index to the message ciphertext being uploaded to high in the clouds data server
Preferably, described PKI also for being destroyed by described PKI, or is stored in local key server by described key management module.
Preferably, described key management module is used for the auxiliary fragment of N part private key to be uploaded in the key server of N number of high in the clouds, and stores a auxiliary fragment in each high in the clouds key server.
The technical scheme that adopts of technical problem that the present invention solves is a kind of key handling system, comprises above-mentioned key handling device, and local data service device, local key server and at least one high in the clouds key server.
The present invention has following beneficial effect:
Cipher key processing method of the present invention, is divided into multiple fragment by private key, i.e. a main fragment and the auxiliary fragment of N part, and adopts distributed storage mode to be stored in by private key in different servers, to guarantee the fail safe of the storage of private key.And auxiliary for private key fragment is existed in the key server of high in the clouds, the storage pressure of local key server can be alleviated.
In key handling device in the present invention key management module just private key be divided into multiple fragment, i.e. a main fragment and the auxiliary fragment of N part, and adopt distributed storage mode to be stored in by private key in different servers, to guarantee the fail safe of the storage of private key.And auxiliary for private key fragment is existed in the key server of high in the clouds, the storage pressure of local key server can be alleviated.
Key handling system in the present invention comprises above-mentioned key handling device, therefore its fail safe is higher.
Accompanying drawing explanation
Fig. 1 is the flow chart of the cipher key processing method of embodiments of the invention 1;
Fig. 2 is the schematic diagram of the key handling system of embodiments of the invention 3.
Embodiment
For making those skilled in the art understand technical scheme of the present invention better, below in conjunction with the drawings and specific embodiments, the present invention is described in further detail.
Embodiment 1:
As shown in Figure 1, the present embodiment provides a kind of cipher key processing method, and it comprises the steps:
Step S1, the request of reception secret generating, generate double secret key, namely generate a pair PKI and private key, and private key is divided into a main fragment and the auxiliary fragment of N part, and main for portion wherein fragment is uploaded in local key server, auxiliary for N part fragment is uploaded at least one high in the clouds key server; Wherein, N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key.
In this step, it is concrete when local data owner is for being uploaded to high in the clouds data server by data (message plaintext), key production module uses key-function G, according to the parameter alpha of setting, stochastic generation PKI pk and private key sk, i.e. G (α)-> (pk, sk); Wherein, PKI pk is used for encryption, and private key sk is used for deciphering.Wherein, what key-function adopted is ElGamal algorithm, and other can certainly be adopted to well known to a person skilled in the art algorithm.
Wherein, to be preferably in step sl uploaded in the key server of N number of high in the clouds by auxiliary for N part fragment, and to store a auxiliary fragment in the key server of each high in the clouds, this kind of storage mode makes the storage of auxiliary fragment safer.Such as say, 3 parts of auxiliary fragments and portion main fragment is needed during setting reconstruct private key, if by three parts of auxiliary fragment store in three high in the clouds key servers, then need to break up three high in the clouds key servers and a local key server can reconstruct private key, if by three parts of auxiliary fragment store in a high in the clouds key server, then only need to break up a high in the clouds key server and a local key server and restructural private key, therefore, be not difficult to find out to exist in different cloud servers safer respectively by auxiliary fragment.
Wherein, main fragment and at least a auxiliary fragment must be had in step S1 could to reconstruct private key refer to: the auxiliary fragment obtaining at least a private key sk from multiple key server, and obtain the main fragment of a private key sk stored in local key server, namely can derive and calculate complete private key sk; From local key server, obtain the main fragment of a private key if fail and/or fail to get the auxiliary fragment of private key be stored in the key server of high in the clouds, complete private key sk can not be reconstructed and be decrypted with message cipher text.
Step S2, by PKI, data to be encrypted, to form message ciphertext, and be uploaded to high in the clouds data server.
In this step, the PKI pk that concrete encrypting module generates according to key production module, use encryption function E, by data (message expressly) m encryption, form message ciphertext c, the message ciphertext c now generated, by message storage module, is stored in the data server of high in the clouds, what wherein encryption function adopted is ElGamal algorithm, and other can certainly be adopted to well known to a person skilled in the art algorithm.
Wherein, PKI is after completing data encryption, and PKI will be destroyed or be stored in local key server by PKI.
The request of step S3, reception query messages ciphertext, obtains the message ciphertext of high in the clouds data server, and obtains private key fragment in the home server and at least part of high in the clouds key server of storage private key fragment, and reconstruct private key is decrypted with message cipher text; Wherein,
When obtaining at least a auxiliary fragment from the key server of high in the clouds, and obtain the main fragment in home server, the private key now reconstructed then is deciphered in order to message cipher text; Otherwise otherwise.
