[go: up one dir, main page]

TWI640187B - Tenon encryption method - Google Patents

Tenon encryption method Download PDF

Info

Publication number
TWI640187B
TWI640187B TW104123062A TW104123062A TWI640187B TW I640187 B TWI640187 B TW I640187B TW 104123062 A TW104123062 A TW 104123062A TW 104123062 A TW104123062 A TW 104123062A TW I640187 B TWI640187 B TW I640187B
Authority
TW
Taiwan
Prior art keywords
subset
data
plaintext
subsets
different
Prior art date
Application number
TW104123062A
Other languages
Chinese (zh)
Other versions
TW201705718A (en
Inventor
黃宗立
Original Assignee
國立成功大學
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 國立成功大學 filed Critical 國立成功大學
Priority to TW104123062A priority Critical patent/TWI640187B/en
Publication of TW201705718A publication Critical patent/TW201705718A/en
Application granted granted Critical
Publication of TWI640187B publication Critical patent/TWI640187B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

本發明揭示一種榫接加密方法,可改善習知技術大量存取資料時加解密效能不佳問題,該方法利用一電腦系統執行,其步驟包含:讀取一資料集,該資料集包含數筆資料,各資料皆含數種欄位,各欄位內含一明文;依據不同欄位切割該資料集為數個子集,各子集包含同種欄位的所有明文,依據各資料內含的明文間的關聯,令各子集的所有明文分別由一接榫映對其他子集之明文,使不同子集的明文產生關聯性;及將各接榫加密形成一密榫,所有密榫皆不相同。藉此,含有該密榫的所有子集可儲存於同一儲體,且可有效改善上述問題。 The invention discloses a splicing encryption method, which can improve the problem of poor encryption and decryption performance when a large amount of data is accessed by the prior art. The method is implemented by a computer system, and the method comprises: reading a data set, the data set comprises a plurality of pens Data, each data contains several fields, each field contains a clear text; according to different fields, the data set is divided into several subsets, each subset contains all the plaintext of the same kind, according to the plaintext contained in each data The association between the two sets of plaintexts of each subset is made clear to the plaintext of the other subsets, so that the plaintexts of the different subsets are related; and the keys are encrypted to form a password, and all the keys are not the same. Thereby, all subsets containing the crypto can be stored in the same storage, and the above problems can be effectively improved.

Description

榫接加密方法 Connection encryption method

本發明係關於一種資料加密方法;特別是關於一種基於資料間的關聯因子(接榫)進行加密的榫接加密方法。 The present invention relates to a data encryption method; in particular, to a splicing encryption method based on an association factor (interface) between data.

隨著資訊科技日益進步,以數位化形式儲存於資料庫的資料(如:影像、視訊、音訊或文字等)越來越多,其中,非供公眾閱覽的資料(如:金融、通訊或醫療等紀錄)可利用加/解密技術加以保護或隱藏,以防該資料所傳達的訊息遭非法使用者竊取、攔截或竄改。 With the advancement of information technology, more and more data (such as video, video, audio or text) stored in the database in digital form, such as non-public information (such as: finance, communication or medical) Such records can be protected or hidden by encryption/decryption techniques in case the information conveyed by the material is stolen, intercepted or tampered with by an unauthorized user.

以醫療記錄為例,習知資料加密方法可利用至少一金鑰對病患的姓名、病歷等片段式的明文(plaintext)逐一加密,並將加密後的密文(ciphertext)依序儲存於資料庫中,當欲取用特定病患的資料時,需以該金鑰對同屬該病患的密文解密,其一實施例可參酌中華民國公告第TW M410262號「電子病歷系統」專利案。 Taking medical records as an example, the conventional data encryption method can encrypt the plaintext of the patient's name, medical record, and the like by using at least one key, and store the encrypted ciphertext in the data sequentially. In the library, when the data of a particular patient is to be obtained, the ciphertext of the same patient needs to be decrypted by the key. One embodiment can refer to the "Electronic Medical Record System" patent case of the Republic of China Announcement No. TW M410262 .

惟,當合法使用者(如:研究員)需取用該資料庫的全數資料時,如:利用大數據(big data)技術分析流行病的演變趨勢等,必須將該資料庫中分屬不同病患的密文逐一解密,才能取得特定明文用於分析資訊(如:病毒感染機制等),此過程將產生龐大運算量,而耗費大量運算資源及時間成本。又,由於上述資料係以固定規則加/解密,若解密方式遭破解,則有洩漏重要訊息之虞,為此,需將資料分開存放,以防資料全露。 However, when a legitimate user (such as a researcher) needs to access the full data of the database, such as using big data technology to analyze the evolution of epidemics, the database must be classified into different diseases. The ciphertexts that are affected are decrypted one by one in order to obtain specific plaintext for analyzing information (such as virus infection mechanism, etc.), which will generate a huge amount of computation, and consume a lot of computing resources and time costs. Moreover, since the above data is added/decrypted by a fixed rule, if the decryption method is cracked, there is a flaw in the leakage of important information. To this end, the data needs to be stored separately to prevent the data from being completely exposed.

有鑑於此,有必要改善上述先前技術「資料加解密效能不佳」的缺點,以符合實際需求,提升其實用性。 In view of this, it is necessary to improve the shortcomings of the above-mentioned prior art "the data encryption and decryption performance is not good" to meet the actual needs and improve its practicability.

本發明係提供一種榫接加密方法,可提升資料加解密效能。 The invention provides a splicing encryption method, which can improve data encryption and decryption performance.

本發明揭示一種榫接加密方法,利用一電腦系統執行,其步驟包含:讀取一資料集,該資料集包含數筆資料,各資料皆含數種欄位,各欄位內含一明文;依據不同欄位切割該資料集為數個子集,各子集包含同種欄位的所有明文,依據各資料內含的明文間的關聯,令各子集的所有明文分別由一接榫映對其他子集之明文,使不同子集的明文產生關聯性;及將各接榫加密形成一密榫,所有密榫皆不相同,且同一明文於該子集的順序與該資料集的順序可不同。 The invention discloses a splicing encryption method, which is executed by a computer system, and the steps thereof comprise: reading a data set, the data set comprises a plurality of data, each data comprises a plurality of fields, and each field contains a plaintext; According to different fields, the data set is cut into several subsets, and each subset contains all the plaintexts of the same kind of field. According to the association between the plaintexts contained in each data, all the plaintexts of each subset are respectively separated by one image. The plaintext of the subset makes the plaintext of different subsets related; and the interfaces are encrypted to form a key, all the keys are different, and the order of the same plaintext in the subset is different from the order of the dataset .

