Large file selective encryption method for reducing write
An encryption method and selective technology, applied in the field of information security, can solve the problems of unrealistic data encryption, low homomorphic encryption efficiency, large amount of calculation, etc., to avoid complete encryption unrealistic, to facilitate later call calculations, and to solve large files. The effect of encryption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0036] Embodiment 1 is the embodiment of this encryption method, and we choose the SequenceFile file as an example, and the encryption steps are as follows:
[0037] 1. After reading the file, you can analyze each record and its length, and use one of its records as a data block. The start position and end position of the record are used as the positioning information of the data block.
[0038] 2. According to the set keyword calculation rules, the sensitivity of the records can be obtained. Records reaching a certain threshold need to be encrypted. At the same time, it can be determined according to the rules whether it is symmetric encryption or public key encryption (including some homomorphic encryption and proxy re-encryption. ), if the user chooses to encrypt the records that do not reach the threshold according to the needs, the block is also encrypted. If the file does not belong to the above two situations, it will not be encrypted.
[0039] 3. For the data that ne...
Embodiment 2
[0044] Embodiment 2 is a further improvement of Embodiment 1 of this encryption method. On the basis of Embodiment 1, considering that in files, text and numerical values are often mixed together, when numerical values and texts are mixed together, the text and numerical values are mixed together. Isolation, using appropriate encryption methods for each, for example, for the initial segment, consider different encryption needs, further segment, use different encryption methods for values and text, perform homomorphic encryption on values, and use general symmetric encryption for other data, So segment them as well to isolate them. For streaming files, there is no need to increase the number of records. When a certain record contains data that needs to be homomorphically encrypted, segment the data before and after the data. The ciphertexts of multiple segments in the record are put together, but the starting position of the first segment and the length of each segment ...
Embodiment 3
[0045] Embodiment 3 is a further improvement of Embodiment 1 of this encryption method. On the basis of Embodiment 1, the calculation functions that may be involved in the values that require homomorphic encryption are analyzed to determine whether the data involved need to use the same State encryption, what kind of homomorphic encryption needs to be used, when performing certain entrusted calculations, other general encryption and non-fully homomorphic encryption cannot be directly calculated, when fully homomorphic encryption is required, fully homomorphic encryption is used , when both fully homomorphic encryption and non-holomorphic encryption are feasible, the non-fully homomorphic (semi-homomorphic) encryption method is used. When ordinary encryption is feasible, the ordinary encryption method is preferred, that is, when multiple methods are all When the purpose can be achieved, the preferred order is general encryption, semi-homomorphic encryption, and fully homomorph...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com