In this step, when the concrete validated user when certification needs to access high in the clouds data, index module adopts searching ciphertext mode to send inquiry request, now receives this inquiry request, obtains message ciphertext c from high in the clouds data server; Cipher key reconstruction module is sent to small part inquiry request to the multiple cloud servers storing private key fragment, after at least part of cloud server receives inquiry request, returns the key fragment had separately to reconstructed module.Reconstructed module adopts reconstruction of function R, and by the auxiliary fragment of t part received and the local main fragment of portion stored, wherein 1≤t≤N, regenerates private key sk, i.e. R (t, 1)->sk; Message ciphertext c, by decryption function D, is decoded as message expressly m, i.e. D (c, sk)->m by deciphering module; User can obtain the message expressly m wanting to access, and wherein reconstruction of function is the matrix change algorithm obtaining the auxiliary fragment of private key; What decryption function adopted is ElGamal algorithm, and other can certainly be adopted to well known to a person skilled in the art algorithm.In this step can by regulating the size of t value, to increase the fail safe of the method, t value is larger, and fail safe is higher.
In sum, in the cipher key processing method of the present embodiment, private key is divided into multiple fragment, i.e. a main fragment and the auxiliary fragment of N part, and adopts distributed storage mode to be stored in by private key in different servers, to guarantee the fail safe of the storage of private key; And well known to a person skilled in the art and be, be stored in data in local key server comparatively safer in the key server of high in the clouds, in the present embodiment will wherein main fragment store in home server, and this main fragment when in the end reconstructing private key, don't fail to be found can to decipher (at least one certainly also will be found to be stored in auxiliary fragment in the key server of high in the clouds), thus make the security performance of the method for the present embodiment higher.Simultaneously, adopt the mode of single key in the prior art, that is a private key is only comprised, therefore no matter this private key is stored in home server or cloud server, as long as a server is broken up can find this private key, therefore security performance is low, and in the cipher key processing method of the present embodiment, at least will break up plural server could obtain complete private key, to be decrypted data ciphertext, thus improve the fail safe of key, but also the number obtaining fragment in the key server of high in the clouds can be adjusted, to increase key safety.It should be noted that at this, can be more safer in local key server although in the prior art private key is stored in completely, but completely private key file is stored in the problem that the storage pressure of local key server can be caused in local key server larger, adopts the mode of distributed storage private key then can well alleviate the storage pressure of local key server in the present embodiment.
Embodiment 2:
As shown in Figure 2, the present embodiment provides a kind of key handling device, comprising: key production module, key management module, encrypting module, deciphering module, reconstructed module; Wherein, key production module, for according to secret generating request, generates a pair PKI and private key; Key management module, for private key being divided into a main fragment and the auxiliary fragment of N part, and being uploaded in local key server by main for portion wherein fragment, being uploaded to by auxiliary for N part fragment at least one high in the clouds key server; Wherein, N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key; Encrypting module, for being encrypted data by described PKI, being formed message ciphertext, and described message ciphertext is uploaded to high in the clouds data server; Reconstructed module, for obtaining at least a auxiliary fragment from the key server of high in the clouds, obtains main fragment from local key server, reconstruct private key; Deciphering module, for the request according to received query messages ciphertext, is obtained the message ciphertext of high in the clouds data server, and is decrypted by the private key message cipher text of reconstruct.
In the key handling device of the present embodiment, private key is divided into a main fragment and the auxiliary fragment of N part by key management module, and is uploaded in local key server by main for portion wherein fragment, is uploaded to by auxiliary for N part fragment at least one high in the clouds key server; Wherein, N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key, in brief, private key is divided into multiple fragment by key management module, and multiple fragment store is in multiple server, multiple server will be broken up when reconstructing private key and being decrypted, therefore the fail safe of the key handling device of the present embodiment is higher.And main fragment is uploaded in local key server and not only can improves the storage pressure that fail safe can also slow down local key server by key management module in the present embodiment.
Preferably, the present embodiment key handling device also comprises index module, for carrying out index to the message ciphertext being uploaded to high in the clouds data server.
Concrete, when the validated user of certification needs to access high in the clouds data, user can adopt searching ciphertext mode to send inquiry request by index module, obtains message ciphertext from high in the clouds data server.
Preferably, PKI also for being destroyed by PKI, or is stored in local key server by the key management module in the present embodiment.Wherein, being destroyed by PKI is mode the safest.
Preferably, the key management module of the present embodiment is used for the auxiliary fragment of N part private key to be uploaded in the key server of N number of high in the clouds, and stores a auxiliary fragment in each high in the clouds key server, to make the storage of auxiliary fragment safer.
Embodiment 3:
As shown in Figure 2, the present embodiment provides a kind of key handling system, and it comprises key handling device in embodiment 2, and local data service device, local key server and at least one high in the clouds key server.Wherein, local data service device is used for storing message ciphertext, and high in the clouds key server is for storing the auxiliary fragment of private key, and local key server is for storing main fragment and the PKI of private key.
Key handling system due to the present embodiment comprises key handling device in embodiment 2, therefore its fail safe is better.
Be understandable that, the illustrative embodiments that above execution mode is only used to principle of the present invention is described and adopts, but the present invention is not limited thereto.For those skilled in the art, without departing from the spirit and substance in the present invention, can make various modification and improvement, these modification and improvement are also considered as protection scope of the present invention.