所述各接榫內含一關聯因子,用以指向至少一子集之明文。 Each of the interfaces includes a correlation factor for pointing to the plaintext of at least one subset.

所述關聯因子包含至少一指標。 The correlation factor includes at least one indicator.

所述各子集具有一識別碼,各子集之所有明文分別具有一序號,該關聯因子含有至少一子集之識別碼及至少一序號。 Each of the subsets has an identification code, and all the plaintexts of each subset respectively have a serial number, and the correlation factor includes at least one subset of the identification code and at least one serial number.

所述不同子集中的明文映對的接榫相同。 The plaintext pairs in the different subsets are identical.

所述各子集中的所有接榫皆不相同。 All the contacts in each subset are different.

所述各密榫依據不同金鑰加密而成。 The keys are encrypted according to different keys.

所述密榫可利用3DES、AES或RSA演算法進行加密。 The key can be encrypted using a 3DES, AES or RSA algorithm.

所述含有該密榫的所有子集可儲存於同一儲體。 The subset containing the crypt can be stored in the same reservoir.

上揭榫接加密方法,可僅針對上述明文間的接榫進行加解密,無須針對該資料集中的明文逐一加解密,即可有效保護該資料中的訊息,更可大幅減少運算所需資源及時間;且,由於所有密榫皆不相同,故含有該密榫的所有子集可儲存於同一儲體,以提高資料儲體利用率,即使有任一密榫遭到破解,因破解者並不知道其他明文間的關聯性,因而僅能取得看似不相關性的內容,並無法得知該明文間正確組成後所提供的訊息,不會有洩漏資料中的訊息之疑慮,可以達成「提升資料加解密效率」 及「提升資料保密能力」等功效,可進一步應用於需要大量數據分析的資料存取系統。 The encryption method can be used for encryption and decryption only for the above-mentioned plaintext interface, and the information in the data can be effectively protected without the need to encrypt and decrypt the plaintext one by one in the data set, and the resources required for the operation can be greatly reduced. Time; and, since all the keys are different, all subsets containing the key can be stored in the same storage to improve the utilization of the data storage, even if any key is cracked, because of the cracker I don't know the relevance of other plaintexts, so I can only get what seems to be irrelevant. I can't know the information provided after the correct composition of the plaintext. I don't have any doubts about the information in the data. Improve data encryption and decryption efficiency" And the "improving data confidentiality" and other functions can be further applied to data access systems that require a large amount of data analysis.

S1‧‧‧建制步驟 S1‧‧‧ Construction steps

S2‧‧‧關聯步驟 S2‧‧‧Association steps

S3‧‧‧加密步驟 S3‧‧‧Encryption steps

U‧‧‧資料集 U‧‧‧ data set

U1~U4‧‧‧子集 U1~U4‧‧‧ subset

U1’~U4’‧‧‧子集 U1’~U4’‧‧‧ subset

Q‧‧‧使用者資料表 Q‧‧‧User Information Sheet

Q1,Q2‧‧‧子集 Q1, Q2‧‧‧ subset

R‧‧‧影片分類表 R‧‧‧Video Classification Table

R1,R2‧‧‧子集 R1, R2‧‧‧ subset

Q1’,R1’‧‧‧子集 Q1’, R1’‧‧‧ subset

W1~W4‧‧‧欄位 W1~W4‧‧‧ field

W1’,W2’‧‧‧欄位 W1’, W2’‧‧‧ field

W1”,W2”‧‧‧欄位 W1”, W2”‧‧‧ field

X,X1,X2‧‧‧序欄 X, X1, X2‧‧‧

Y,Y1,Y2‧‧‧文欄 Y, Y1, Y2‧‧‧

N,N1,N2‧‧‧榫欄 N, N1, N2‧‧‧榫

Z1‧‧‧資料集的第1筆資料 The first data of the Z1‧‧‧ data set

第1圖係本發明榫接加密方法實施例的運作流程圖。 BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is a flow chart showing the operation of the embodiment of the present invention.

第2圖係本發明榫接加密方法實施例的資料集示意圖(一)。 FIG. 2 is a schematic diagram (1) of a data set of an embodiment of the present invention.

第3圖係第2圖的資料集應用於單向關聯的子集與接榫示意圖。 Figure 3 is a schematic diagram of the data set of Figure 2 applied to a unidirectionally associated subset and interface.

第4圖係第2圖的資料集應用於單向關聯的子集與密榫示意圖。 Figure 4 is a schematic diagram of the data set of Figure 2 applied to a one-way association of subsets and keys.

第5圖係第2圖的資料集應用於雙向關聯的子集與接榫示意圖。 Figure 5 is a schematic diagram of the data set of Figure 2 applied to the bidirectionally associated subset and interface.

第6圖係第2圖的資料集應用於雙向關聯的子集與密榫示意圖。 Figure 6 is a schematic diagram of the data set of Figure 2 applied to a bidirectionally associated subset and key.

第7圖係本發明榫接加密方法實施例的資料集示意圖(二)。 Figure 7 is a schematic diagram of a data set (2) of an embodiment of the splicing encryption method of the present invention.

第8圖係第7圖的資料集應用於單向關聯的子集與接榫示意圖。 Figure 8 is a schematic diagram of the data set of Figure 7 applied to a one-way association of subsets and interfaces.

第9圖係第7圖的資料集應用於多方關聯的子集與接榫示意圖。 Figure 9 is a schematic diagram of the data set of Figure 7 applied to the subset and interface of the multi-party association.

第10圖係第7圖的資料集應用於多方關聯的子集與密榫示意圖。 Figure 10 is a schematic diagram of the data set of Figure 7 applied to the multi-party association and the key.

