CN102497270B - Encryption method of standardized document - Google Patents
Encryption method of standardized document Download PDFInfo
- Publication number
- CN102497270B CN102497270B CN201110438290.4A CN201110438290A CN102497270B CN 102497270 B CN102497270 B CN 102497270B CN 201110438290 A CN201110438290 A CN 201110438290A CN 102497270 B CN102497270 B CN 102497270B
- Authority
- CN
- China
- Prior art keywords
- key
- label
- log
- elements
- sub
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 239000000126 substance Substances 0.000 claims 2
- 230000007704 transition Effects 0.000 claims 2
- 241001285663 Deinococcus carri Species 0.000 claims 1
- 239000012467 final product Substances 0.000 claims 1
- 230000007547 defect Effects 0.000 abstract description 3
- 230000001788 irregular Effects 0.000 abstract description 3
- 230000009977 dual effect Effects 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 239000006260 foam Substances 0.000 description 1
- 238000010606 normalization Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
现实中存在的大量的文档都是基于各种语言,存在许多的缺陷,比如对自然语言理解和处理比较困难,很难被计算机识别、统计和汇总,同时也极不规则,并且存在大量的冗余。采用传统的方法加密后得到的密文,很难找到伪密钥,惟一解距离很短。面对计算机处理和加密安全性的双重需求,提出一种规范化的文档。规范化的文档是由标签及其元素组成的,对于所有的标签,都有固定的元素,假定元素的数量是有限的,这种文档在许多情况下,可以完全取代一般的文本内容的文档,在某些情况下,则可以与其他的文档相结合来有效表达信息。本发明设计了一种针对这类规范化文档的加密方法,加密方法简洁,并且很容易找到伪密钥,也能保证传统的安全性要求。A large number of documents in reality are based on various languages, and there are many defects. For example, it is difficult to understand and process natural language, it is difficult to be recognized, counted and summarized by computers, and it is also extremely irregular, and there are a lot of redundant documents. Remain. It is difficult to find the pseudo-key for the ciphertext obtained after encryption by the traditional method, and the unique solution distance is very short. Facing the dual requirements of computer processing and encryption security, a standardized document is proposed. A normalized document is composed of tags and their elements. For all tags, there are fixed elements. Assuming that the number of elements is limited, this kind of document can completely replace the general text content document in many cases. In some cases, it can be combined with other documents to effectively express information. The present invention designs an encryption method for this kind of standardized document, the encryption method is simple, and it is easy to find a false key, which can also guarantee the traditional security requirements.
Description
技术领域 technical field
本发明属信息安全领域,涉及一类规范化文档的加密方法,特别是针对这类规范化文档的容易寻找伪密钥,具有误导功能的加密方法。 The invention belongs to the field of information security, and relates to an encryption method for a class of standardized documents, in particular to an encryption method which is easy to find false keys and has a misleading function for such standardized documents.
背景技术 Background technique
现实中存在的大量的文档都是基于各种语言,存在许多的缺陷,比如对自然语言理解和处理比较困难,很难被计算机识别、统计和汇总,同时也极不规则,并且存在大量的冗余。由于语言不规则,存在冗余,所以采用传统的方法加密后得到的密文,很难找到伪密钥,惟一解距离很短。这样,遭遇软磨硬泡攻击的时候,密钥持有人往往不得不交出真正的密钥来。同时,对于无限计算能力下的惟密文分析也很脆弱。发明人设计了一些具有误导功能的加密方法,但是,也有它们自己的局限性,由于语言的不规则和规范,使得加密的运算量大,而且,有时候也会出现对关键词的误判,导致一些伪密钥失效。因此,面对计算机处理和误导加密的双重需求,提出一种规范化的文档。规范化的文档是完全由标签及其元素组成的,对于所有的标签,都有固定的元素,假定元素的数量是有限的,这种文档在许多情况下,可以完全取代一般的文本内容的文档,在某些情况下,则可以与其他的文档相结合来有效表达信息。举一个简单的例子,时间、地点、天气、人物、活动,都可以作为一个标签,将所有可能的时间集中起来,就是时间标签的元素,其他的标签也是如此。现实中的一些xml、表、excel文档加以约束后,可以变成这类的规范化文档。这样的文档更容易压缩,冗余可以很好地消除,采用特别的加密可以增加伪密钥的数量,这种规范化也更适用于计算机处理信息。为了表达复杂的语义,还可以对标签之间的内容做更多规范。 A large number of documents in reality are based on various languages, and there are many defects. For example, it is difficult to understand and process natural language, it is difficult to be recognized, counted and summarized by computers, and it is also extremely irregular, and there are a lot of redundant documents. Remain. Because the language is irregular and there is redundancy, it is difficult to find the pseudo-key for the ciphertext encrypted by the traditional method, and the unique solution distance is very short. In this way, when encountering soft and hard foam attacks, the key holder often has to hand over the real key. At the same