Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy encryption method, electronic equipment, storage medium and chip

An encryption method and privacy technology, applied in the field of communications, can solve problems affecting the authenticity of information, non-repudiation of integrity, interception or even tampering of plaintext M, and reduction of information security.

Pending Publication Date: 2022-05-06
北京航天晨信科技有限责任公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the process of sending and receiving, the digital signature is sent together with the original plaintext M, and the plaintext M is easily intercepted or even tampered by attackers, which reduces the security of the information and affects the authenticity, integrity and unreliability of the information. denial

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy encryption method, electronic equipment, storage medium and chip
  • Privacy encryption method, electronic equipment, storage medium and chip
  • Privacy encryption method, electronic equipment, storage medium and chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Apparently, the described embodiments are some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0033] A digital signature is a digital string that can only be generated by the sender of the message and cannot be forged by others. This digital string is also an effective proof of the authenticity of the message sent by the sender of the message. It is a sign for electronic messages. In this method, digital signatures can be obtained based on both public key cryptosystem and private key cryptosystem.

[0034] The public key and the private key are a key pair obtai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a privacy encryption method, electronic equipment, a storage medium and a chip, and belongs to the technical field of communication. The method comprises the following steps: a sender generates a first digital digest of a plaintext by using a Hash algorithm, generates a digital signature from the first digital digest by using a private key and a digital signature algorithm, generates a ciphertext from the plaintext, the digital signature and a public key index by using a symmetric encryption algorithm, and sends the ciphertext to a receiver; the receiver decrypts the ciphertext by using a symmetric decryption algorithm to obtain a plaintext, a digital signature and a public key index; generating a plaintext second digital digest through the Hash algorithm, obtaining a corresponding public key from a preset public key dictionary in the receiver according to the public key index, and verifying the digital signature through the public key and a verification algorithm of the digital signature to obtain a first digital digest; comparing the first digital digest with the second digital digest; if yes, the signature succeeds, and otherwise, the signature fails. According to the invention, the information security can be improved.

Description

technical field [0001] The embodiments of the present application relate to the technical field of communications, and in particular, to a privacy encryption method, electronic equipment, a storage medium, and a chip. Background technique [0002] With the rapid development of information digitization, people are paying more and more attention to the security of information data. Digital signature algorithm is one of the most widely used encryption algorithms at present. Elliptic curve digital signature algorithm is the current mainstream digital signature method. Its main Geometric operations based on elliptic curve features have the advantages of high security and fast operation speed. [0003] However, in the process of sending and receiving, the digital signature is sent together with the original plaintext M, and the plaintext M is easily intercepted or even tampered by attackers, which reduces the security of the information and affects the authenticity, integrity and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06H04L9/40H04L9/30G06F21/64
CPCH04L9/3252H04L9/3239H04L9/0643H04L63/0435H04L9/30G06F21/64
Inventor 王文勇刘炜任培友魏进东
Owner 北京航天晨信科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products