Claims (10)

1. a cipher key processing method, is characterized in that, comprises the steps:
Receive secret generating request, generate a pair PKI and private key, and private key is divided into a main fragment and the auxiliary fragment of N part, and main for portion wherein fragment is uploaded in local key server, auxiliary for N part fragment is uploaded at least one high in the clouds key server; Wherein, N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key;
By PKI, data are encrypted, form message ciphertext, and be uploaded to high in the clouds data server;
Receive the request of query messages ciphertext, obtain the message ciphertext of high in the clouds data server, and from the key server of high in the clouds, obtain at least a auxiliary fragment, obtain main fragment from local key server, reconstruct private key is decrypted with message cipher text.
2. cipher key processing method according to claim 1, is characterized in that, the number of described high in the clouds key server is N, and stores a private key fragment in each high in the clouds key server.
3. cipher key processing method according to claim 1, is characterized in that, the request of described reception query messages ciphertext comprises:
Receive the message cryptogram search request of searching ciphertext mode.
4. cipher key processing method according to claim 1, is characterized in that, described by PKI data are encrypted after also comprise:
Described PKI is destroyed, or described PKI is stored to the step in local key server.
5. cipher key processing method according to claim 1, is characterized in that, described generation a pair PKI and private key, comprising:
Adopt key-function, according to the parameter of setting, stochastic generation PKI and private key;
Describedly by PKI, data to be encrypted, to comprise:
Adopting encryption function, is message ciphertext by data encryption;
Described reconstruct private key, comprising:
Adopt reconstruction of function, be at least aly stored in fragment in the key server of high in the clouds and a fragment be stored in local key server, reconstruct private key according to what receive; Described message cipher text is decrypted and comprises:
Adopt decryption function, according to the private key of reconstruct, by message decrypt ciphertext.
6. a key handling device, is characterized in that, comprising:
Key production module, for according to secret generating request, generates a pair PKI and private key;
Key management module, for private key being divided into a main fragment and the auxiliary fragment of N part, and being uploaded in local key server by main for portion wherein fragment, being uploaded to by auxiliary for N part fragment at least one high in the clouds key server; Wherein, N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key;
Encrypting module, for being encrypted data by described PKI, being formed message ciphertext, and described message ciphertext is uploaded to high in the clouds data server;
Reconstructed module, for obtaining at least a auxiliary fragment from the key server of high in the clouds, obtains main fragment from local key server, reconstruct private key;
Deciphering module, for the request according to received query messages ciphertext, is obtained the message ciphertext of high in the clouds data server, and is decrypted by the private key message cipher text of reconstruct.
7. key handling device according to claim 6, is characterized in that, described key handling device also comprises: index module,
Described index module, for carrying out index to the message ciphertext being uploaded to high in the clouds data server.
8. key handling device according to claim 6, is characterized in that, described PKI also for being destroyed by described PKI, or is stored in local key server by described key management module.
9. key handling device according to claim 6, is characterized in that, described key management module is used for the auxiliary fragment of N part private key to be uploaded in the key server of N number of high in the clouds, and stores a auxiliary fragment in each high in the clouds key server.
10. a key handling system, is characterized in that, described key handling system comprises the key handling device according to any one of claim 6-9, and local data service device, local key server and at least one high in the clouds key server.
CN201510672476.4A 2015-10-16 2015-10-16 Cipher key processing method, key handling device and key handling system Pending CN105227566A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510672476.4A CN105227566A (en) 2015-10-16 2015-10-16 Cipher key processing method, key handling device and key handling system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510672476.4A CN105227566A (en) 2015-10-16 2015-10-16 Cipher key processing method, key handling device and key handling system