time, it is also vulnerable to ciphertext-only analysis under unlimited computing power. The inventor has designed some encryption methods with misleading functions, but they also have their own limitations. Due to the irregularity and standardization of the language, the calculation amount of encryption is large, and sometimes misjudgment of keywords also occurs. causing some pseudo-keys to become invalid. Therefore, facing the dual requirements of computer processing and misleading encryption, a normalized document is proposed. A normalized document is completely composed of tags and their elements. For all tags, there are fixed elements. Assuming that the number of elements is limited, this kind of document can completely replace the general text content document in many cases. In some cases, it can be combined with other documents to effectively express information. To give a simple example, time, location, weather, people, and activities can all be used as a tag to gather all possible times, which is the element of the time tag, and the same is true for other tags. Some xml, tables, and excel documents in reality can become such standardized documents after being constrained. Such documents are easier to compress, redundancy can be well eliminated, special encryption can increase the number of pseudo-keys, and this normalization is more suitable for computers to process information. In order to express complex semantics, more specifications can be made on the content between tags.
发明内容 Contents of the invention
本发明旨在克服现有加密方法无法误导的局限性,已经现有的具有误导功能加密方法的复杂等缺陷,而在对文档进行规范化后,提供一种简单、实用的具有误导功能的规范化文档的加密算法。为了各种安全性的考虑,本发明包含了外层和内层两层加密,内层加密使得可以具有误导功能,而外层的加密则讲一些可能需要保密的标签等信息也进一步加密,外层加密是可选的。 The present invention aims to overcome the limitation that the existing encryption method cannot be misleading, and the existing encryption method with misleading function is complicated and other defects, and after standardizing the document, it provides a simple and practical normalized document with misleading function encryption algorithm. For various safety considerations, the present invention includes two layers of encryption, the outer layer and the inner layer. The inner layer encryption can have a misleading function, while the outer layer encryption is to further encrypt some information such as labels that may need to be kept secret. Layer encryption is optional.
基于我们对这类规范化文档的定义,每一个标签都有有限的固定元素,可以建立一个标签元素的数据库,这个数据库存放着每一个标签中的所有元素,以及这些元素是什么编码,在数据库中将所有的元素进行编号,在最为关键的内层加密中,将待加密的明文中每一个标签中的元素都映射为数据库中对应的编号,对编号进行加密得到密文c,加解密所采用的运算是封闭的,也就是说,针对于每一个标签的编号的加密密文c,再用不同密钥解密c可以遍历所有的编号,然后将密文编号c写入标签对应的元素位置。 Based on our definition of this type of standardized document, each label has limited fixed elements, and a database of label elements can be established. This database stores all the elements in each label, and the encoding of these elements. In the database Number all the elements. In the most critical inner layer encryption, map the elements in each label in the plaintext to be encrypted to the corresponding number in the database, and encrypt the number to obtain the ciphertext c, which is used for encryption and decryption. The operation of is closed, that is to say, for the encrypted ciphertext c of each label number, and then decrypting c with different keys can traverse all the numbers, and then write the ciphertext number c into the corresponding element position of the label.
完整加密流程如下: The complete encryption process is as follows:
(一)逐一地读取文档中各个标签的内容,即标签中的元素,查询数据库,得出对应的标签中这一元素对应的编号,然后逐一地从内层密钥中截取对应位置的密钥用于这一个标签内容的加密,得到元素的密文c,加密解密算法保证封闭性。逐一将标签中元素的密文写入文档中相应标签对应的内容。 (1) Read the content of each label in the document one by one, that is, the elements in the label, query the database, get the number corresponding to this element in the corresponding label, and then intercept the corresponding key from the inner key one by one. The key is used to encrypt the content of this tag to obtain the ciphertext c of the element, and the encryption and decryption algorithm ensures the closure. Write the ciphertext of the elements in the tag to the content corresponding to the corresponding tag in the document one by one.