為讓本發明之上述及其他目的、特徵及優點能更明顯易懂,下文特舉本發明之較佳實施例,並配合所附圖式,作詳細說明如下:本發明全文所述之「接榫」(Tenon),係指一資料集中屬於同一群組的不同特徵之間的關聯因子(relation factor),如:醫療資料庫中屬於同一病患的姓名、身分證、年齡、疾病及治療方式等特徵之間的聯結關係,惟不以此為限,係本發明所屬技術領域中具有通常知識者可以理解。 The above and other objects, features and advantages of the present invention will become more <RTIgt; "Tenon" refers to the relationship factor between different characteristics of a dataset belonging to the same group, such as the name, identity card, age, disease, and treatment of the same patient in the medical database. The connection relationship between the features, and the like, is not limited thereto, and can be understood by those having ordinary knowledge in the technical field to which the present invention pertains.

請參閱第1圖所示,其係本發明榫接加密方法實施例的運作流程圖。其中,該榫接加密方法實施例可利用一電腦系統(computer system)作為執行架構,該電腦系統可存取一儲體(如:資料庫或記憶體等)中的資料集(dataset)。在此實施例中,該電腦系統可由一處理器(processor) 執行一加密程式(program)作為實施態樣,惟不以此為限;該榫接加密方法實施例可包含一建制步驟S1、一關聯步驟S2及一加密步驟S3,說明如下。 Please refer to FIG. 1, which is a flowchart of the operation of the embodiment of the present invention. The embodiment of the splicing encryption method may utilize a computer system as an execution architecture, and the computer system may access a dataset in a storage (eg, a database or a memory). In this embodiment, the computer system can be a processor An encryption program is implemented as an implementation aspect, but is not limited thereto; the connection encryption method embodiment may include a construction step S1, an association step S2, and an encryption step S3, as described below.

請再參閱第1圖所示,該建制步驟S1,係讀取一資料集(dataset),該資料集包含數筆資料(datum),如:圖文資料或個人資料等,惟不以此為限,各資料皆含數種欄位(field),各欄位內含一明文(plaintext)。在此實施例中,該電腦系統可由該資料庫或資料儲體讀取該資料集,該資料集的形式可為一表格,在此以醫療記錄做為實施態樣說明,惟不以此為限。 Please refer to FIG. 1 again. The forming step S1 is to read a dataset containing a plurality of data (datum), such as graphic materials or personal data, but not as such. Limits, each data contains several fields, each field contains a plaintext. In this embodiment, the computer system can read the data set from the database or the data storage. The data set can be in the form of a form, where the medical record is used as an implementation description, but limit.

請參閱第2圖所示,其係本發明榫接加密方法實施例的資料集示意圖(一)。其中,一醫療紀錄表U含有6筆資料,各筆資料皆含〝姓名〞、〝身分證ID〞、〝年齡〞及〝疾病〞等欄位W1~W4,如:第1筆資料Z1的上述欄位W1~W4包含{〝Alice〞,〝A9457729〞,〝45〞,〝癌症〞}等明文,其餘如圖所示,惟不以此為限。 Referring to FIG. 2, it is a schematic diagram (1) of a data set of an embodiment of the present invention. Among them, a medical record form U contains 6 pieces of data, each of which contains the fields W1~W4, such as the name 〞, 〝 ID card ID, 〝 age 〞 and 〝 disease ,, such as: the first data Z1 above The fields W1~W4 contain plain text such as {〝Alice〞, 〝A9457729〞, 〝45〞, 〝 cancer 〞}, and the rest are shown in the figure, but not limited to this.

請再參閱第1圖所示,該關聯步驟S2,係依據不同欄位切割該資料集為數個子集(sub-set),各子集包含同種欄位的所有明文,依據各資料內含的明文間的關係,令各子集的所有明文分別由一接榫(tenon)映對(mapping)其他子集之明文,使不同子集的明文產生關聯性。在此實施例中,該電腦系統可依據不同欄位W1、W2、W3、W4切割該資料集U(如第2圖所示),而產生數個子集U1~U4(如第3圖所示)。 Referring to FIG. 1 again, the association step S2 cuts the data set into a plurality of sub-sets according to different fields, and each subset contains all the plaintexts of the same field, according to the information contained in each data. The relationship between the plaintexts causes all the plaintexts of each subset to be mapped by the tenon (tenon) to the plaintext of the other subsets, so that the plaintexts of the different subsets are related. In this embodiment, the computer system can cut the data set U according to different fields W1, W2, W3, and W4 (as shown in FIG. 2), and generate a plurality of subsets U1~U4 (as shown in FIG. 3). Show).

請參閱第2及3圖所示,第3圖係第2圖的資料集應用於單向關聯的子集與接榫示意圖。其中,該數個子集U1~U4可分別具有一識別碼,如:〝Table 1〞、〝Table 2〞、〝Table 3〞、〝Table 4〞等,該數個子集U1~U4分別具有一序欄(sequence column)X、一文欄(text column)Y及一榫欄(tenon column)N,該文欄用以容納同一欄位的明文,如:該資料集U中 的〝姓名〞欄位W1、〝身分證ID〞欄位W2、〝年齡〞欄位W3、〝疾病〞欄位W4內的明文;各子集U1~U4的明文可依序賦予一序號,如:〝1〞、〝2〞、〝3〞、〝4〞、〝5〞、〝6〞等數字,並容納於該序欄X,該序號X之內容亦可為隨機產生的代號,使同一明文於該子集U1、U2、U3或U4的順序(可表示為序號)與該資料集U的順序可為不同,如:明文〝A9457729〞在該資料集U之〝身分證ID〞欄位W2中的順序為〝第1順位〞,而在該〝身分證ID〞子集U2中的序號為〝3〞(非為〝第1順位〞)。如此,可避免不同子集間的明文的關聯性過於顯而易見,以防止該等明文共同組成的訊息遭非法使用者竊取。 Please refer to Figures 2 and 3, and Figure 3 is a schematic diagram of the data set of Figure 2 applied to the unidirectional association subset and interface. The plurality of subsets U1~U4 may respectively have an identification code, such as: 〝Table 1〞, 〝Table 2〞, 〝Table 3〞, 〝Table 4〞, etc., and the plurality of subsets U1~U4 have respectively A sequence column X, a text column Y, and a tenon column N, the text column is used to accommodate the plaintext of the same field, such as: the data set U The 〝 〝 name 〞 field W1, 〝 identity card ID 〞 field W2, 〝 age 〞 field W3, 〝 disease 〞 field W4 clear text; each subset U1 ~ U4 plaintext can be given a serial number, such as : 〝1〞, 〝2〞, 〝3〞, 〝4〞, 〝5〞, 〝6〞, etc., and are contained in the sequence column X. The content of the serial number X may also be a randomly generated code to make the same The order of the plaintext U1, U2, U3 or U4 (which can be expressed as a serial number) and the order of the data set U can be different, such as: Mingwen 〝 A9457729 〞 in the data set U 〝 identity card ID 〞 field The order in W2 is 〝1st 〞, and the serial number in 〝ID ID 〞 subset U2 is 〝3〞 (not 〝1st 〞). In this way, the association of plaintext between different subsets can be avoided from being too obvious, so as to prevent the information composed of the plaintexts from being stolen by illegal users.