Publications (1)

Publication Number Publication Date
CN105227566A true CN105227566A (en) 2016-01-06

Family

ID=54996245

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510672476.4A Pending CN105227566A (en) 2015-10-16 2015-10-16 Cipher key processing method, key handling device and key handling system

Country Status (1)

Country Link
CN (1) CN105227566A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106161449A (en) * 2016-07-19 2016-11-23 青松智慧(北京)科技有限公司 Transmission method without key authentication and system
CN106357401A (en) * 2016-11-11 2017-01-25 武汉理工大学 Private key storage method and private key use method
CN106961336A (en) * 2017-04-18 2017-07-18 北京百旺信安科技有限公司 A kind of key components trustship method and system based on SM2 algorithms
CN107276752A (en) * 2016-06-27 2017-10-20 收付宝科技有限公司 The methods, devices and systems that limitation key is decrypted are paid to cloud
CN109462608A (en) * 2018-12-19 2019-03-12 杭州安恒信息技术股份有限公司 Data encryption processing method, apparatus and system
CN110069949A (en) * 2019-04-19 2019-07-30 浙江鲸腾网络科技有限公司 A kind of electronic contract signature method, apparatus, equipment and medium
WO2020063354A1 (en) * 2018-09-28 2020-04-02 北京金山安全软件有限公司 Block chain private key storage and recovery method, device and system
CN111143863A (en) * 2019-12-22 2020-05-12 浪潮电子信息产业股份有限公司 Data processing method, device, equipment and computer readable storage medium
CN111245597A (en) * 2020-01-17 2020-06-05 众安信息技术服务有限公司 Key management method, system and equipment
CN111723390A (en) * 2020-06-28 2020-09-29 天津理工大学 Commercial data protection method and system based on supply chain management
CN112468514A (en) * 2020-12-15 2021-03-09 天津普泽工程咨询有限责任公司 System and method for realizing electronic bidding encryption in VPN (virtual private network)
CN113434904A (en) * 2021-07-02 2021-09-24 网易(杭州)网络有限公司 Data processing method and device, computer equipment and storage medium
CN113434905A (en) * 2021-07-05 2021-09-24 网易(杭州)网络有限公司 Data sharing method and device, computer equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8561211B1 (en) * 2001-07-31 2013-10-15 Marvell International Ltd. System and method for enhanced piracy protection in a wireless personal communication device
CN103595793A (en) * 2013-11-13 2014-02-19 华中科技大学 Cloud data safe deleting system and method without support of trusted third party

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8561211B1 (en) * 2001-07-31 2013-10-15 Marvell International Ltd. System and method for enhanced piracy protection in a wireless personal communication device
CN103595793A (en) * 2013-11-13 2014-02-19 华中科技大学 Cloud data safe deleting system and method without support of trusted third party