(二)保存内层加密后的文档,得到过渡密文。 (2) Save the encrypted document in the inner layer to obtain the transitional ciphertext.
(三)可选地,对这一文档进行一个外层的加密,得到最终密文。这个加密采用传统的加密方法进行,选择一种对称加密方法即可。 (3) Optionally, perform an outer encryption on this document to obtain the final ciphertext. This encryption is carried out using traditional encryption methods, and a symmetric encryption method can be selected.
解密过程中,首先将最终的密文用传统的对称密码算法进行相应的解密,得到过渡的密文文件,其次要将得到的过渡文件进行内层的解密。当进行这层解密的时候,对每一个标签中的密文进行读取,然后,获得这一个标签对应的密钥,经过解密,得到标签内容的明文所对应的编号,然后根据数据库,可以查得对应的内容。 In the decryption process, firstly, the final ciphertext is decrypted with the traditional symmetric encryption algorithm to obtain the transitional ciphertext file, and secondly, the inner decryption of the transitional file is carried out. When this level of decryption is performed, the ciphertext in each label is read, and then the key corresponding to this label is obtained. After decryption, the number corresponding to the plaintext of the label content is obtained, and then according to the database, you can check corresponding content.
本加密方法可以很容易找到伪密钥,即错误的密钥可以解密出有意义的明文可以伪密钥的获取方法:A)加密解密中有两个密钥,要获取伪密钥,可以将外层对称密码的密钥不变,然后任意选取一个内层密钥序列进行截取,依次分配给相应的标签,进行解密,这时阅读文本,是否有不如意(比如不合理、暴露破绽、认为误导效果不好)的关键词,如果不满意,可以用同样方法尝试其他的密钥,并且可以根据关键词所在的位置根据自己的需要进行修改,这样形成了最终的内层密钥的有效部分,用这个密钥配合正确的外层对称密码密钥就是一个伪密钥;B)还有一种更加自由的选择伪密钥的方式,可以根据自己所希望的误导的标签内容确定下来,以此确定内层加密的伪密钥序列,方法为外层密钥不变,根据文本的关键词,以数据库为依据,选择想要替换的误导元素,即可确定这一个元素的对应的伪子密钥,将每一个标签对应的伪子密钥依次连接起来,即为内层的伪密钥,采用不变的外层密钥,即可得总的伪密钥。 This encryption method can easily find the false key, that is, the wrong key can decrypt meaningful plaintext. The method of obtaining the false key: A) There are two keys in the encryption and decryption. To obtain the false key, you can use The key of the outer symmetric cipher remains unchanged, and then arbitrarily selects an inner key sequence to intercept, assigns it to the corresponding label in turn, and decrypts it. At this time, when reading the text, whether there is any dissatisfaction (such as unreasonable, exposed flaws, misleading, etc.) effect is not good), if you are not satisfied, you can try other keys in the same way, and you can modify it according to your own needs according to the position of the keyword, thus forming the effective part of the final inner key, Using this key with the correct outer symmetric encryption key is a pseudo-key; B) There is a more free way to choose a pseudo-key, which can be determined according to the content of the misleading label you want, so as to determine The pseudo-key sequence of the inner layer encryption, the method is to keep the outer key unchanged, according to the keywords of the text, based on the database, select the misleading element to be replaced, and then determine the corresponding pseudo-subkey of this element , connect the pseudo-subkeys corresponding to each label in turn, which is the pseudo-key of the inner layer, and use the constant outer key to obtain the total pseudo-key.
在受到密码分析者的密码分析的时候,密码分析者根据不同的内层密钥是可以得到不同的有意义明文的,加上这些不同密钥得到的明文的一样也可能与原来明文相近、相反的意义,所以很吻合通信背景,密码分析者也无法确定真正密钥。 When subjected to cryptanalysis by cryptanalysts, cryptanalysts can obtain different meaningful plaintexts based on different inner keys, and the plaintexts obtained by adding these different keys may also be similar to the original plaintexts, and vice versa. meaning, so it fits well with the communication background, and cryptanalysts cannot determine the real key.
具体实施方式 Detailed ways
下面是本发明的实施例,但是,本发明并不限于实施例。 The following are examples of the present invention, however, the present invention is not limited to the examples.