承上,該電腦系統可依據上述各資料內含的明文間的關聯(如:資料Z1內含的〝Alice〞,〝A9457729〞,〝45〞,〝癌症〞等明文間的順序等相對關係),令各子集(如:U1)的所有明文分別由一接榫(tenon)映對其他子集(如:U2)之明文,如:〝姓名〞子集U1中序號為〝1〞的明文〝Alice〞可參照該資料集U中第1筆資料D1的內容{〝Alice〞,〝A9457729〞,〝45〞,〝癌症〞},利用該〝姓名〞子集U1中的明文〝Alice〞產生該接榫,該接榫可映對〝身分證ID〞子集中的明文〝A9457729〞,使不同子集的明文產生關聯性,用以載明同一資料之明文於不同子集間的關係,該接榫可內含一關聯因子,用以指向至少一子集之明文,如:由〝姓名〞子集U1之明文〝Alice〞指向〝身分證ID〞子集U2之明文〝A9457729〞(序號為3)的指標〝T2#3〞,使不同子集間可產生單向關聯性。 According to the above, the computer system can be based on the correlation between the plaintext contained in the above data (for example, the relative relationship between 〝Alice〞, 〝A9457729〞, 〝45〞, 〝 cancer 〞, etc. contained in the data Z1) , so that all plaintexts of each subset (such as: U1) are respectively reflected by a tenon (ten) against the plaintext of other subsets (such as U2), such as: 〝Name 〞 subset U1, the plaintext with the serial number 〝1〞 〝Alice〞 can refer to the content of the first data D1 in the data set U {〝Alice〞, 〝A9457729〞, 〝45〞, 〝 cancer 〞}, using the name of the nickname U1 in the plaintext 〝Alice〞 The interface can be mapped to the plaintext A9457729〞 in the identity card ID subset, so that the plaintexts of different subsets are related to each other, and the plaintext of the same data is used to indicate the relationship between the different subsets of the same data. The interface may contain a correlation factor for pointing to at least a subset of the plaintext, such as: by the name of the sub-set U1, the plaintext, Alice, the identity card ID, the sub-set U2, the plaintext, A9457729〞 (the serial number is 3) The indicator 〝T2#3〞 enables one-way correlation between different subsets.

其中,該關聯因子可含有至少一子集之識別碼及至少一序號,如:〝姓名〞子集U1之明文〝Alice〞的接榫所含關聯因子可為〝T2#3〞,供〝姓名〞子集U1之明文〝Alice〞映對〝身分證ID〞子集U2(識別碼為〝Table2〞)中序號為〝3〞之明文〝A9457729〞,使〝姓名〞子集U1之明文〝Alice〞、〝身分證ID〞子集U2之明文〝A9457729〞與第1筆資料 Z1具有關聯性,依此類推,所有子集中的所有接榫皆不相同。惟,不同子集中的明文映對的接榫亦可為相同,使屬於同一資料的明文於不同子集間產生關聯性,如:〝姓名〞子集U1之明文〝Alice〞、〝身分證ID〞子集U2之明文〝A9457729〞、〝年齡〞子集U3之〝45〞明文的接榫皆可為〝T4#1〞,供該等明文同時映對該〝疾病〞子集U4(識別碼為〝Table 4〞)之明文〝癌症〞(序號為〝1〞),惟不以此為限。 The correlation factor may include at least one subset of the identification code and at least one serial number, for example, the name of the 〞 subset U subset U1, and the associated factor of the Alice 可 may be 〝T2#3〞, for the name The scorpion set U1's plaintext 〝Alice 〝 〝 〝 identity ID 〞 subset U2 (identification code 〝 Table2 〞) in the plain text 〝 〞 〞 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 945 〞, 〝 ID card ID 〞 subset U2 明文〝 A9457729〞 and the first data Z1 is related, and so on, all the contacts in all subsets are different. However, the plaintext pairs in different subsets may be the same, so that the plaintext belonging to the same material has an association between different subsets, such as: 〝Name 〞 subset U1 plaintext 〝Alice〞, 〝 ID card ID 〞子集 U2的明文〝 A9457729〞, 〝 Age 〞 subset U3 〝45〞 Mingwen's 榫 can be 〝T4#1〞, for these plaintexts simultaneously to map the 〝 disease 〞 subset U4 (ID For the sake of Table 4〞), the text is 〝1〝, which is not limited to this.

