Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

97results about How to "Improve decryption efficiency" patented technology

Access control system and method supporting cross-domain data sharing and wireless communication system

The invention belongs to the technical field of wireless communication networks, and discloses an access control system and method supporting cross-domain data sharing, and a wireless communication system. Users needing to share data in a domain A select elliptic curve parameters to generate ECC key pairs; a global authentication center CA of the domain B generates a global public parameter; the proxy node in the domain B encrypts the system public key and the attribute set by using the ECC public key of the domain A user; the domain A user decrypts the data from the domain B by using the ECCprivate key of the domain A user and uploads the data to the public cloud; the legal user sends a file access request to the public cloud; and when user revocation occurs, the proxy server searches acorresponding attribute private key list according to the global identifier of the user and deletes the attribute private key list. The method is high in safety under the condition of the same secretkey length. The method gives full play to the characteristic of strong computing power of agent nodes, completes the preprocessing of some data, helps a user to carry out partial decryption, and improves the decryption efficiency of the user.
Owner:XIDIAN UNIV

Method and system for remote bid opening and bid evaluation

The invention relates to data safety technology, and particularly discloses a method and a system for remote bid opening and bid evaluation. The method includes the steps: uploading bidding documents, primarily encrypting the bidding documents and secondarily encrypting a primary encryption key; receiving and decrypting the bidding documents in an online manner, decrypting the primary encryption key by acquiring a secondary primary encryption key, and then decrypting the bidding documents by the aid of the primary encryption key; verifying validity of the bidding documents and generating a bid opening list when bid opening time comes; distributing bid inviting documents, the bidding documents and bid opening process documents; and performing evaluation according to preset evaluation standards to obtain bid evaluation results. The system comprises a bidding service subsystem, a bid opening service subsystem and a bid evaluation service subsystem, wherein the bid opening service subsystem is capable of decrypting the secondarily encrypted bidding documents in the online manner and providing the corresponding bid inviting documents, the bidding documents and the bid opening process documents to the bid evaluation service subsystem for evaluation. By the aid of the method and the system, safety of the bidding documents is facilitated, and decrypting efficiency is improved.
Owner:SICHUAN CONSTR NETWORK

Distributed cross-domain authorization and access control method based on attribute password

The invention provides a distributed cross-domain authorization and access control method based on an attribute password. The method is mainly used for solving the problems of cross-domain authorization and access control under a large-scale distributed environment. The invention designs a hierarchical attribute-based encryption with controlled key delegation and attribute authorities, supportingdecentralized and controlled security authorization for users of a plurality of domains, preventing abuse of the key delegation, and accordingly achieving non-interactive access control. The method also supports decoding of an external packet, and supports the authorization to the light-weight users for accessing the system.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

BGN type cryptograph decryption outsourcing scheme based on attributes

The invention particularly relates to a BGN type cryptograph decryption outsourcing scheme based on attributes. The scheme comprises steps that (1), a system parameter is set, and an encryption secret key is generated; (2), an access structure is selected by a sending side, message encryption is carried out, and cryptograph is generated; (3), a main secret key and the attributes are inputted by a receiving side, and a conversion secret key and a private secret key are outputted; (4), the cryptograph is sent by the sending side to a cloud end; (5), the conversion secret key is sent to the cloud end by the receiving side; (6), the cryptograph is converted by the cloud end through utilizing the conversion secret key to acquire a part of the cryptograph which is sent to the receiving side; and (7), the private secret key is utilized by the receiving side to decrypt the part of the cryptograph to acquire a message, and homomorphic computation operation for the cryptograph carried out by the cloud end is further comprised between the step (4) and the step (5). The scheme is advantaged in that not only can system decryption efficiency be improved, but also storage cost of a receiver is reduced; according to the cryptograph acquired according to the encryption method, a server is permitted to carry out multiple addition homomorphic operation and multiplication homomorphic operation for cryptograph data, on the condition that decryption difficulty does not increase, CPA safety of the user information is substantially improved.
Owner:ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE

An intelligent management method and a system for a construction project concrete standard culture homoculture test block

The invention relates to an intelligent management method and a system for a construction project concrete standard curing homoculture test block. The method comprises the following steps: S1, two attributes of a magnetic body being determined as two numbers representing binary; 2, arranging a plurality of magnetic bodies accord to a preset digital arrangement rule to form encrypted information; S3, embedding the encrypted information into the concrete test block corresponding to the encoded lattice to obtain the encrypted concrete test block; S4, when the encrypted concrete test block is sentfor inspection, identifying information obtained by identifying the magnetic body in the encrypted concrete test block, generating a binary encoded lattice according to the identifying information, and determining the binary encoded lattice as decryption information; 5, checking whether that decrypt information matches the encrypted information. Through the management method, the replacement of standard curing by the construction side and the submission of concrete test blocks under the same conditions are effectively prevented, and the concrete can not be tampered with after densification, thus ensuring the true quality of the construction project concrete.
Owner:四川广聚其力电子科技有限公司

Intelligent lock data encrypted transmission method and leasing equipment applying same