在具体实现的时候,双方约定总密钥的不同部分分别用于内层和外层加密,外层密钥为固定长度,根据外层加密采用的算法来决定,比如外层加密算法采用256位的AES加密。密钥的最前面256bit为外层密钥,其余为内层密钥。内层密钥进行等长度截取,截取长度根据数据库中所有标签中最大的可能元素的数目N来定,取值应该大于等于log2N。将内层密钥截取后依次分配给各个标签,作为加密用的子密钥。 In the actual implementation, the two parties agree that different parts of the total key are used for inner and outer encryption respectively, and the outer key is a fixed length, which is determined according to the algorithm used in the outer encryption. For example, the outer encryption algorithm uses 256 bits. AES encryption. The first 256 bits of the key are outer keys, and the rest are inner keys. The inner key is truncated to equal length. The truncated length is determined according to the maximum number N of possible elements in all tags in the database, and the value should be greater than or equal to log 2 N. The inner key is intercepted and distributed to each label in turn as a subkey for encryption.
文件加密流程如下: The file encryption process is as follows:
1) 通信双方共享密钥,密钥比较长,可以采用量子密钥分配来实现长随机密钥的分配。双方规定采用相同的加密算法,并且共享相同的数据库。 1) The communication parties share the key, and the key is relatively long. Quantum key distribution can be used to realize the distribution of long random keys. Both parties stipulate to use the same encryption algorithm and share the same database.
2) 加密过程中要根据文件的类型或者格式,用相应的软件打开文件读取其内容,比如,xml或者excel文件的加密,就先用相应的软件打开文件,读取各个标签中的内容,准备进行内层加密。 2) During the encryption process, according to the type or format of the file, use the corresponding software to open the file to read its content. For example, to encrypt an xml or excel file, first use the corresponding software to open the file and read the content in each label. Prepare for inner encryption.
3) 内层加密,我们这里选择的编号为将所有元素从0到n-1,进行编号,n为这一个标签的所有元素的数目。加密算法为模加运算,根据密钥的固定结构,将子密钥k从序列中截取出来,子密钥的截取方法有:A)采用截取等长度子密钥的方法从随机序列中截取,截取的长度为等于或者大于log2N的正整数,当log2N为正整数时,截取长度为log2N;log2N为非整数的时候,截取 log2N的整数部分加1,N为所有标签中元素个数的最大值,加密和解密时候均按照这样的规则进行截取,这样能够保证加解密截取的子密钥同步,这种方法密钥需求量大,但是运算速度快;B)根据每一个标签遍历所有元素所需要的最短长度截取,截取的长度为等于或者大于log2n的正整数,当log2n为正整数时,截取长度为log2n;log2n为非整数的时候,截取 log2n的整数部分加1,n为这一个标签所有元素的个数,加密和解密时候均按照这样的规则进行截取,这样能够保证加解密截取的子密钥同步,这种方法运算速度慢,但是可以最大限度节省密钥需求量。 3) Inner layer encryption, the number we choose here is to number all elements from 0 to n-1, and n is the number of all elements of this label. The encryption algorithm is a modular addition operation. According to the fixed structure of the key, the subkey k is intercepted from the sequence. The subkey interception methods are: A) Use the method of intercepting equal-length subkeys to intercept from the random sequence, The intercepted length is a positive integer equal to or greater than log 2 N. When log 2 N is a positive integer, the intercepted length is log 2 N; when log 2 N is a non-integer, add 1 to the integer part of log 2 N is the maximum number of elements in all tags, and the encryption and decryption are intercepted according to such rules, which can ensure the synchronization of the subkeys intercepted by encryption and decryption. This method requires a large number of keys, but the operation speed is fast; B ) is intercepted according to the shortest length required for traversing all elements of each label, the intercepted length is a positive integer equal to or greater than log 2 n, when log 2 n is a positive integer, the intercepted length is log 2 n; log 2 n is not When it is an integer, add 1 to the integer part of log 2 n, where n is the number of all elements of this label. When encrypting and decrypting, intercept according to this rule, which can ensure the synchronization of the subkeys intercepted by encryption and decryption. The operation speed of this method is slow, but it can save the key demand to the greatest extent.