請再參閱第1圖所示,該加密步驟S3,係將各接榫加密形成一密榫(encrypted tenon),所有密榫皆不相同,如:將不同接榫內容使用相同或不同金鑰加密,或將相同接榫內容使用不同金鑰加密等。在此實施例中,該密榫可利用3DES、AES或RSA等演算法進行加密,惟不以此為限,例如:各密榫可依據不同金鑰(key)對上述接榫中的關聯因子加密而成(.),其中,j{1,2,3,4},用於上述識別碼為〝Table 1〞、〝Table 2〞、〝Table 3〞、〝Table 4〞等子集U1~U4,i{A,B,C,D,E,F},用於各子集U1~U4中序號為〝1〞至〝6〞等明文指向其關聯的子集,故無論各接榫是否相同,各密榫皆不相同,可避免同一密榫同時出現在不同子集中,可防止非法使用者利用該密榫猜測不同子集之明文間的關聯性。 Referring to FIG. 1 again, the encryption step S3 encrypts each interface to form an encrypted tenon, and all the keys are different. For example, the different interfaces are encrypted by using the same or different keys. , or use the same key to encrypt the same interface content. In this embodiment, the password may be encrypted by using an algorithm such as 3DES, AES, or RSA, but not limited thereto. For example, each key may be based on a different key. Encrypting the correlation factor in the above interface (.), where j{1, 2, 3, 4} is used for the subsets U1~U4, i such as Table 1〞, 〝Table 2〞, 〝Table 3〞, 〝Table 4〞, etc. {A, B, C, D, E, F}, for each subset U1~U4, the plain texts such as 〝1〞 to 〝6〞 point to their associated subsets, so regardless of whether the interfaces are the same, each The passwords are different, which can prevent the same password from appearing in different subsets at the same time, which can prevent illegal users from using the key to guess the association between the plaintexts of different subsets.

請參閱第3及4圖所示,第3、4圖分別為第2圖的資料集應用於單向關聯的子集與接榫、密榫示意圖。其中,〝姓名〞子集U1之明文〝Alice〞的接榫所含關聯因子〝T2#3〞可用金鑰加密,而形成密榫之內容〝(T2#3)〞,其餘密榫的產生方式可依此類推(如第4圖所示)。又,由於所有密榫皆不相同,故含有該密榫的所有子集U1~U4可儲存於同一儲體(如:資料庫或記憶體等),即使有任一密榫遭到破解,由於所有密榫及其加密金鑰皆不相同,且破解者並不知道其他明文間的關聯性,因而僅能取得看似不相關性的文字或亂碼,並無法得知其正確組成後所提供的訊息,故不會有洩漏資料中的訊息之疑慮。 Please refer to Figures 3 and 4, and Figures 3 and 4 are respectively a schematic diagram of the data set of Figure 2 applied to the one-way association and the interface and the key. Among them, the name of the subgroup U1 is clearly related to the contact of Alice and the associated factor 〝T2#3〞 available key Encrypted to form a secret content〝 ( T 2#3)〞, the rest of the keys can be generated in the same way (as shown in Figure 4). Also, since all the keys are different, all the subsets U1~U4 containing the key can be Stored in the same storage (such as: database or memory), even if any key is cracked, because all keys and their encryption keys are different, and the cracker does not know the association between other plaintexts. Sex, so that only seemingly irrelevant words or garbled characters can be obtained, and the information provided after the correct composition is not known, so there is no doubt that the information in the information is leaked.

此外,本發明榫接加密方法實施例之接榫除可使不同子集U1~U4間產生單向關聯性之外,該接榫亦可使不同子集間產生雙向關聯性,以便進行加密。 In addition, in addition to the unidirectional association between different subsets U1~U4, the interface can also generate bidirectional association between different subsets for encryption.

舉例而言,如第5圖所示,〝姓名〞子集U1’中序號為〝1〞的明文〝Alice〞可參照一前向關聯子集(如:〝疾病〞子集U4’,識別碼為〝Table 4〞)中序號為〝1〞的明文〝癌症〞及一後向關聯子集(如:〝身分證ID〞子集U2’,識別碼為〝Table 2〞)中序號為〝3〞的明文〝A9457729〞,而產生該明文〝Alice〞的接榫所含關聯因子〝T4#1,T2#3〞(內含二關聯因子),各子集U1’~U4’的接榫產生方式可依此類推(如第5圖所示),在此容不贅述。 For example, as shown in FIG. 5, the plaintext Alice in the 〝Name 〞 subset U1' with the serial number 〝1〞 can refer to a forward related subset (eg: 〝 disease 〞 subset U4', identification code For the table 4〞), the number of 明1〞 of the plain text 〝 cancer 〞 and a backward related subset (such as: 〝 identity card ID 〞 subset U2 ', the identification code is 〝 Table 2 〞), the serial number is 〝 3 〞明文〝A9457729〞, and the correlation factor 〝T4#1, T2#3〞 (with two correlation factors) contained in the interface of the plaintext and Alice is generated, and the connection of each subset U1'~U4' is generated. The method can be deduced by analogy (as shown in Figure 5), and will not be described here.

請一併參閱第5及6圖所示,該〝姓名〞子集U1’中的明文〝Alice〞的接榫所含關聯因子〝T4#1,T2#3〞,可利用不同金鑰產生密榫內容〝(T4#1),(T2#3)〞,其餘密榫內容可依據不同金鑰加密而形成(.),其中,j{1,2,3,4},用於上述識別碼為〝Table 1〞、〝Table 2〞、〝Table 3〞、〝Table 4〞等子集U1’~U4’,i{A1,A2,B1,B2,C1,C2,D1,D2,E1,E2,F1,F2},用於各子集U1’~U4’中序號為〝1〞至〝6〞等明文的前、後向關聯子集(如第6圖所示),在此容不贅述。 Please refer to the figures 5 and 6 together. The name of the 〝 〞 〞 〞 〞 〞 U U 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 〞 , Generate secret content〝 ( T 4#1), ( T 2#3)〞, the rest of the key content can be based on different keys Encrypted to form (.), where j {1, 2, 3, 4}, for the above identification code is 〝Table 1〞, 〝Table 2〞, 〝Table 3〞, 〝Table 4〞 and other subsets U1'~U4',i {A1, A2, B1, B2, C1, C2, D1, D2, E1, E2, F1, F2}, used for each of the subsets U1'~U4' with a plain text such as 〝1〞 to 〝6〞 The backward related subset (as shown in Figure 6) is not described here.

又,上述資料集的形式亦可為一圖形化表格或由多表格組成,利用該接榫可使不同資料集間產生多方關聯性,以便進行加密。舉例說明如下。 Moreover, the form of the data set may also be a graphical form or a multi-table, and the interface may be used to generate multi-party association between different data sets for encryption. An example is as follows.