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
LING FANG ZENG 等: "SeDas:A Self-Destructing Data System Based on Active Storage Framework", 《IEEE TRANSACTIONS ON MAGNETICS》 *
陈世斌: "基于分布式对象存储系统的数据自毁研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107276752A (en) * 2016-06-27 2017-10-20 收付宝科技有限公司 The methods, devices and systems that limitation key is decrypted are paid to cloud
CN107276752B (en) * 2016-06-27 2020-10-30 吕文华 Method, device and system for decrypting cloud payment restriction key
CN106161449A (en) * 2016-07-19 2016-11-23 青松智慧(北京)科技有限公司 Transmission method without key authentication and system
CN106357401A (en) * 2016-11-11 2017-01-25 武汉理工大学 Private key storage method and private key use method
CN106357401B (en) * 2016-11-11 2019-09-10 武汉理工大学 A kind of storage of private key and application method
CN106961336B (en) * 2017-04-18 2019-11-26 北京百旺信安科技有限公司 A kind of key components trustship method and system based on SM2 algorithm
CN106961336A (en) * 2017-04-18 2017-07-18 北京百旺信安科技有限公司 A kind of key components trustship method and system based on SM2 algorithms
WO2020063354A1 (en) * 2018-09-28 2020-04-02 北京金山安全软件有限公司 Block chain private key storage and recovery method, device and system
CN109462608A (en) * 2018-12-19 2019-03-12 杭州安恒信息技术股份有限公司 Data encryption processing method, apparatus and system
CN110069949A (en) * 2019-04-19 2019-07-30 浙江鲸腾网络科技有限公司 A kind of electronic contract signature method, apparatus, equipment and medium
CN111143863A (en) * 2019-12-22 2020-05-12 浪潮电子信息产业股份有限公司 Data processing method, device, equipment and computer readable storage medium
CN111245597A (en) * 2020-01-17 2020-06-05 众安信息技术服务有限公司 Key management method, system and equipment
CN111245597B (en) * 2020-01-17 2023-09-15 众安信息技术服务有限公司 Key management method, system and equipment
CN111723390A (en) * 2020-06-28 2020-09-29 天津理工大学 Commercial data protection method and system based on supply chain management
CN111723390B (en) * 2020-06-28 2023-04-07 天津理工大学 Commercial data protection method and system based on supply chain management
CN112468514A (en) * 2020-12-15 2021-03-09 天津普泽工程咨询有限责任公司 System and method for realizing electronic bidding encryption in VPN (virtual private network)
CN113434904A (en) * 2021-07-02 2021-09-24 网易(杭州)网络有限公司 Data processing method and device, computer equipment and storage medium
CN113434905A (en) * 2021-07-05 2021-09-24 网易(杭州)网络有限公司 Data sharing method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105227566A (en) Cipher key processing method, key handling device and key handling system
IL261137A (en) System and method for performing secure communications
US20140355757A1 (en) Encryption / decryption of data with non-persistent, non-shared passkey
CN104158827B (en) Ciphertext data sharing method, device, inquiry server and upload data client
US11316671B2 (en) Accelerated encryption and decryption of files with shared secret and method therefor
CN104506483A (en) Method for encrypting and decrypting information and managing secret key as well as terminal and network server
CN104253694A (en) Encrypting method for network data transmission
CN103414682A (en) Method for cloud storage of data and system
CN104052658A (en) Privacy protection system and method based on social network
CN102891898A (en) Network bid inviting and bidding system based on cloud storage
CN105100115A (en) Data storage method for privacy protection based on encryption password and data fractionation
CN104967693A (en) Document similarity calculation method facing cloud storage based on fully homomorphic password technology
KR101608815B1 (en) Method and system for providing service encryption in closed type network
CN107465665A (en) A kind of file encryption-decryption method based on fingerprint identification technology
CN103607278A (en) Safe data cloud storage method
CN109067517B (en) Encryption and decryption device, encryption and decryption method and communication method of hidden key
CN104270242A (en) Encryption and decryption device used for network data encryption transmission
CN204180095U (en) A kind of ciphering and deciphering device for network data encryption transmission
CN104270380A (en) End-to-end encryption method and system based on mobile network and communication client side
CN105827585A (en) Re-encryption method, re-encryption system and re-encryption device
CN103354637B (en) A kind of internet-of-things terminal M2M communication encrypting method
CN102045343A (en) DC (Digital Certificate) based communication encrypting safety method, server and system
CN110086789A (en) A kind of method, apparatus, equipment and the medium of data transmission
CN103746993A (en) Cloud storage data encryption method with client-controlled decryption private key and server-performed encryption and decryption
CN106257859A (en) A kind of password using method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160106