计算密文编号的方法为c=m+k mod n,以下是一个非常简单的文本的相关信息: The method of calculating the ciphertext number is c=m+k mod n, the following is the relevant information of a very simple text:
表一 示例 Table 1 Example
4) 内层加密得到了新的文本,将文本保存到过渡的密文文件中。 4) The inner encryption gets the new text, and saves the text in the transitional ciphertext file.
5) 进行外层的加密得到最终密文。为加强安全性对过渡的密文文件进行外层的加密。这个加密采用传统的256位AES算法进行加密。 5) Encrypt the outer layer to get the final ciphertext. In order to strengthen the security, the outer encryption is performed on the transitional ciphertext file. This encryption is encrypted using the traditional 256-bit AES algorithm.
解密为一个相反的过程,文件解密流程如下:首先对于外层的对称密码加密进行相应的解密,得到过渡的密文文件,其次要将得到的过渡文件用相关软件打开,读取其内容,根据截取得到的对应的子密钥,进行解密,得到的m值,查询数据库,可以确定相应的数据库元素,比如,解密得到星期的编号为1,查询数据库中星期中编号为1的元素是星期一,即可得明文中对应标签内容为星期一。 Decryption is a reverse process, and the file decryption process is as follows: firstly, corresponding decryption is performed on the outer layer of symmetric password encryption to obtain the transitional ciphertext file, and secondly, the obtained transitional file is opened with relevant software to read its content, according to Intercept the corresponding subkey obtained, decrypt it, obtain the m value, query the database, and determine the corresponding database element, for example, decrypt the number of the week to get 1, and the element numbered 1 in the query database is Monday , the content of the corresponding label in the plain text is Monday.
这样我们也可以根据前面提到的两种方法中的一种获取伪密钥,得到有意义的明文,而且可以根据自己的意图得到满意的“伪明文”。 In this way, we can also obtain the pseudo-key according to one of the two methods mentioned above, obtain meaningful plaintext, and obtain satisfactory "pseudo-plaintext" according to our own intentions.
Claims (4)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201110438290.4A CN102497270B (en) | 2011-12-24 | 2011-12-24 | Encryption method of standardized document |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201110438290.4A CN102497270B (en) | 2011-12-24 | 2011-12-24 | Encryption method of standardized document |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN102497270A CN102497270A (en) | 2012-06-13 |
| CN102497270B true CN102497270B (en) | 2014-07-16 |
Family
ID=46189059
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201110438290.4A Expired - Fee Related CN102497270B (en) | 2011-12-24 | 2011-12-24 | Encryption method of standardized document |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN102497270B (en) |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| HK1210371A2 (en) | 2015-11-20 | 2016-04-15 | 衍利行资产有限公司 | A method and system for analyzing a piece of text |
| CN107820240A (en) * | 2016-09-12 | 2018-03-20 | 山东量子科学技术研究院有限公司 | Short message Encrypt and Decrypt method and Android operation system based on Android operation system |
| CN108694326A (en) * | 2017-04-11 | 2018-10-23 | 北京京东尚科信息技术有限公司 | Text encryption method, apparatus and server |
| CN110266488B (en) * | 2019-07-15 | 2021-08-31 | 国网江苏省电力有限公司电力科学研究院 | Location-based key generation method and encrypted data transmission method and system |
| CN110780884B (en) * | 2019-09-05 | 2022-04-12 | 腾讯科技(深圳)有限公司 | Information processing method, device and equipment |
| CN112836764B (en) * | 2021-03-02 | 2023-07-28 | 中山大学 | Universal target attack method and device for target classification system |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2001160803A (en) * | 1999-12-03 | 2001-06-12 | Ntt Data Corp | Security scheme and method |
| JP2002229986A (en) * | 2001-02-06 | 2002-08-16 | Ricoh Co Ltd | Structured document processing apparatus, structured document processing method, and program for causing computer to execute structured document processing |
| CN102170350A (en) * | 2011-04-11 | 2011-08-31 | 桂林电子科技大学 | Multiple uncertainty encryption system with misleading function |
| CN102185689A (en) * | 2011-03-25 | 2011-09-14 | 桂林电子科技大学 | Low redundant encryption system with misguiding function |
-
2011
- 2011-12-24 CN CN201110438290.4A patent/CN102497270B/en not_active Expired - Fee Related
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2001160803A (en) * | 1999-12-03 | 2001-06-12 | Ntt Data Corp | Security scheme and method |