請參閱第7圖所示,其係本發明榫接加密方法實施例的資料集示意圖(二)。其中,左方表格為一使用者資料表Q,右方表格為一影片 分類表R,中間連線為左、右表格之間的關聯性,用以表示不同使用者的觀看記錄,如:〝Alice〞看過〝全家就是米家〞及〝逆轉王牌〞,〝Bob〞看過〝金鋼狼〞及〝厲陰宅〞,〝Charlie〞看過〝全家就是米家〞及〝厲陰宅〞,〝David〞看過〝藍色小精靈2〞,〝Emily〞看過〝藍色小精靈2〞及〝總鋪師〞,〝Fanny〞看過〝逆轉王牌〞及〝金鋼狼〞。 Please refer to FIG. 7, which is a schematic diagram (2) of the data set of the embodiment of the present invention. Wherein, the left table is a user data table Q, and the right table is a video. Classification table R, the middle connection is the correlation between the left and right tables, which is used to indicate the viewing records of different users. For example: 〝Alice〞 has seen the whole family is Mijiatun and 〝reverse ace, 〝Bob〞 〝金钢狼〞 and 〝厉阴宅〞,〝Charlie〞 watched the whole family is Mijiatun and 〝厉阴宅〞, 〝David〞 saw the elf elf 2〞, 〝Emily〞 watched the elf elf 2〞 Hey, the chief shopkeeper, 〝Fanny〞 has seen the reversal of the ace and the 〝金钢狼〞.

首先,如第8圖所示,該電腦系統可將左、右方表格分割為數個子集Q1、Q2、R1、R2並建立接榫,該接榫僅以單向關聯的子集為例說明,如:〝姓名〞子集Q1(識別碼為〝Table 1〞)的明文〝Alice〞(序號為〝1〞)的接榫所含關聯因子〝T2#3〞可指向〝生日〞子集Q2(識別碼為〝Table 2〞)的明文〝76/8/5〞(序號為〝3〞),用以產生關聯性;另,〝片名〞子集R1(識別碼為〝Table 3〞)的明文〝逆轉王牌〞(序號為〝6〞)的接榫所含關聯因子〝T4#1〞可指向〝分類〞子集R2(識別碼為〝Table 4〞)的明文〝劇情〞(序號為〝1〞),用以產生關聯性,各子集Q1、Q2、R1、R2的接榫產生方式可依此類推(如第8圖所示),在此容不贅述。 First, as shown in FIG. 8, the computer system can divide the left and right tables into a plurality of subsets Q1, Q2, R1, and R2 and establish a interface, and the interface is only described by using a one-way associated subset as an example. For example, 〝Name 〞 subset Q1 (identification code is 〞Table 1〞), the plaintext 〝Alice〞 (serial number 〝1〞) contains the correlation factor 〝T2#3 can point to 〝 birthday 〞 subset Q2 (The identification code is 〞Table 2〞), the plain text /76/8/5〞 (the serial number is 〝3〞), used to generate the correlation; in addition, the scorpion name 〞 subset R1 (the identification code is 〝Table 3〞) The plaintext reversal of the ace of the ace (number 〝6〞) contains the correlation factor 〝T4#1〞 can point to the 〝classification 〞 subset R2 (identification code 〝Table 4〞) of the plain text 〝 plot (number 〝1〞), used to generate the correlation, the connection generation mode of each subset Q1, Q2, R1, R2 can be deduced by analogy (as shown in Fig. 8), and will not be described here.

接著,如第9圖所示,該電腦系統可將觀看記錄的關聯因子附加於上述接榫中,用以產生多方關聯的子集,如:〝姓名〞子集Q1’(識別碼為〝Table 1〞)的明文〝Alice〞(序號為〝1〞)的接榫共含三關聯因子〝T2#3,T3#2,T3#6〞,用以表示使用者〝Alice〞與〝生日〞子集Q2(識別碼為〝Table 2〞)的明文〝76/8/5〞(序號為〝3〞)、〝片名〞子集R1’(識別碼為〝Table 3〞)的〝全家就是米家〞(序號為〝2〞)及〝逆轉王牌〞(序號為〝6〞)等明文具有關聯性;另,〝片名〞子集R1’(識別碼為〝Table 3〞)的明文〝逆轉王牌〞(序號為〝6〞)的接榫共含三關聯因子〝T4#1,T1#1,T1#6〞,用以表示片名〝逆轉王牌〞與〝分類〞子集R2(識別碼為〝Table 4〞)的明文〝劇情〞(序號為〝1〞)、〝姓名〞子集Q1’(識別碼為〝Table 1〞)的〝Alice〞(序號為〝1〞)及〝Fanny〞(序號為〝6〞) 等明文具有關聯性,該子集Q1’、R1’的其餘接榫產生方式可依此類推(如第9圖所示),在此容不贅述。 Then, as shown in FIG. 9, the computer system may add a correlation factor of the viewing record to the interface to generate a subset of the multi-party association, such as: 〝Name 〞 subset Q1' (identification code is 〝Table 1〞) The plaintext Alice〞 (serial number 〝1〞) has a total of three correlation factors 〝T2#3, T3#2, T3#6〞, which is used to indicate the user 〝Alice〞 and 〝 birthday 〞子Set Q2 (identification code is 〞Table 2〞), Mingwen 〝76/8/5〞 (serial number is 〝3〞), 〝片名〞 subset R1' (identification code is 〝Table 3〞), the whole family is rice The plain texts of the family 〞 (number is 〝 2〞) and 〝 reversal ace (number 〝 6〞) are related; in addition, the snippet name 〞 subset R1 ' (identification code is 〝 Table 3 〞) The plaque of the ace (number 〝6〞) contains three correlation factors 〝T4#1, T1#1, T1#6〞, which are used to indicate the title 〝 reversal ace and 〝 classification 〞 subset R2 (identification code) 〝Alice〞 (No. 〝1〞) and 〝Fanny〞 of the Ming dynasty drama (number 〝1〞), 〝Name 〞 subset Q1' (identification code 〝Table 1〞) (The serial number is 〝6〞) The plaintext is related, and the other joints of the subsets Q1' and R1' can be generated by the same method (as shown in Fig. 9), and will not be described here.