The invention relates to an intelligent lock data encrypted transmission method and leasing equipment applying the same and belongs to the technical field of intelligent locksets. A complicated encryption algorithm is very difficult to realize through a calculation capability of an existing intelligent lock microcontroller and has certain safety risks. An initial value is solved by utilizing current time of a server side, a key (KEY) of data can be changed at any time and the difficulty of cracking the encrypted data is enhanced; meanwhile, two initial values are solved by the intelligent lockset according to local time and the encrypted data is decrypted; effective data is determined through comparing decrypted verification codes; the scheme is detailed and feasible; a locket key does notneed to be distributed; the encryption and decryption efficiency of the data can be extremely improved; the method is easily realized on the microcontroller and has the advantages of small occupationof microcontroller RAM (Random Access Memory) and FLASH resources, rapid calculation speed and the like, and the safety of the intelligent lock in the aspect of communication is improved.
Owner:ZHEJIANG HONGLI LOCKS

Rainbow table parallel system design method and device based on MapReduce

InactiveCN104281816AControl overlap problemImplement parallel readsProgram initiation/switchingDigital data protectionData vectorRainbow
The invention discloses a rainbow table parallel system design method and device based on MapReduce. The design method includes a rainbow table data generation step and a rainbow table decryption step; the method includes aiming to each rainbow chain of a rainbow table, allowing a map module to acquire a chain head node data vector and chain end node data vector of the rainbow chain, recording the chain head node data vector as (img file = 'DDA0000586158180000011.TIF' wi = '88' he = '72' / ), recording the chain end node data vector as (img file = 'DDA0000586158180000012.TIF' wi = '95' he = '66' / ), adopting EPi as Key, adopting SPi as Value, and transmitting <EPi, SPi> data to a Reduce module of the rainbow chain; allowing the Reduce module of the rainbow chain to reorganize the <EPi, SPi> data, acquiring a data structure that (img file = 'DDA0000586158180000013 .TIF 'wi =' 400 'he =' 72 ' / ), presenting a chain table as (img file =' DDA0000586158180000014.TIF 'wi =' 238 'he =' 68 ' / ), and allowing the value of the chain table to be a set of chain head node data vectors of the rainbow table with all chain end node data vectors serving as the EPi; inserting all reorganized rainbow table data and fresh & lt; Key, Value & gt; data into a database NoSQL; analyzing Hash H0 to be decrypted, and mapping the H0 as nodes Nodei of the rainbow chain; converting the Nodek as the chain end node data vectors EP'i; adopting the EP'i as the key to read the reorganized rainbow chain data from the database NoSQL, and analyzing and acquiring the H0 passwords.
Owner:XIAMEN ZHIXIN TONGCHUANG NETWORK TECH

Method for scheduling decryption machines

The invention relates to a method for scheduling decryption machines. The method comprises: step 1, a receiver receiving invoice data information comprising invoice ciphertexts; step 2, the receiver querying the working state table of the decryption machines, determining whether there are decryption machines at idle working states, and if there are such idle decryption machines, selecting one as a specified decryption machine, wherein the decryption machine working state table comprises the working states of all the decryption machines, and the working states of the decryption machines comprise an idle state and a busy state; step 3, the server sending the invoice ciphertexts to the specified decryption machine and changes the working state of the specified decryption machine from the idle state to the busy state in the decryption machine working state table; step 4, the specified decryption machine decrypting the invoice ciphertexts and sending obtained invoice decryption information to the server; and step 5, the server, after receiving the invoice decryption information, changes the working state of the specified decryption machine from the busy state to the idle state in the decryption machine working state table. By using the method provided by the invention, the utilization efficiency of the decryption machines can be enhanced and the decryption efficiency can be improved.
Owner:AEROSPACE INFORMATION

File sharing methods and devices based on CP-ABE (Ciphertext Policy-Attribute Based Encryption) layered access control, equipment and medium

The invention applies to the technical field of ciphertext access control and provides a file sharing methods and devices based on CP-ABE (Ciphertext Policy-Attribute Based Encryption) layered accesscontrol, equipment and a medium. A method comprises the steps of when a file sharing request sent by a file owner is received, according to a content key set, encrypting a to-be-shared file set through utilization of a symmetric encryption algorithm, thereby obtaining a file ciphertext set; according to public parameters and an AND gate access control policy corresponding to an AND gate policy LSSS (Linear Secret Sharing Scheme) matrix, encrypting the content key set through utilization of an encryption function, thereby obtaining a key ciphertext set corresponding to the content key set; ad uploading the file ciphertext set and the key ciphertext set to a cloud server, thereby realizing cloud file sharing. Ciphertext layered access is realized through CP-ABE, moreover, storage cost, communication cost and decryption computing complex of ciphertexts are reduced, and encryption efficiency, decryption efficiency and data sharing security degree are improved.
Owner:SHENZHEN TECH UNIV

Aggregation method for multi-dimensional data encryption and decryption in intelligent power grid

The invention discloses an aggregation method for multi-dimensional data encryption and decryption in an intelligent power grid. The aggregation method comprises the following steps: 1, respectively generating an encrypted public key and a decrypted private key of power utilization data by utilizing a Chinese remainder theorem; 2, generating a public key and a private key of the password system; 3, encrypting the power utilization data; 4, respectively aggregating the ciphertext and the ciphertext decryption parameters; 5, decrypting the aggregated ciphertext; 6, solving a discrete logarithm for the intermediate ciphertext; and 7, decrypting the mixed ciphertext. In the key generation process, the encrypted public key and the decrypted private key of the power consumption data are generated by utilizing the Chinese remainder theorem, so that the key generation efficiency is improved, and the calculation burden of a control center and the risk of data leakage are reduced. In the decryption process, only one discrete logarithm needs to be obtained for the intermediate ciphertext, the decryption efficiency of the aggregated ciphertext is improved, and finally the efficiency of the whole data aggregation process is improved.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products