| JP2002229986A (en) * | 2001-02-06 | 2002-08-16 | Ricoh Co Ltd | Structured document processing apparatus, structured document processing method, and program for causing computer to execute structured document processing |
| CN102185689A (en) * | 2011-03-25 | 2011-09-14 | 桂林电子科技大学 | Low redundant encryption system with misguiding function |
| CN102170350A (en) * | 2011-04-11 | 2011-08-31 | 桂林电子科技大学 | Multiple uncertainty encryption system with misleading function |
Non-Patent Citations (2)
| Title |
|---|
| 基于迷惑与误导的加密及实现;王勇;《计算机安全》;20051031;全文 * |
| 王勇.基于迷惑与误导的加密及实现.《计算机安全》.2005,13-16. |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102497270A (en) | 2012-06-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hao et al. | Fine-grained data access control with attribute-hiding policy for cloud-based IoT | |
| CN107135062B (en) | An Improved Encryption Method for Large Files | |
| CN102497270B (en) | Encryption method of standardized document | |
| CN107078901B (en) | Encoder, decoder and the method encrypted using partial data | |
| CN106685980B (en) | Encryption method for large file | |
| US20140143553A1 (en) | Method and Apparatus for Encapsulating and Encrypting Files in Computer Device | |
| CN105959098A (en) | Format-reserved encryption algorithm based on multi-segmented Feistel network | |
| CN106888080A (en) | Protection whitepack feistel network implementations are in case fault analysis | |
| US20100054477A1 (en) | Accelerated cryptography with an encryption attribute | |
| CN106888081A (en) | The coding wide of median in whitepack embodiment | |
| CN106936820B (en) | Data variable length modification method and application thereof in big data encryption | |
| CN102412963B (en) | Random sequence based encryption method with misleading function | |
| CN106131049A (en) | A kind of method of data transmission encryption and decryption | |
| CN102447558B (en) | Encryption method using random sequence on-demand and having misleading function | |
| CN102456108B (en) | Encryption method for ibus pinyin code table | |
| CN107273724A (en) | Input and output watermarking for whitepack embodiment | |
| Kaushik et al. | A review paper on data encryption and decryption | |
| Kaur | A Review on Symmetric Key Cryptography Algorithms. | |
| Gupta et al. | Ensuring data security in databases using format preserving encryption | |
| Dayıoğlu | Secure database in cloud computing-cryptdb revisited | |
| Peng et al. | On the security of fully homomorphic encryption for data privacy in Internet of Things | |
| CN102360414B (en) | A Misleading Encryption Method with Corrected Pseudo-Random Sequence | |
| CN102185689A (en) | Low redundant encryption system with misguiding function | |
| Mousa et al. | Query Processing Performance on Encrypted Databases by Using the REA Algorithm. | |
| Mallaiah et al. | Performance analysis of Format Preserving Encryption (FIPS PUBS 74-8) over block ciphers for numeric data |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| ASS | Succession or assignment of patent right |
Owner name: GUILIN UNIVERSITY OF ELECTRONIC TECHNOLOGY Free format text: FORMER OWNER: WANG YONG Effective date: 20140529 |
|
| C41 | Transfer of patent application or patent right or utility model | ||
| TA01 | Transfer of patent application right |
Effective date of registration: 20140529 Address after: Guilin City, the Guangxi Zhuang Autonomous Region Jinji road 541004 No. 1 Applicant after: Guilin University of Electronic Technology Address before: 541004 School of computer science and engineering,, Guilin, the Guangxi Zhuang Autonomous Region, China, Guilin University of Electronic Technology Applicant before: Wang Yong |
|
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| TR01 | Transfer of patent right |
Effective date of registration: 20211201 Address after: 541004 room 3201, Science Park, Guilin University of Electronic Science and technology, No. 123, Liuhe Road, Guilin, Guangxi Zhuang Autonomous Region Patentee after: Guilin Qinghong Technology Co.,Ltd. Address before: 541004 1 Jinji Road, Guilin, the Guangxi Zhuang Autonomous Region Patentee before: GUILIN University OF ELECTRONIC TECHNOLOGY |
|
| TR01 | Transfer of patent right | ||
| CF01 | Termination of patent right due to non-payment of annual fee | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20140716 |