之後,如第10圖所示,該電腦系統可將上述接榫依據該金鑰加密產生不同密榫(.),其中,j{1,2,3,4},用於上述識別碼為〝Table 1〞、〝Table 2〞、〝Table 3〞、〝Table 4〞等子集,i{A1,A2,A3,B1,B2,B3,C1,C2,C3,D1,D2,E1,E2,E3,F1,F2;A,B,C,D,E,F;G1,G2,H1,H2,H3,I1,I2,I3,J1,J2,J3,K1;G,H,I,J,K,H},使各子集Q1’、Q2、R1’、R2中序號為〝1〞至〝6〞等明文可指向其關聯的多方子集,如:〝姓名〞子集Q1’的〝Alice〞明文的接榫所含的三關聯因子〝T2#3,T3#2,T3#6〞可分別用金鑰加密形成該密榫,該密榫的內容可為〝(T2#3),(T3#2),(T3#6)〞,各子集Q1’、Q2、R1’、R2的其餘密榫產生方式可依此類推(如第10圖所示),在此容不贅述。 After that, as shown in FIG. 10, the computer system can connect the above interface according to the key. Encryption produces different passwords (.), where j {1, 2, 3, 4}, for the above identification code is 子Table 1〞, 〝Table 2〞, 〝Table 3〞, 〝Table 4〞, etc., i {A1, A2, A3, B1, B2, B3, C1, C2, C3, D1, D2, E1, E2, E3, F1, F2; A, B, C, D, E, F; G1, G2, H1 , H2, H3, I1, I2, I3, J1, J2, J3, K1; G, H, I, J, K, H}, so that the number of each subset Q1', Q2, R1', R2 is 〝1明 to 〝6〞 and other plain texts can point to their associated multi-party subsets, such as: 〝Alice 〞 subset Q1' 〝Alice 〞 Ming 的 榫 榫 榫 〝 〝 2 2 2 2 2 T2#3, T3#2, T3# 6〞 can use the key separately , , Encryption forms the key, and the content of the key can be 〝 ( T 2#3), ( T 3#2), ( T 3#6) 〞, the remaining key generation modes of each subset Q1', Q2, R1', R2 can be deduced by analogy (as shown in Fig. 10), and are not described here.

藉由前揭之技術手段,本發明榫接加密方法實施例的主要特點列舉如下:利用該電腦系統讀取該資料集,該資料集包含數筆資料,各資料皆含數種欄位,各欄位內含該明文;依據不同欄位切割該資料集為數個子集,各子集包含同種欄位的所有明文,依據各資料內含的明文間的關聯,令各子集的所有明文分別由一接榫映對其他子集之明文,使不同子集的明文產生關聯性;及將各接榫加密成為該密榫,所有密榫皆不相同。藉此,僅需針對上述明文間的接榫進行加解密,無須針對該資料集中的所有明文逐一加解密,即可有效保護該資料中的訊息,更可大幅減少運算所需資源及時間,可以達成「提升資料加解密效率」功效,可進一步應用於需要大量數據分析的資料存取系統。 The main features of the embodiment of the present invention are as follows: the data set is read by the computer system, and the data set includes a plurality of data, each of which contains several fields, each of which The field contains the plaintext; the data set is cut into several subsets according to different fields, and each subset contains all the plaintexts of the same kind of field, and all the plaintexts of each subset are respectively determined according to the association between the plaintexts contained in each data. By clearing the plaintext of the other subsets, the plaintexts of the different subsets are related; and each interface is encrypted into the password, and all the keys are different. Therefore, it is only necessary to encrypt and decrypt the above-mentioned plaintext interface, and it is not necessary to encrypt and decrypt all the plaintexts in the dataset one by one, thereby effectively protecting the information in the data, and greatly reducing the resources and time required for the operation. Achieving the "enhancement of data encryption and decryption efficiency" can be further applied to data access systems that require large amounts of data analysis.

又,本發明榫接加密方法實施例中,由於所有密榫皆不相 同,故含有該密榫的所有子集可儲存於同一儲體,以提高資料儲體利用率,即使有任一密榫遭到破解,因破解者並不知道其他明文間的關聯性,因而僅能取得看似不相關性的內容,並無法得知該明文間正確組成後所提供的訊息,不會有洩漏資料中的訊息之疑慮,可以達成「提升資料保密能力」功效。 Moreover, in the embodiment of the splicing encryption method of the present invention, since all the keys are not in phase Similarly, all subsets containing the key can be stored in the same storage to improve the utilization of the data storage. Even if any key is cracked, the cracker does not know the correlation between other plaintexts. It is only possible to obtain content that appears to be irrelevant, and it is impossible to know the information provided after the correct composition of the plain text. There is no doubt that the information in the information will be leaked, and the effect of "enhancing data confidentiality" can be achieved.

雖然本發明已利用上述較佳實施例揭示,然其並非用以限定本發明,任何熟習此技藝者在不脫離本發明之精神和範圍之內,相對上述實施例進行各種更動與修改仍屬本發明所保護之技術範疇,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。 While the invention has been described in connection with the preferred embodiments described above, it is not intended to limit the scope of the invention. The technical scope of the invention is protected, and therefore the scope of the invention is defined by the scope of the appended claims.

Claims (9)

一種榫接加密方法,利用一電腦系統執行,其步驟包含:讀取一資料集,該資料集包含數筆資料,各資料皆含數種欄位,各欄位內含一明文;依據不同欄位切割該資料集為數個子集,各子集包含同種欄位的所有明文,依據各資料內含的明文間的關聯,令各子集的所有明文分別由一接榫映對其他子集之明文,使不同子集的明文產生關聯性;及將各接榫加密形成一密榫,所有密榫皆不相同,且同一明文於該子集的順序與該資料集的順序不同。 A splicing encryption method is implemented by a computer system, and the steps include: reading a data set, the data set includes a plurality of data, each data includes a plurality of fields, each field contains a plaintext; The bit cuts the data set into a plurality of subsets, each subset contains all the plaintexts of the same kind of field, and according to the association between the plaintexts included in each data, all the plaintexts of each subset are respectively mapped to other subsets. In plaintext, the plaintexts of different subsets are related; and each interface is encrypted to form a key, all the keys are different, and the order of the same plaintext in the subset is different from the order of the dataset. 根據申請專利範圍第1項所述的榫接加密方法,其中各接榫內含至少一關聯因子,用以指向至少一子集之明文。 The splicing encryption method according to claim 1, wherein each interface includes at least one association factor for pointing to at least one subset of plaintext. 根據申請專利範圍第2項所述的榫接加密方法,其中該關聯因子包含至少一指標。 The splicing encryption method according to claim 2, wherein the correlation factor includes at least one indicator. 根據申請專利範圍第2項所述的榫接加密方法,其中各子集具有一識別碼,各子集之所有明文分別具有一序號,該關聯因子含有至少一子集之識別碼及至少一序號。 According to the splicing encryption method of claim 2, wherein each subset has an identification code, and all the plaintexts of each subset respectively have a serial number, the association factor includes at least one subset of the identification code and at least one sequence number. . 根據申請專利範圍第1項所述的榫接加密方法,其中不同子集中的明文映對的接榫相同。 According to the splicing encryption method described in claim 1, wherein the plaintext pairs in different subsets are identical. 根據申請專利範圍第1項所述的榫接加密方法,其中各子集中的所有接榫皆不相同。 According to the splicing encryption method of claim 1, wherein all the interfaces in each subset are different. 根據申請專利範圍第1項所述的榫接加密方法,其中各密榫依據 不同金鑰加密而成。 According to the connection encryption method described in claim 1, wherein each password is based on Different keys are encrypted. 根據申請專利範圍第7項所述的榫接加密方法,其中該密榫利用3DES、AES或RSA演算法進行加密。 The splicing encryption method according to claim 7, wherein the cryptographic encryption is performed using a 3DES, AES or RSA algorithm. 根據申請專利範圍第1項所述的榫接加密方法,其中含有該密榫的所有子集儲存於同一儲體。 The splicing encryption method according to claim 1, wherein all subsets containing the cryptogram are stored in the same storage.
TW104123062A 2015-07-16 2015-07-16 Tenon encryption method TWI640187B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW104123062A TWI640187B (en) 2015-07-16 2015-07-16 Tenon encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW104123062A TWI640187B (en) 2015-07-16 2015-07-16 Tenon encryption method

Publications (2)

Publication Number Publication Date
TW201705718A TW201705718A (en) 2017-02-01
TWI640187B true TWI640187B (en) 2018-11-01

Family

ID=58609234

Family Applications (1)

Application Number Title Priority Date Filing Date
TW104123062A TWI640187B (en) 2015-07-16 2015-07-16 Tenon encryption method

Country Status (1)

Country Link
TW (1) TWI640187B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060041533A1 (en) * 2004-05-20 2006-02-23 Andrew Koyfman Encrypted table indexes and searching encrypted tables
TW200802029A (en) * 2005-09-26 2008-01-01 Ingrian Networks Inc System and method for protecting sensitive data in a database
US20120330890A1 (en) * 2006-06-30 2012-12-27 International Business Machines Corporation Propagating tables while preserving cyclic foreign key relationships
US20150106632A1 (en) * 2012-05-24 2015-04-16 Nec Europe Ltd. Method for storing data in a relational database and relational database server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060041533A1 (en) * 2004-05-20 2006-02-23 Andrew Koyfman Encrypted table indexes and searching encrypted tables
TW200802029A (en) * 2005-09-26 2008-01-01 Ingrian Networks Inc System and method for protecting sensitive data in a database
US20120330890A1 (en) * 2006-06-30 2012-12-27 International Business Machines Corporation Propagating tables while preserving cyclic foreign key relationships
US20150106632A1 (en) * 2012-05-24 2015-04-16 Nec Europe Ltd. Method for storing data in a relational database and relational database server

Also Published As

Publication number Publication date
TW201705718A (en) 2017-02-01

Similar Documents

Publication Publication Date Title
Wang et al. Search in my way: Practical outsourced image retrieval framework supporting unshared key
US9172533B2 (en) Method and system for securing communication
US9240883B2 (en) Multi-key cryptography for encrypting file system acceleration
US8880879B2 (en) Accelerated cryptography with an encryption attribute
WO2024077948A1 (en) Private query method, apparatus and system, and storage medium
JP6056850B2 (en) ENCRYPTED DATABASE SYSTEM, CLIENT TERMINAL, DATABASE SERVER, DATA CONNECTING METHOD, AND PROGRAM
JP7249248B2 (en) Confidential Information Processing System and Confidential Information Processing Method
US20230254126A1 (en) Encrypted search with a public key
Al Sibahee et al. Efficient encrypted image retrieval in IoT-cloud with multi-user authentication
Blundo et al. Espresso: efficient privacy-preserving evaluation of sample set similarity
CN106022155A (en) Method and server for security management in database
WO2017166054A1 (en) Quantum homomorphism symmetry searchable encryption method and system
US11184163B2 (en) Value comparison server, value comparison encryption system, and value comparison method
WO2021139075A1 (en) Contract encryption and decryption method and apparatus, and device and storage medium
US20130097430A1 (en) Encrypting data and characterization data that describes valid contents of a column
Zaw et al. Database security with AES encryption, elliptic curve encryption and signature
Park et al. Research on Note-Taking Apps with Security Features.
Wang et al. SCALE: An efficient framework for secure dynamic skyline query processing in the cloud
Rane et al. Multi-user multi-keyword privacy preserving ranked based search over encrypted cloud data
US20250038954A1 (en) Cryptographic cipher for healthcare compliant data transactions
Kim et al. Privacy-preserving parallel kNN classification algorithm using index-based filtering in cloud computing
CN119311644B (en) Homomorphic encryption ciphertext retrieval method and system based on hardware encryption card
TWI640187B (en) Tenon encryption method
US10769144B2 (en) Database search system, database search method, and non-transitory recording medium
TW201605218A (en) The method of the key replacement, encryption, decryption, and computer program product